SlideShare a Scribd company logo
1 of 19
Mobile Application Security and Mobile Security Applications: Sticks and Carrots 30 September 2011 Craig HeathIndependent Mobile Security Consultant
Topics Who the [heck] are you? Why can’t you turn this [stupid] security off? Comparing security frameworks on the main platforms What’s in it for me? Security apps that vendors and operators aren’t doing Notarised call recording Premium charge warning Trustworthy viewport 30 September 2011 2 © Franklin Heath Ltd
My Background Working in systems software security since 1989 UNIX and Enterprise Java Focus on mobile platforms since 2002 Responsible for Symbian’s platform security strategy Lead author of the book “Symbian OS Platform Security” Chief Security Technologist at the Symbian Foundation Now providing independent security consultancy Set up Franklin Heath Ltd in November 2010 30 September 2011 3 © Franklin Heath Ltd
Why We Need Application Security Bad guys are deploying malicious phone apps to defraud people for commercial gain Stealing virtual goods and credits Premium rate messaging fraud Phishing (e.g. banking MTANs) People need and expect their phones to be more trustworthy than their PCs have been Emergency calls Personal data (e.g. location, contacts, photos) 30 September 2011 4 © Franklin Heath Ltd
Fraudulent Apps are Real 30 September 2011 5 © Franklin Heath Ltd
Mobile Device Security and Privacy Does Matter Organised crime is monetising mobile vulnerabilities ZitMo in Europe, trojans in China and Russia Phone software platforms are becoming more uniform Easier to target a bigger “addressable market” Android market share increasing, iPhone steady But don’t forget “legacy” Symbian devices (still 100s of millions) Widespread privacy breaches are sensitising people e.g. Sony PlayStation Network WSJ coverage of bad practice in mobile applications 30 September 2011 6 © Franklin Heath Ltd
Comparing Application Testing Apple and Google are two extremes of approach iTunes app store inspects every application and can reject for arbitrary reasons Good for consumers, bad for developers Android Market “common carrier” approach: pass though everything submitted, remove apps only if complaints made Good for developers, bad for consumers Symbian Signed did standardised third-party testing Middle ground, manages costs, but provides little defence against deliberate malware Note that Nokia app store adds additional manual QA inspection 30 September 2011 7 © Franklin Heath Ltd
Comparing Application Signing Developer signing requirements vary Android: “self-signed”, free to create a certificate iPhone: Apple developer registration includes certificate cost Symbian Signed required a third-party, $200, certificate Signing party for “production” apps also varies iTunes, Amazon uses only an app store signature Android Market uses only the developer signature Symbian Signed uses only the certifier signature 30 September 2011 8 © Franklin Heath Ltd
Comparing Copy Protection iTunes app store uses Apple proprietary FairPlay DRM Android Market doesn’t provide automatic copy protection, but Google provides libraries for developers to invoke a licence server Nokia app store has lightweight “forward lock” copy protection 30 September 2011 9 © Franklin Heath Ltd
Opportunity: Put the User in Control Ways to benefit end user, not the vendor or operator Correcting “information asymmetries” to benefit consumers More usable control over personal information sharing Tools for the paranoid (or security professional ) Putting users in control of their own data and their own charges is the right thing to do But usability is key Don’t cause security prompt blindness Don’t put the responsibility on them as a cop-out 10 30 September 2011 © Franklin Heath Ltd
Idea 1: Notarised Call Recording “Reciprocal Transparency” – who watches the watchers? When you call a utility company, do you hear “this call may be recorded”? it’s being recorded for their benefit, not yours Have you ever been told they will do something, but when you call back: “I’m sorry, I have no record of that”? probably they do, but you can’t prove it: information asymmetry Why isn’t this built in to my phone? Hypothesis: difficult to do legally in all jurisdictions? 30 September 2011 11 © Franklin Heath Ltd
Idea 1: Notarised Call RecordingWhat can be done? Even a simple recording would help, with the call log but unlikely to be good enough evidence to use in court Could combine this with a “digital notary” take a hash of the recording (prevents future tampering) have the hash signed by a trusted third party with a time stamp proves that the recording was made at or before that time Make sure it’s legal in the UK Play a recorded announcement at the start? (= reciprocal) 30 September 2011 12 © Franklin Heath Ltd
Idea 2: Premium Charge Warning Premium rate voice and SMS service providers in the UK are required by law to advise consumers of their charges in advance but they haven’t always done this is the most obvious way malware isn’t going to respect this In the UK, you can discover the charges with a free SMS (76787) also available as a web-based online number checker but I doubt many people use this regularly It would be much more useful if your phone did this for you operators may not like this (could discourage use of legitimate services) 30 September 2011 13 © Franklin Heath Ltd
Idea 2: Premium Charge WarningWhat can be done? Filter to check numbers your phone is calling and texting, and warning before the call is placed if it’s premium rate “allow this application to spend 50p?” would be far more usable than “allow this application to make phone calls and send text messages?” Could be extended to enforce rules, e.g. allow this application to spend up to £5 allow this application to send 2 texts per day But, data isn’t easily available, and the hooks aren’t easily accessible on all phone platforms a “proof of concept” app could allow pressure to be brought 30 September 2011 14 © Franklin Heath Ltd
Idea 2: Premium Charge WarningProof-of-concept Possibilities Screen-scraping of the PhonePayPlus number checker http://www.phonepayplus.org.uk/Number-Checker/Check-a-Number-Results.aspx?ncn=number Trapping the call/SMS before it’s sent On Android, ACTION_NEW_OUTGOING_CALL broadcast action allows voice calls to be intercepted No equivalent for SMS? Charge information for number ranges is available commercially Could it be a marketing opportunity for the holders to make it available for free in some way, limited to this purpose? Could it be made available as part of government Open Data? 30 September 2011 15 © Franklin Heath Ltd
Idea 3: Trustworthy Viewport Typical desktop web commerce model is for the user to enter a password to confirm the transaction OK if the user confirms they are giving it to the payment provider and not to a “phishing” site Mobile browsers lack the visual security cues No room on a small screen for the window “chrome” Apps can draw on the entire display area Desktop model of entering password to authorize the transaction is dangerous on mobile 30 September 2011 16 © Franklin Heath Ltd
Examples of Insecure Mobile Experience for In-App Payments 30 September 2011 17 © Franklin Heath Ltd
Idea 3: Trustworthy ViewportWhat can be done? Have a “helper” app provide the UI for password entry Show the user something that a malicious app can’t e.g. Yahoo! “sign-in seal”, 3D Secure “Personal Assurance Message” Couple that with a clear indication of the origin of the view contents c.f. Internet Explorer highlighting the 2nd level domain, Firefox green background for EV server certificates, etc. Wrapper for Android WebView? 30 September 2011 18 © Franklin Heath Ltd
Open Discussion… 30 September 2011 19 © Franklin Heath Ltd

