The Android Developers Guide to 3 rd -Party SDK Assessment and Security



Similar documents
Download and Installation Instructions. Android SDK and Android Development Tools (ADT) Microsoft Windows

Studying Security Weaknesses of Android System

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!

Jordan Jozwiak November 13, 2011

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

BASIC COMPONENTS. There are 3 basic components in every Apache Cordova project:

Islamic University of Gaza. Faculty of Engineering. Computer Engineering Department. Mobile Computing ECOM Eng. Wafaa Audah.

SSOScan: Automated Testing of Web Applications for Single Sign-On vulnerabilities

Affiliate Marketing for Mobile Apps. Peter Hamilton Partner / CMO peter@hasoffers.com #AMDays

Mobile App Install Ads

Download and Installation Instructions. Android SDK and Android Development Tools (ADT)

WebView addjavascriptinterface Remote Code Execution 23/09/2013

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

Defending Behind The Device Mobile Application Risks

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

Web. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social.

Overview. About Interstitial Ads: About Banner Ads: About Offer-Wall Ads: ADAttract Account & ID

10 Quick Tips to Mobile Security

Enterprise Mobile Threat Report

Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo

Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy.

Norton Mobile Privacy Notice

How To Track Your Mobile Marketing On A Mobile Device

Importing and using your Personal Authentication Certificate with Djigzo for Android

U.S. Cellular Mobile Data Security. User Guide Version 00.01

GCM for Android Setup Guide

Creating Enterprise Mobile Apps with Red Hat

How we keep harmful apps out of Google Play and keep your Android device safe

3. GENERALI MOBILE APPLICATION CONTENT. 3 P a g e

Tizen Validation Guidelines

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

Kaspersky Lab Mobile Device Management Deployment Guide

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner IAIK

PULSE APPCONNECT. A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway.

Comodo Mobile Security for Android Software Version 2.5

BYPASSING THE ios GATEKEEPER

SMARTDEVICELINK CONNECTIVITY FROM THE CAR S POINT OF VIEW

Introduction to Gear VR Development in Unity APPENDIX A: SETUP (MAC OS X)

Take Your Mac OS X Security to NSA Standards June 19, 2014 by Larry Chafin

Kore Bots Platform Competitive Comparison Overview Kore Bots Platform Competitive Comparison Overview

Utilizing Dropbox to Share Files

How To Create A Bada App On Android (Mainfest) On Android And Get A Download Of Bada (For Android) On A Microsoft Gosu 2.5 (For Black

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

The "Eclipse Classic" version is recommended. Otherwise, a Java or RCP version of Eclipse is recommended.

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Enrollment Process for Android Devices

PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

Download and Installation Instructions. Android SDK and Android Development Tools (ADT) Microsoft Windows

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

How to downgrade Samsung Galaxy Tab 2 back to original V4.1.1 Android OS

Use of tablet devices in NHS environments: Good Practice Guideline

Enterprise Mobility Report 06/2015. Creation date: Vlastimil Turzík

APPLE WITHOUT A SHELL IOS UNDER TARGETED ATTACK Tao Wei, Min Zheng, Hui Xue & Dawn Song FireEye, Inc., USA

The biggest mistake we made as a company was betting too much on HTML5 as opposed to native.

UP L18 Enhanced MDM and Updated Protection Hands-On Lab

Mobile and Social Computing

(In-)Security of Backend-as-a-Service

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

Adobe Flash Player and Adobe AIR security

Securing Office 365 with MobileIron

Protecting against Mobile Attacks

Fingerprints On Mobile Devices: Abusing and Leaking

ios Developer Program Information

Izplatītākie mobilo iekārtu lietošanas riski, kas apdraud organizācijas datu un informācijas sistēmu drošību Raivis Kalniņš 2015, Riga

Appery.io Overview. However mobile also presents many challenges for enterprises:

Feature List for Kaspersky Security for Mobile

Use Host Information in Policy Enforcement

INTRODUCTION TO THE PROJECT TRACKING WEB APPLICATION

Backend as a Service

SAP Mobile Platform Intro

Hands on, field experiences with BYOD. BYOD Seminar

A Review of Different Comparative Studies on Mobile Operating System

Migrating Trend Micro Mobile Security for Enterprise (TMMS) 8.0 to TMMS 9.0 Patch 1

Transcription:

SESSION ID: MBS-F02 The Android Developers Guide to 3 rd -Party SDK Assessment and Security Yang Yang( 杨 德 志 ) Mobile Security Researcher and Developer, Trend Micro

Advantages of 3 rd -Party SDKs Speed up app development Are easy to use May be of good quality (at least for some) Generate profit! 2

Android Threat Growth As of March 2015, Trend Micro has collected more than 5.4M malicious and high-risk applications 3

67% of detected apps misuse or abuse 3 rd -party SDKs or use SDKs that are inherently risky 4

Malware/PUA Distribution by Country Majority of the apps that misuse or abuse 3 rd -party SDKs are from China 5

Malware/PUA Distribution by Category Of the detected apps, games have the highest percentage, as they usually contain both advertising SDKs as well as payment SDKs. 6

Most security issues have something to do with advertising and payment SDKs. Why? 7

Popular App Business Models/SDKs Advertisement Ad networks provide SDKs that allow developers to display advertisements Ad networks pay developers, usually based on the click rate Payment Users purchase additional features or services within the app Allows users a more direct way to pay app developers 8

Security Issues with Ad SDKs Privacy leaks Insecure app installation Dynamic code loading Mobile traffic cost 9

Privacy Leak 10

Insecure App Installation A special ad: Integral Wall Using app need virtual money The way to earn the virtual money Step 1: Click the ad to download the apps Step 2: Install them Step 3: Launch the downloaded apps for a few minutes 11

Dynamic Code Loading 12

Mobile traffic cost Download file before push ad File is too large 13

Security Issues in payment SDKs Send SMS (Short Message Service) message without users explicit consent E.g., user (or a child) hits the pay button by accident Confirmation as a step is necessary Block incoming SMS message Some payment SDKs can block the confirmation or notice SMS message User may not know that s/he is already paying for a service or item 14

Block incoming SMS 15

General Security Issues in 3 rd -Party SDKs 16

General Security Issues Vulnerabilities related Insecure network transmission Insecure online setting Insecure data storage Insecure data sharing 17

SDK impacted by OS vulnerability Android API WebView vulnerability (CVE-2012-6636) 18

Insecure network transmission 19

Insecure online setting Apache Cordova vulnerability (CVE-2015-1835) 20

Insecure data storage Insecure database Insecure sdcard storage 21

Insecure data sharing Android Content Provider Share your data with enough limitation 22

Best Practices 23

For SDK Developers and Providers Provide clear end-user license agreements (EULAs) Make the SDK document as clear as possible eg: https://developers.google.com/admob/android/quick-start Limit collection user information Add more limitations for exported interface Pay attention to vulnerabilities; provide updated SDKs as necessary Online control SDK logic is not recommended 24

For Mobile App Developers Read the SDK documents carefully Choose 3 rd -party SDKs carefully Avoid using the aggressive interface (APIs) When using ad SDKs, make sure that the apps do not push ads too frequently or impact other apps Update to the latest SDK versions Advise users if your app has aggressive behavior 25

Developers should pay attention to software security! Encrypt sensitive data Use packers to protect your applications Use high-risk app permissions with caution Push app or data updates app via the app store 26

Summary Ease of use and Profit 3 in 5 Android theats are caused by 3 rd -party SDKs Mobile security involves all aspects in the ecosystem, including SDK providers and app developers 27

Questions? 28

Thank You! yang_yang@trendmicro.com.cn