SlideShare uma empresa Scribd logo
1 de 18
NOWSECURE
PROJECT
Collins,
Stacey D
Defersha,
Endale A
Jacobson,
Rhiannon
N
Peterka,
Joseph D
Spring 2022
WHAT TYPE OF PATTERN OF
SECURITY RISK OR MALWARE
DID YOU ATTEMPT TO FIND?
SUMMARY IN REVIEW
• 1007 distinct apps associated to 79 distinct countries.
• 207 (20.6%) of apps have key size vulnerabilities.
• There was no significant difference in key size vulnerabilities based on geographic
region from which the app originated.
BACKGROUND
Use of a digital signature is important for users of applications to know the data
being transferred is coming from the correct users.
Appropriate key sizes, as well as other cryptographic based security measures,
are necessary in protecting information, specifically for apps that deal with
sensitive information.
In the NowSecure provided data, Apps that have a key size vulnerability have a
keysize_check variable value equal to True.
If keysize_check is True, then the app uses a weak key size which could lead to
forged digital signatures, and if False then no such vulnerability was found.
Please note that a True value does not indicate that a digital signature has been forged, but simply that the
vulnerability exists within the application that could lead to a forgery
SECURITY ISSUES RELATED TO
THE KEY SIZE
dependent variable:
• keysize_check
Independent variables:
• secure_random_check
• change_cipher_spec_check
• certificate_validity_check
• sqlcipher_key_leakage_check
HOW DID YOU GO ABOUT
FINDING THIS SECURITY RISK
ACROSS ALL
THE NOWSECURE APPS?
APPROACH
• Conducted two phases of Experiments
 Model 1) Using 2 of the proposed independent variables
• secure_random_check
• sqlcipher_key_leakage_check
 two were removed because they didn't vary - all values were false
• change_cipher_spec_check
• certificate_validity_check
 Model 2) Including all variables with chi-sq p-value <0.25
CHI-SQ TABLE
Variable Name Chi-Sq p-value DF
secure_random_check 4.59 0.032 1
sends_sms_check 2.58 0.109 1
dirtycow_check 1.99 0.158 1
javascript_interface_check 1.87 0.171 1
allow_backup_check 1.81 0.179 1
decode_apk_check 1.65 0.199 1
publisher_global_location 3.85 0.427 4
auto_generated_screenshots_check 0.41 0.520 1
application_overprivileged_check 0.26 0.611 1
sqlcipher_key_leakage_check 0.26 0.612 1
decompile_apk_check 0.22 0.640 1
get_reflection_code 0.07 0.787 1
obfuscation_check 0.07 0.787 1
okhttp_vuln_check 0.01 0.905 1
dynamic_code_loading_check 0.00 0.979 1
certificate_validity_check 0.00 1.000 0
change_cipher_spec_check 0.00 1.000 0
debug_flag_check 0.00 1.000 0
extract_lib_info 0.00 1.000 0
get_native_methods 0.00 1.000 0
heartbleed_check 0.00 1.000 0
master_key_check 0.00 1.000 0
STEPS
looked at the odds ratios of the vulnerabilities in the independent variables to quantify the size of the relationship
between the independent vulnerabilities and the key size vulnerability
Is vulnerability in one independent variable significantly
more likely to experience a key size vulnerability?
The odds ratios will allow us to quantify the size of that
likelihood
examined the output of the model to determine which independent variables are significant in relation to the dependent
variable, and which, if any, are not
created a logistic regression model to examine relationship between our dependent and independent variables
Results from Experiment 1
Results from Experiment 2
ODDS RATIOS COMPARISON
MODEL 1
Variable Name OR (CI)
secure_random_check 1.68 (1.07, 2.66) *
sqlcipher_key_leakage_check 0.68 (0.23, 1.98)
* = odds ratio significantly different from 1
MODEL 2
Variable Name OR (CI)
dirtycow_check 1.50 (0.90, 2.51)
sends_sms_check 1.64 (0.87, 3.10)
decode_apk_check 0.30 (0.06, 1.50)
allow_backup_check 0.78 (0.57, 1.07)
secure_random_check 1.82 (1.14, 2.90) *
javascript_interface_check 1.34 (0.89, 2.03)
* = odds ratio significantly different from 1
WHAT DID YOU FIND? DO YOU HAVE A
LIST OF INSECURE APPS? OR PATTERNS
OF INSECURE LIBRARIES OR OTHER
ASPECTS OF APPS?
FINDINGS
• Only secure_random_check was significant
• Model1
• odds ratio of 1.68 (95% CI 1.07 - 2.66)
• Model 2
• odds ratio of 1.82 (95% CI 1.14 - 2.90)
• Country Association
• 1007 applications – representing 48 categories and developed across 79 distinct countries
• 57 apps were unable to be logically associated to a country of origin
• A unique trend by location was found to be insignificant
Total Apps Vulnerable Keysize %
Africa 15 1 6.7%
Americas 333 63 18.9%
Asia 386 85 22.0%
Europe 163 48 29.4%
Oceania 13 3 23.1%
DO YOU THINK THERE ARE ANY
IMPLICATIONS OF WHAT YOU’VE FOUND? IS
IT NOVEL? IS IT WORTH OTHERS CHECKING
ON THE APPS OR OTHER FINDINGS YOU
HAVE?
IMPLICATIONS
• Model1:odds ratio of 1.68 (95% CI 1.07 - 2.66)
• apps that have a secure_random_check vulnerability
are 1.68 times as likely to also have a keysize_check
vulnerability than those apps that do not have a
secure_random_check vulnerability
• Model 2 : odds ratio of 1.80 (95% CI 1.14 - 2.90)
• apps that have
a secure_random_check vulnerability are 1.80 times as
likely to also have a keysize_check vulnerability than
those apps that do not have
a secure_random_check vulnerability
• Country Attribution
• Associating Apps to Country of Origin
• Global Associations
THE END