More Related Content

What's hot

Is it safe to bank on our phones?
Is it safe to bank on our phones?Is it safe to bank on our phones?
Is it safe to bank on our phones?Queen's University
 
Cloud computing 30 april_2011
Cloud computing 30 april_2011Cloud computing 30 april_2011
Cloud computing 30 april_2011spiirit
 
Net neutrality: The Basics
Net neutrality: The BasicsNet neutrality: The Basics
Net neutrality: The BasicsInterQuest Group
 
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareThe Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareAirTight Networks
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
IoT 2018: What's Hot, What's Not & What's Next
IoT 2018: What's Hot, What's Not & What's NextIoT 2018: What's Hot, What's Not & What's Next
IoT 2018: What's Hot, What's Not & What's NextCharles Reed Anderson
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyFabrizio Gramuglio
 
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...Black Duck by Synopsys
 
The 2016 IT Trend Showcase
The 2016 IT Trend ShowcaseThe 2016 IT Trend Showcase
The 2016 IT Trend Showcaseflowil
 
Smart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure CitiesSmart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure Cities4 All of Us
 
Public safety LTE gives agencies new standards of intelligence to enhance com...
Public safety LTE gives agencies new standards of intelligence to enhance com...Public safety LTE gives agencies new standards of intelligence to enhance com...
Public safety LTE gives agencies new standards of intelligence to enhance com...Comms Connect
 
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommIf At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommBarbara Ludwig
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageCindy Kim
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAMPing Identity
 
Internet Privacy Explained
Internet Privacy ExplainedInternet Privacy Explained
Internet Privacy ExplainedTrading Atlas
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsEntefy
 
Appril legal workshop - 15 april 2015
Appril legal workshop - 15 april 2015Appril legal workshop - 15 april 2015
Appril legal workshop - 15 april 2015Olivier Oosterbaan
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 

What's hot (20)

Is it safe to bank on our phones?
Is it safe to bank on our phones?Is it safe to bank on our phones?
Is it safe to bank on our phones?
 
Cloud computing 30 april_2011
Cloud computing 30 april_2011Cloud computing 30 april_2011
Cloud computing 30 april_2011
 
Net neutrality: The Basics
Net neutrality: The BasicsNet neutrality: The Basics
Net neutrality: The Basics
 
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareThe Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
IoT 2018: What's Hot, What's Not & What's Next
IoT 2018: What's Hot, What's Not & What's NextIoT 2018: What's Hot, What's Not & What's Next
IoT 2018: What's Hot, What's Not & What's Next
 
Patrick armstrong athens
Patrick armstrong athensPatrick armstrong athens
Patrick armstrong athens
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacy
 
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
 
The 2016 IT Trend Showcase
The 2016 IT Trend ShowcaseThe 2016 IT Trend Showcase
The 2016 IT Trend Showcase
 
Anywhereization
AnywhereizationAnywhereization
Anywhereization
 
Smart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure CitiesSmart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure Cities
 
Public safety LTE gives agencies new standards of intelligence to enhance com...
Public safety LTE gives agencies new standards of intelligence to enhance com...Public safety LTE gives agencies new standards of intelligence to enhance com...
Public safety LTE gives agencies new standards of intelligence to enhance com...
 
