TEACHERS
GALLERY
PRICING
SIGN IN
TRY ZURU
GET STARTED
Loop
Audio
Interval:
5s
10s
15s
20s
60s
Play
1 of 30
Slide Notes
Download
Go Live
New! Free Haiku Deck for PowerPoint Add-In
The objective is to preserve the privacy of a user. Information is the most important asset.
Share
Copy
Download
1
354
Published on Nov 18, 2015
No Description
View Outline
MORE DECKS TO EXPLORE
PRESENTATION OUTLINE
1.
The objective is to preserve the privacy of a user. Information is the most important asset.
Photo by
garryknight
2.
Ways to steal info
Malware.
Colluding applications.
User misuse.
Exploits.
Photo by
Diamonddavej
3.
Malware
App that misleads the user.
The real objective of the app is to steal some information.
Every bit in the mobile device is information.
Photo by
Stratageme.com
4.
Malware
App that simulates to be a well-known application but steals information.
App that simulates to be a well-known app but installs a piece of code that steals info
The same but independient app.
Photo by
Stratageme.com
5.
Colluding Applications
Two or more apps that together steal some information from the user.
A mix of malware and colluding applications can be easily achieved.
Photo by
Ѕolo
6.
User misuse
An evil app can explicitly ask for permissions to obtain private info.
These apps take advantage of the lack of security knowledge.
These methodology is usually combined with one or more of the others.
Photo by
Tom Morris
7.
Exploits
Piece of code that steals information from the user
Downloaded by web page, sms, email, etc.
Auto download.*
Photo by
dustball
8.
Research Community
Policies.
Profiles.
Taints.
System calls.
SEAndroid.
Photo by
eriwst
9.
Achievements
Good performance.
Profile isolation.
Tainting for human analysis.
Policies.
Secure Linux Core.
Photo by
RambergMediaImages
10.
Failures
Automated privacy assurance system.
System easy to install and understand by any user.
Information classification to create privacy levels.
Photo by
theqspeaks
11.
What will I try to do?
Automated privacy assurance system.
Easy to install and understand.
Information classification.
Good performance.
Secure Linux Core.
Photo by
Mitch and Bonnie
12.
Questions?
That's all folks!
Photo by
simonm1965
13.
Privacy
How to achieve this on Android
14.
Android fundamental blocks
Device hardware.
Android OS.
Android application runtime.
Photo by
drubuntu
15.
Sources for applications
Pre-installed applications.
User-installed applications.
Photo by
Emerson Utracik (EP)
16.
Google secures Android
Protecting user data.
Protecting system resources.
Application isolation.
Photo by
Ravages
17.
Key security features
Linux kernel.
Application sandbox.
Secure inter-process communication.
Application signing.
Per application user-granted permissions.
Photo by
ep_jhu
18.
IPC
Binder. Remote procedure cal.
Services.
Intents.
Content providers.
Photo by
włodi
19.
MOSES
Policy based framework.
Security profiles.
Uses contexts to change the actual profile.
20.
moses
Battery and processing time almost intact.
Protects privacy between contexts.
What about information leak in the same context?
Depends on policy definition.
Solves accidental leaks but not intentional ones.
21.
taintdroid
Taints the data dinamically.
Taints sensors, db, device ids, network.
Three levels: variable, message, method, file.
Photo by
jmayer1129
22.
taintdroid
Small overhead.
Only taints explicit data flows.
How to analize the taint?
Photo by
jmayer1129
23.
tissa
TAMING INFORMATION-STEALING SMARTPHONE APPLICATIONS.
Small footprint.
Trust in pre-installation applications.
Extra permission especification.
User clasiffies the data.
Photo by
ecstaticist
24.
tissa
Data can be Empty, anonymized, or bogus
App can be fully or partially trusted.
It does not affect performance.
Depends on the user.
Photo by
ecstaticist
25.
Xmandroid
eXtended Monitoring on Android.
Security framework.
Extends the android monitoring system
Detects and prevents privilege escalation attacks at runtime.
Based on a system-centric system policy.
Photo by
JD Hancock
26.
xmandroid
Establishes an state with the instaled apps & communication links.
Called after ICC.
Affects performance.
A lot of false positives.
Use policies.
Photo by
JD Hancock
27.
SEAndroid
MAC to Linux core.
First approach.
Used by Google.
MAC on Android middleware not fully implemented.
Photo by
jdsmith1021
28.
Questions?
Photo by
Clarkston SCAMP
29.
Paranoid android
Dynamic analysis, AV, memory scanners.
system call anomaly detection.
A way to notify a user is not defined.
Old stuff, they use a G1!!!!
30.
Paranoid Android
Remote replica of smartphone in servers.
Detection techniques simultaneously applied.
Don't replay kernel executions.
Tamper - evidence secure storage.
Ironwk Eduardo
https://www.facebook.com/ironwk.eduardo
×
Error!