TEACHERS
GALLERY
PRICING
SIGN IN
TRY ZURU
GET STARTED
Loop
Audio
Interval:
5s
10s
15s
20s
60s
Play
1 of 12
Slide Notes
Download
Go Live
New! Free Haiku Deck for PowerPoint Add-In
Highlighting easily how malicious applications
Share
Copy
Download
0
25
Published on Mar 21, 2016
No Description
View Outline
MORE DECKS TO EXPLORE
PRESENTATION OUTLINE
1.
Highlighting easily how malicious applications
corrupt Android devices
Photo by
Jenn and Tony Bot
2.
Goal
Focus on integrity.
Monitor information flows.
Filter these flows to uncover suspicious ones.
Photo by
gordonflood.com
3.
Hypothesis
Android apps share some common behaviours.
Some of the information flows are common between apps.
Photo by
Amir Kuckovic
4.
Approach
Tag the .apk of the Android application to be analysed.
Monitor and logs how information from this app is disseminated.
Build the corresponding System Flow Graph (SFG).
Filter the edges of the benign SFG.
Photo by
Ron Cogswell
5.
Blare (an information flow monitor)
System objects are process, files and sockets.
Monitors information flow between system objects.
Uses tainting.
Developed as a Linux Security Module.
Photo by
andy in nyc
6.
Blare (an information flow monitor)
Uses LSM hooks to intercept syscalls.
Observes information flows.
Logs any information flow involving tainted data.
Photo by
andy in nyc
7.
System Flow Graph
Describes in a compact way the information flows logged by Blare.
Directed graph G = (V,E)
Each node represents a system object.
Photo by
.v1ctor Casale.
8.
System Flow Graph
Each node has 3 attributes: type, name and identifier.
Each edge from two nodes represents a unique information flow.
Photo by
.v1ctor Casale.
9.
Experiments
DroidKungFu1, DroidKungFu2, jSMSHider and BadNews.
7 applications from Google Play .
Photo by
skycaptaintwo
10.
Example of SFG
11.
LSM Hook
A hook is an upcall to the module.
Hooks where a user-level syscall access an important object.
Photo by
Tojosan
12.
AndroBlare
Blare is an experimental host-based, policy-based IDS for Linux.
Blare on Android.
Adapted to take into account the binder.
Tracks the system calls that may involve information flows.
Photo by
trophygeek
Ironwk Eduardo
https://www.facebook.com/ironwk.eduardo
×
Error!