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommIf At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the Message
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAM
 
Internet Privacy Explained
Internet Privacy ExplainedInternet Privacy Explained
Internet Privacy Explained
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threats
 
Appril legal workshop - 15 april 2015
Appril legal workshop - 15 april 2015Appril legal workshop - 15 april 2015
Appril legal workshop - 15 april 2015
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 

Similar to Mobile Security Sticks and Carrots

Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxtodd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxglendar3
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech applicationnimbleappgenie
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfOZONESOFT Solutions
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsSaad Ahmad
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone SecurityGuneet Pahwa
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application SecurityMarie Weaver
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summarySymantec Italia
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSubho Halder
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threatAli J
 
Fingerpay
FingerpayFingerpay
FingerpayAnand B
 

Similar to Mobile Security Sticks and Carrots (20)

Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdf
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
FingerprintTouch
FingerprintTouchFingerprintTouch
FingerprintTouch
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest Version
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Fingerpay
FingerpayFingerpay
Fingerpay
 

Recently uploaded

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Mobile Security Sticks and Carrots

  • 1. Mobile Application Security and Mobile Security Applications: Sticks and Carrots 30 September 2011 Craig HeathIndependent Mobile Security Consultant
  • 2. Topics Who the [heck] are you? Why can’t you turn this [stupid] security off? Comparing security frameworks on the main platforms What’s in it for me? Security apps that vendors and operators aren’t doing Notarised call recording Premium charge warning Trustworthy viewport 30 September 2011 2 © Franklin Heath Ltd
  • 3. My Background Working in systems software security since 1989 UNIX and Enterprise Java Focus on mobile platforms since 2002 Responsible for Symbian’s platform security strategy Lead author of the book “Symbian OS Platform Security” Chief Security Technologist at the Symbian Foundation Now providing independent security consultancy Set up Franklin Heath Ltd in November 2010 30 September 2011 3 © Franklin Heath Ltd
  • 4. Why We Need Application Security Bad guys are deploying malicious phone apps to defraud people for commercial gain Stealing virtual goods and credits Premium rate messaging fraud Phishing (e.g. banking MTANs) People need and expect their phones to be more trustworthy than their PCs have been Emergency calls Personal data (e.g. location, contacts, photos) 30 September 2011 4 © Franklin Heath Ltd
  • 5. Fraudulent Apps are Real 30 September 2011 5 © Franklin Heath Ltd
  • 6. Mobile Device Security and Privacy Does Matter Organised crime is monetising mobile vulnerabilities ZitMo in Europe, trojans in China and Russia Phone software platforms are becoming more uniform Easier to target a bigger “addressable market” Android market share increasing, iPhone steady But don’t forget “legacy” Symbian devices (still 100s of millions) Widespread privacy breaches are sensitising people e.g. Sony PlayStation Network WSJ coverage of bad practice in mobile applications 30 September 2011 6 © Franklin Heath Ltd
  • 7. Comparing Application Testing Apple and Google are two extremes of approach iTunes app store inspects every application and can reject for arbitrary reasons Good for consumers, bad for developers Android Market “common carrier” approach: pass though everything submitted, remove apps only if complaints made Good for developers, bad for consumers Symbian Signed did standardised third-party testing Middle ground, manages costs, but provides little defence against deliberate malware Note that Nokia app store adds additional manual QA inspection 30 September 2011 7 © Franklin Heath Ltd
  • 8. Comparing Application Signing Developer signing requirements vary Android: “self-signed”, free to create a certificate iPhone: Apple developer registration includes certificate cost Symbian Signed required a third-party, $200, certificate Signing party for “production” apps also varies iTunes, Amazon uses only an app store signature Android Market uses only the developer signature Symbian Signed uses only the certifier signature 30 September 2011 8 © Franklin Heath Ltd
  • 9. Comparing Copy Protection iTunes app store uses Apple proprietary FairPlay DRM Android Market doesn’t provide automatic copy protection, but Google provides libraries for developers to invoke a licence server Nokia app store has lightweight “forward lock” copy protection 30 September 2011 9 © Franklin Heath Ltd