Mais conteúdo relacionado

Semelhante a NS-Presentation-v2.pptx

Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019Ivanti
 
PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?Black Duck by Synopsys
 
Software engineering
Software engineeringSoftware engineering
Software engineeringGuruAbirami2
 
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...Denim Group
 
Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Cenzic
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive softwareAlan Tatourian
 
The Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber IntelligenceThe Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber IntelligenceTieu Luu
 
Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks Ahmed Sherif
 
Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security MetricsCigital
 
Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...Ann Marie Neufelder
 
Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...Ann Marie Neufelder
 
Zero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedZero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedAshley Zupkus
 
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareBlackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareTyler Shields
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools usedZoe Gilbert
 
One login enemy at the gates
One login enemy at the gatesOne login enemy at the gates
One login enemy at the gatesEoin Keary
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management SystemIRJET Journal
 

Semelhante a NS-Presentation-v2.pptx (20)

Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019
 
Software testing
Software testingSoftware testing
Software testing
 
Cost effective cyber security
Cost effective cyber securityCost effective cyber security
Cost effective cyber security
 
PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
 
Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive software
 
The Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber IntelligenceThe Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber Intelligence
 
Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks
 
Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security Metrics
 
Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...
 
Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
Zero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedZero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically Guaranteed
 
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareBlackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
 
J034057065
J034057065J034057065
J034057065
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
 
One login enemy at the gates
One login enemy at the gatesOne login enemy at the gates
One login enemy at the gates
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 

