150 likes | 293 Views
Usable Security for Smartphones. Cynthia Kuo Senior Researcher October 26, 2010. Many Development Platforms. Worldwide Smartphone Sales to End Users by Operating System in 2Q10. Coming soon… Windows Phone 7 MeeGo (Maemo + Moblin) BlackBerry Tablet OS.
E N D
Usable Security for Smartphones Cynthia KuoSenior ResearcherOctober 26, 2010
Many Development Platforms Worldwide Smartphone Sales to End Users by Operating System in 2Q10 Coming soon… Windows Phone 7 MeeGo (Maemo + Moblin) BlackBerry Tablet OS http://www.gartner.com/it/page.jsp?id=1421013
A Few Usable Security Topics in Smartphones • Better application permissions models • Using smartphones for authentication • Better models for website authentication • Phone-friendly CAPTCHAs • Lost or stolen devices / data backup and restoration
Application Permissions: Threat Model PC • Many users share the same machine • Protect usersfrom one another • Implement access control on users’ data • Smartphone • One user, one device • Users may install malicious applications • Protectprocesses from one another • Implement access control on resources • Protect business model Company Confidential
Application Permissions: Symbian • Symbian signed • Application has passed certain tests and is signed against a certificate • Signed installation package contains a list of the application’s capabilities Company Confidential 5 Company Confidential
Application Permissions: Symbian • Self-signed • Has no capabilities • User can grant capabilities • Blanket • Installation time • One-shot • When the requiring action takes place
Application Permissions: BlackBerry • Resource grant during installation and first start • Configurable through menu • May also be configured by administrator through BlackBerry Enterprise Server • Application installation • Application permissions • Data that application can access Company Confidential
Application Permissions: iPhone • Codesigning used for certifying applications that pass app store requirements • All apps need to be signed by Apple's private key(s) to run on (non-jailbroken) iPhone • Password demonstrates user’s intent to install • No options or requests for resource access Company Confidential
Application Permissions: Android • Applications are self-signed • Used for continuity (package updates) and integrity • Android’s blanket grant during installation • 112 Google-defined permissions • Developers can define their own permissions to expose APIs to other applications Content from David Barrera Company Confidential
Using Smartphones for Authentication [ Coming up next! ]
Better CAPTCHAs? Alex Smolen, Becky Hurwitz, Dhawal Mujumdar, UC Berkeley i213 Spring 2010 Project
Lost or Stolen Devices / Data Backup and Restoration • When your phone is your primary device, what happens when you lose it? Company Confidential
Summary: A Few Usable Security Topics • Better application permissions models • Using smartphones for authentication • Better models for website authentication • Phone-friendly CAPTCHAs • Lost or stolen devices / data backup and restoration
Thank You cynthia.kuo@nokia.com