Android Security
Presentation By,
Midhun P G
8th Nov, 2013
WALK THROUGH
Android Basics
Introduction
Versions
Android Stack
Android Security Model
Application Sandboxing
Permission Model
What is an Android application?
Application Components
Manifest file
Requesting Permissions
Android more secure than IOS??
Multiple Layers of Android security
Android Malwares
How effective are mobile anti-viruses
Android Rooting
Android Market
Android Application Vulnerability Scanner Toolkit
Open Security issues in Android platform
Top 7 Vulnerabilities Android Application Developers May Jump Into
Android Basics
There are 4 billion mobile phones among 7 billion
people in the world
Android owns the crown among its competitors
The use of smartphones for financial transactions
and storing private information is increasing
Losing the mobile phone is more worse than
losing wallets
Securing the data residing in mobiles is of prime
importance.
Android uses a kind of UNIX sandboxing
method to run its applications
Applications uses IPC mechanisms to
communicate among each other
These IPC mechanisms uses concept of
endpoints
All the configuration parameters and the
security parameters of an application are
defined in a file called AndroidManifest.xml
ANDROID VERSIONS
ANDROID SOFTWARE STACK
Android Security Model
Unix Sandboxing
Each application have its own user name and
memory space
One app cannot access resources of other app
Android permission enforcement
Android permissions protect
- - Access to sensitive APIs
- - Access to content providers
- - Inter- and intra-application communication
What is an Android Application?
WHAT IS AN ANDROID
APPLICATION?
Android applications are composed of one or more
application components
Activities
Services
Broadcast
Receivers
Content Providers
Each component performs a different role in the
overall application behavior, and each one can be
activated individually (even by other applications)
The manifest file must declare all components in
the application and should also declare all
application requirements.
ACTIVITIES
SERVICES
BROADCAST RECEIVERS
CONTENT PROVIDERS
INTENTS & INTENT FILTERS
MANIFEST FILE
COMPONENT PERMISSION
Components can be made accessible to other
applications (exported) or be made private
Default
is private
Converted to public when component is registered to
receive an implicit intents
Components can be protected by permission
REQUESTING PERMISSIONS
Android more secure than IOS??
Eric Schmidt made a comment that Android is more secure than IOS.
The comment only prompted laughter from the crowd
Google backed up their chairman, stating that
only 0.001% of installed apps are malicious.
They provided data for it.
Multiple Layers of Android security
Android Malwares
Android Is Secure...Users Arent
Google can't count malware it doesn't see
Android has defenses...to protect itself, not your
data
Many of Android's defenses are bypassed with a
few taps, or by users
unauthorized
Rooting
What
else.. ?
sources
How effective are mobile anti-viruses?
No, Mobile Anti-Malware Utilities for Android
are Not Perfect, or Even the Same Protection You
Get on the Desktop
You can't just install a mobile security suite on
your Android phone and assume you'll be safe
regardless of what you do.
The real weapon you have against Android
malware is common sense.
How Do You Protect Yourself?
LEARN TO TELL IF AN ANDROID
APP IS MALWAREBEFORE YOU
INSTALL IT
Take a look at app store reviews
Pay attention to the permissions an app requests
Check the developer's other apps
Don't install applications from unusual or
suspicious sources
Keep a close watch on SMS and data activity
ANDROID ROOTING
Android rootingis the process of allowing users
ofsmartphones,tablets, and other devices
running theAndroidmobile operating systemto
attainprivileged control(known as "root access")
within Android's subsystem.
GENERAL ROOTING TERMS
Root
ROM
Kernel
Flash
Brick
Bootloader
Recovery
ADB
"Rooting" vs. "jailbreaking"
In the tightly-controlled iOS world, technical
restrictions prevent
installing
or booting into a modified or entirely new
operating system (a "locked bootloader" prevents this)
sideloadingunsigned applications onto the device
user-installed apps from having root privileges (and
are run in a securesandboxedenvironment)
Bypassing all these restrictions together
constitute the expansive term "jailbreaking" of
Apple devices
Android Market
OPEN SECURITY ISSUES IN
ANDROID PLATFORM
OPEN SECURITY ISSUES
Malicious Applications
Rooting Exploits
SMS Fraud
Rapid Malware Production
Dynamic Analysis
Sandbox
Real-time Monitoring
Mobile Specific Features
Static Analysis
Permissions
Data Flow
Control Flow
Browser Attacks
Phishing
Click Through
Mobile Botnets
Epidemic Spread
Attacking Network Services
Tracking Uninfected Devices
User Education
Ignoring Permissions
Phishing
Improperly Rooting Devices
Alternative Markets
OTHER OPEN PROBLEMS
Hard to separate malicious code from benign
Poor Application Verification
Obfuscation
Dynamic code loading
Limited availability of tools
Repackaging
Resources for Understanding Android Security
TOP 7 VULNERABILITIES ANDROID
APPLICATION DEVELOPERS JUMP
INTO
Unauthorized Intent Receipt
Intent Spoofing
Insecure Storage
Insecure Network Communication
SQL Injection
Over Privileged Applications
Persistent Messages: Sticky Broadcasts
SOME SOLUTIONS
Bouncer
Taintdroid
Droidbox
Mercury Framework
Androguard
Apktool
Dex2Jar
Dexdump
and much more
ANDROID APPLICATION
VULNERABILITY SCANNER
TOOLKIT
Vulnerabilities in Android applications
Intent
Spoofing (Confused-deputy Vulnerability)
Insecure Storage (Cross-application Data Stealing
Vulnerability)
Over Privileged Applications
Debuggable Applications
No tool available for finding and fixing
vulnerabilities in Android applications
Sensitive user data is getting leaked due to
insecure applications
http://securityresearch.in/index.php/mobile/andro
id-application-vulnerability-scanner-toolkit
SOME TIPS TO KEEP YOUR DATA
SECURE
Always use encryption (whatsapp)
Never download apps from unsolicited emails and
texts (malware)
Always check apps permissions (confused-deputy
attacks, malware)
Monitor your data and messages