  • 10. Opportunity: Put the User in Control Ways to benefit end user, not the vendor or operator Correcting “information asymmetries” to benefit consumers More usable control over personal information sharing Tools for the paranoid (or security professional ) Putting users in control of their own data and their own charges is the right thing to do But usability is key Don’t cause security prompt blindness Don’t put the responsibility on them as a cop-out 10 30 September 2011 © Franklin Heath Ltd
  • 11. Idea 1: Notarised Call Recording “Reciprocal Transparency” – who watches the watchers? When you call a utility company, do you hear “this call may be recorded”? it’s being recorded for their benefit, not yours Have you ever been told they will do something, but when you call back: “I’m sorry, I have no record of that”? probably they do, but you can’t prove it: information asymmetry Why isn’t this built in to my phone? Hypothesis: difficult to do legally in all jurisdictions? 30 September 2011 11 © Franklin Heath Ltd
  • 12. Idea 1: Notarised Call RecordingWhat can be done? Even a simple recording would help, with the call log but unlikely to be good enough evidence to use in court Could combine this with a “digital notary” take a hash of the recording (prevents future tampering) have the hash signed by a trusted third party with a time stamp proves that the recording was made at or before that time Make sure it’s legal in the UK Play a recorded announcement at the start? (= reciprocal) 30 September 2011 12 © Franklin Heath Ltd
  • 13. Idea 2: Premium Charge Warning Premium rate voice and SMS service providers in the UK are required by law to advise consumers of their charges in advance but they haven’t always done this is the most obvious way malware isn’t going to respect this In the UK, you can discover the charges with a free SMS (76787) also available as a web-based online number checker but I doubt many people use this regularly It would be much more useful if your phone did this for you operators may not like this (could discourage use of legitimate services) 30 September 2011 13 © Franklin Heath Ltd
  • 14. Idea 2: Premium Charge WarningWhat can be done? Filter to check numbers your phone is calling and texting, and warning before the call is placed if it’s premium rate “allow this application to spend 50p?” would be far more usable than “allow this application to make phone calls and send text messages?” Could be extended to enforce rules, e.g. allow this application to spend up to £5 allow this application to send 2 texts per day But, data isn’t easily available, and the hooks aren’t easily accessible on all phone platforms a “proof of concept” app could allow pressure to be brought 30 September 2011 14 © Franklin Heath Ltd
  • 15. Idea 2: Premium Charge WarningProof-of-concept Possibilities Screen-scraping of the PhonePayPlus number checker http://www.phonepayplus.org.uk/Number-Checker/Check-a-Number-Results.aspx?ncn=number Trapping the call/SMS before it’s sent On Android, ACTION_NEW_OUTGOING_CALL broadcast action allows voice calls to be intercepted No equivalent for SMS? Charge information for number ranges is available commercially Could it be a marketing opportunity for the holders to make it available for free in some way, limited to this purpose? Could it be made available as part of government Open Data? 30 September 2011 15 © Franklin Heath Ltd
  • 16. Idea 3: Trustworthy Viewport Typical desktop web commerce model is for the user to enter a password to confirm the transaction OK if the user confirms they are giving it to the payment provider and not to a “phishing” site Mobile browsers lack the visual security cues No room on a small screen for the window “chrome” Apps can draw on the entire display area Desktop model of entering password to authorize the transaction is dangerous on mobile 30 September 2011 16 © Franklin Heath Ltd
  • 17. Examples of Insecure Mobile Experience for In-App Payments 30 September 2011 17 © Franklin Heath Ltd
  • 18. Idea 3: Trustworthy ViewportWhat can be done? Have a “helper” app provide the UI for password entry Show the user something that a malicious app can’t e.g. Yahoo! “sign-in seal”, 3D Secure “Personal Assurance Message” Couple that with a clear indication of the origin of the view contents c.f. Internet Explorer highlighting the 2nd level domain, Firefox green background for EV server certificates, etc. Wrapper for Android WebView? 30 September 2011 18 © Franklin Heath Ltd
  • 19. Open Discussion… 30 September 2011 19 © Franklin Heath Ltd

Editor's Notes

  1. One of the two apps was on the official Android Market (the other on an “independent app store”)Dozens of cases of trojaned Android apps with estimated 100,000s downloads opening up remote C&C.
  2. Nokia store will now sign on your behalf (and issue UIDs and DevCerts) without requiring a Publisher ID for Express Signed capabilities.
  3. “Information asymmetry” is an economic term, referring to transactions in which one party has more, or better, information than the other.BTW, what’s not an opportunity is anti-virus software
  4. Commercial ($10) Android app “Total Recall”.
  5. Commercial ($10) Android app “Total Recall”.
  6. PhonePayPlus consultation doesn’t address deliberate fraud.
  7. Telcordia Mobile ID:http://www.telcordia.com/services/interconnection/mobile-id.html
  8. There is no law (or technology) that prevents malicious applications from drawing pictures of padlocks.