Último

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 

Último (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 

NS-Presentation-v2.pptx

  • 2. WHAT TYPE OF PATTERN OF SECURITY RISK OR MALWARE DID YOU ATTEMPT TO FIND?
  • 3. SUMMARY IN REVIEW • 1007 distinct apps associated to 79 distinct countries. • 207 (20.6%) of apps have key size vulnerabilities. • There was no significant difference in key size vulnerabilities based on geographic region from which the app originated.
  • 4. BACKGROUND Use of a digital signature is important for users of applications to know the data being transferred is coming from the correct users. Appropriate key sizes, as well as other cryptographic based security measures, are necessary in protecting information, specifically for apps that deal with sensitive information. In the NowSecure provided data, Apps that have a key size vulnerability have a keysize_check variable value equal to True. If keysize_check is True, then the app uses a weak key size which could lead to forged digital signatures, and if False then no such vulnerability was found. Please note that a True value does not indicate that a digital signature has been forged, but simply that the vulnerability exists within the application that could lead to a forgery
  • 5. SECURITY ISSUES RELATED TO THE KEY SIZE dependent variable: • keysize_check Independent variables: • secure_random_check • change_cipher_spec_check • certificate_validity_check • sqlcipher_key_leakage_check
  • 6. HOW DID YOU GO ABOUT FINDING THIS SECURITY RISK ACROSS ALL THE NOWSECURE APPS?
  • 7. APPROACH • Conducted two phases of Experiments  Model 1) Using 2 of the proposed independent variables • secure_random_check • sqlcipher_key_leakage_check  two were removed because they didn't vary - all values were false • change_cipher_spec_check • certificate_validity_check  Model 2) Including all variables with chi-sq p-value <0.25
  • 8. CHI-SQ TABLE Variable Name Chi-Sq p-value DF secure_random_check 4.59 0.032 1 sends_sms_check 2.58 0.109 1 dirtycow_check 1.99 0.158 1 javascript_interface_check 1.87 0.171 1 allow_backup_check 1.81 0.179 1 decode_apk_check 1.65 0.199 1 publisher_global_location 3.85 0.427 4 auto_generated_screenshots_check 0.41 0.520 1 application_overprivileged_check 0.26 0.611 1 sqlcipher_key_leakage_check 0.26 0.612 1 decompile_apk_check 0.22 0.640 1 get_reflection_code 0.07 0.787 1 obfuscation_check 0.07 0.787 1 okhttp_vuln_check 0.01 0.905 1 dynamic_code_loading_check 0.00 0.979 1 certificate_validity_check 0.00 1.000 0 change_cipher_spec_check 0.00 1.000 0 debug_flag_check 0.00 1.000 0 extract_lib_info 0.00 1.000 0 get_native_methods 0.00 1.000 0 heartbleed_check 0.00 1.000 0 master_key_check 0.00 1.000 0
  • 9. STEPS looked at the odds ratios of the vulnerabilities in the independent variables to quantify the size of the relationship between the independent vulnerabilities and the key size vulnerability Is vulnerability in one independent variable significantly more likely to experience a key size vulnerability? The odds ratios will allow us to quantify the size of that likelihood examined the output of the model to determine which independent variables are significant in relation to the dependent variable, and which, if any, are not created a logistic regression model to examine relationship between our dependent and independent variables
  • 12. ODDS RATIOS COMPARISON MODEL 1 Variable Name OR (CI) secure_random_check 1.68 (1.07, 2.66) * sqlcipher_key_leakage_check 0.68 (0.23, 1.98) * = odds ratio significantly different from 1 MODEL 2 Variable Name OR (CI) dirtycow_check 1.50 (0.90, 2.51) sends_sms_check 1.64 (0.87, 3.10) decode_apk_check 0.30 (0.06, 1.50) allow_backup_check 0.78 (0.57, 1.07) secure_random_check 1.82 (1.14, 2.90) * javascript_interface_check 1.34 (0.89, 2.03) * = odds ratio significantly different from 1
  • 13. WHAT DID YOU FIND? DO YOU HAVE A LIST OF INSECURE APPS? OR PATTERNS OF INSECURE LIBRARIES OR OTHER ASPECTS OF APPS?
  • 14. FINDINGS • Only secure_random_check was significant • Model1 • odds ratio of 1.68 (95% CI 1.07 - 2.66) • Model 2 • odds ratio of 1.82 (95% CI 1.14 - 2.90) • Country Association • 1007 applications – representing 48 categories and developed across 79 distinct countries • 57 apps were unable to be logically associated to a country of origin • A unique trend by location was found to be insignificant
  • 15. Total Apps Vulnerable Keysize % Africa 15 1 6.7% Americas 333 63 18.9% Asia 386 85 22.0% Europe 163 48 29.4% Oceania 13 3 23.1%
  • 16. DO YOU THINK THERE ARE ANY IMPLICATIONS OF WHAT YOU’VE FOUND? IS IT NOVEL? IS IT WORTH OTHERS CHECKING ON THE APPS OR OTHER FINDINGS YOU HAVE?
  • 17. IMPLICATIONS • Model1:odds ratio of 1.68 (95% CI 1.07 - 2.66) • apps that have a secure_random_check vulnerability are 1.68 times as likely to also have a keysize_check vulnerability than those apps that do not have a secure_random_check vulnerability • Model 2 : odds ratio of 1.80 (95% CI 1.14 - 2.90) • apps that have a secure_random_check vulnerability are 1.80 times as likely to also have a keysize_check vulnerability than those apps that do not have a secure_random_check vulnerability • Country Attribution • Associating Apps to Country of Origin • Global Associations

Notas do Editor

  1. Endale
  2. Endale
  3. Rhiannon
  4. Joseph 
  5. Stacy
  6. Endale
  7. Stacy
  8. Stacy
  9. Rhiannon
  10. Stacy
  11. Stacy
  12. Stacy
  13. Endale
  14. Stacy & Joseph 
  15. Joseph 
  16. Endale 
  17. Stacy and Joseph 
  18. Joseph