26
Vulnerability Study of the Android Ryan Selley, Swapnil Shinde, Michael Tanner, Madhura Tipnis, Colin Vinson (Group 8)

Android Vulnerability Study

  • Upload
    him7827

  • View
    116

  • Download
    5

Embed Size (px)

Citation preview

Page 1: Android Vulnerability Study

Vulnerability Study of the Android

Ryan Selley, Swapnil Shinde, Michael Tanner, Madhura Tipnis, Colin Vinson

(Group 8)

Page 2: Android Vulnerability Study

 

Page 3: Android Vulnerability Study

Overview

• Architecture of the Android• Scope of Vulnerabilities for the Android• Known Vulnerabilities for the Android• General Vulnerabilities of Mobile Devices• Organizations Supporting the Android

Page 4: Android Vulnerability Study

Architecture

• It is a software stack which performs several OS functions. • The Linux kernel is the base of the software stack.  

 •  Core Java libraries are on the same level as other libraries.

 •  The virtual machine called the Dalvik Virtual Machine is on

this layer as well.

• The application framework is the next level. 

Page 5: Android Vulnerability Study
Page 6: Android Vulnerability Study

Parts of Applications

• ActivityAn activity is needed to create a screen for a user application. 

 • Intents

Intents are used to transfer control from one activity to another. • Services

It doesn't need a user interface. It continues running in the background with other processes run in the foreground.

Page 7: Android Vulnerability Study

 

• Content Provider

This component allows the application to share information with other applications.

Page 8: Android Vulnerability Study

Security Architecture - Overview

Page 9: Android Vulnerability Study

Scope of Vulnerabilities

Refinements to MAC Model

• Delegation• Public and Private Components• Provision - No Security Access to Public Elements• Permission Granting Using User's Confirmation

   Solutions ???          Precautions by Developers Special Tools for Users

Page 10: Android Vulnerability Study

Known Vulnerabilities

• Image Vulnerablitieso GIFo PNGo BMP

• Web Browser

Page 11: Android Vulnerability Study

GIF Image Vulnerability

• Decode function uses logical screen width and height to allocate heap

• Data is calculated using actual screen width and height• Can overflow the heap buffer allowing hacker can allow a

hacker to control the phone

Page 12: Android Vulnerability Study

PNG Image Vulnerability

• Uses an old libpng file• This file can allow hackers to cause a Denial of Service

(crash)

Page 13: Android Vulnerability Study

BMP Image Vulnerability

• Negative offset integer overflow• Offset field in the image header used to allocate a palette• With a negative value carefully chosen you can overwrite

the address of a process redirecting flow

Page 14: Android Vulnerability Study

Web Browser Vulnerability

• Vulnerability is in the multimedia subsystem made by PacketVideo

• Due to insufficient boundary checking when playing back an MP3 file, it is possible to corrupt the process's heap and execute arbitrary code on the device

• Can allow a hacker to see data saved on the phone by the web browser and to peek at ongoing traffic

• Confined to the "sandbox"

Page 15: Android Vulnerability Study

General Mobile Phone Vulnerabilities

• GSMo SMSo MMS

• CDMA• Bluetooth• Wireless vulnerabilities

Page 16: Android Vulnerability Study

GSM Vulnerabilities

• GSMo Largest Mobile network in the worldo 3.8 billion phones on network

• David Hulton and Steve Mullero Developed method to quickly crack GSM encryptiono Can crack encryption in under 30 secondso Allows for undetectable evesdropping

• Similar exploits available for CDMA phones

Page 17: Android Vulnerability Study

SMS Vulnerabilities

• SMSo Short Messaging Systemo Very commonly used protocolo Used to send "Text Messages"

• GSM uses 2 signal bands, 1 for "control", the other for "data".

• SMS operates entirely on the "control" band.• High volume text messaging can disable the "control" band,

which also disables voice calls.• Can render entire city 911 services unresponsive.

Page 18: Android Vulnerability Study

MMS Vulnerabilities

• MMSo Unsecure data protocol for GSMo Extends SMS, allows for WAP connectivity

• Exploit of MMS can drain battery 22x fastero Multiple UDP requests are sent concurrently, draining the

battery as it responds to request• Does not expose data• Does make phone useless

Page 19: Android Vulnerability Study

Bluetooth Vulnerabilities

• Bluetootho Short range wireless communication protocolo Used in many personal electronic deviceso Requires no authentication

• An attack, if close enough, could take over Bluetooth device.• Attack would have access to all data on the Bluetooth

enabled device• Practice known as bluesnarfing

Page 20: Android Vulnerability Study

Organizations Supporting Android

• Google• Open Handset Alliance• 3rd Parties (ex: Mocana) • Users• Hackers

Page 21: Android Vulnerability Study

Organizations Supporting Android

 

Page 22: Android Vulnerability Study

Open Handset Alliance

 

Page 23: Android Vulnerability Study

Open Handset Alliance

Objective:        To build a better mobile phone to enrich       the lives of countless people across the globe.

Page 24: Android Vulnerability Study

3rd Party Partners

Mocana -- NanoPhone• Secure Web Browser• VPN• FIPS Encryption• Virus & Malware Protection• Secure Firmware Updating• Robust Certificate Authentication

   

Page 25: Android Vulnerability Study

Hackers for Android

• Hackers make Android stronger• White hats want to plug holes• Example

o Browser Threat reported by Independent Security Evaluators

o Jailbreak hole fixed by Google over-the-air   

Page 26: Android Vulnerability Study

Conclusion

• Android is New & Evolving• Openness of Android

o Good in the long-runo Strong Community

• Robust Architecture• Powerful Computing Platform