210 likes | 476 Views
Security and Trust in Mobile Devices. Abdulrhman Alkhanifer Ricardo Figueroa. DEVICES - Introduction. Mobile devices serve as access points to data stored either locally or in some remote server. Currently there are 5.3 billion mobile users around the world (77% of the world population) 1 .
E N D
Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa
DEVICES - Introduction • Mobile devices serve as access points to data stored either locally or in some remote server. • Currently there are 5.3 billion mobile users around the world (77% of the world population)1 . • How many of them are smartphones? 1 [International Telecommunication Union (October 2010), mobiThinking, http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats]
DEVICES - Smartphone Market Share 1 [Worldwide Mobile Communications Device Open OS Sales to End Users by OS, Gartner, http://www.gartner.com/it/page.jsp?id=1622614]
DEVICES - Why is it important to think about Security and Trust? • Mobile devices are “single user OS” which is very different from laptop or desktop OS’s security point of view. • Most mobile users do not realize the potential risk of exposing information, or identity theft. • Mobile devices serve as access points to personal and/or corporate information and are more accessible than laptop or desktop computers.
ACCESS - Physical Access • PIN number typically of 4-6 numbers. • A 4-digit pin number requires 10000 tries (using brute force attack) which is not impossible! • Password. • Auto-lock feature. • iPad 2 issue before iOS 5 and smart cover • Some users do not use PIN number or password. • Easy to break a 4-digit PIN number by eavesdropping.
ACCESS - Internet and Wireless Access • Bluetooth Attacks1: • Bluesnarfing(2003-2004) • Bluebugging • Bluejacking • Denial of service (DoS) 1 [A menu of Bluetooth attacks, Governoment Computer News, http://gcn.com/Articles/2005/07/20/A-menu-of-Bluetooth-attacks.aspx]
ACCESS – GSM Security Features • GSM encryption mechanism is based on a symmetric stream cipher. • The key for encryption is established as part of the authentication protocol. • 64-bit A5/1 GSM encryption1. • 128-bit A5/3 GSM encryption [2007]. • 4G (LTE): 128-bit AES, or 128-bit SNOW 3G2. 1 [KarstenNohl, 1988, http://www.engadget.com/2009/12/29/gsm-call-encryption-code-cracked-published-for-the-whole-world/] 2 [Security in the LTE-SAE Network, documentation, Agilent Technologies, http://www.home.agilent.com/upload/cmc_upload/All/Security_in_the_LTE-SAE_Network.PDF?&cc=US&lc=eng]
ACCESS - 3G Encryption • Is the data transmitted over 3G/4G network secure? • “Israel's Weizmann Institute of Science went ahead and cracked the KASUMI system -- a 128-bit A5/3 algorithm implemented across 3G networks -- in less than two hours”1,2 . 1 [3G GSM encryption cracked in less than two hours, engadget, Jan 2010, http://www.engadget.com/2010/01/15/3g-gsm-encryption-cracked-in-less-than-two-hours/] 2 [3G encryption can be broken in 2 hours, 'suggest' security experts, http://www.fiercewireless.com/europe/story/3g-encryption-can-be-broken-2-hours-suggest-security-experts/2010-01-15]
ACCESS - Blackberry • Uses BlackBerry1 OS. • Every Phone has a BlackBerry PIN (8 hexadecimal Number). • BlackBerry uses Standard, Triple DES and AES encryption schemes2. • Issues in some countries: • India: In January 2011, RIM gave India access to its consumer services, including its Messenger services, but said it could not allow monitoring of its enterprise email. • Saudi Arabia: Saudi Arabia has threatened to ban the service, but reportedly it was close to reaching an agreement with RIM to set up a server for the service inside the Kingdom. • UAE: In October 2010, UAE tried to ban the service requesting to bring servers inside the country, however their request was denied. Later, blackberry services were back. 1 [http://en.wikipedia.org/wiki/BlackBerry] 2 [http://docs.blackberry.com/en/admin/deliverables/12873/Standard_BlackBerry_message_encryption_193608_11.jsp]
ACCESS - Privacy: Geotagging • Adding geographical identification to photographs, video, websites and SMS messages. • It is the equivalent of adding a 10-digit grid coordinate to everything you post on the internet1. • In some smartphones this information is embedded with every picture taken by that device. • Many social applications allow users to share their location (Facebook, Twitter, Flicker, etc.). 1 [http://www.slideshare.net/NavalOPSEC/geotagging-safety]
ACCESS - Is Geotagging potentially dangerous? • It can establish personal patterns. It could potentially be easy to identify a user’s daily routine and times. • Exposing home and work addresses.
ACCESS – Geotagging: Example1 • Adam Savage, of “Myth Busters”,took a photo using his phone and posted it on his Twitter account with “off to work” as the message. • His photo contained metadata revealing the exact geographical location of his house. 1 [Web Photos That Reveal Secrets, Like Where You Live , August 11, 2010, The NY Times, http://www.nytimes.com/2010/08/12/technology/personaltech/12basics.html?pagewanted=all]
ACCESS - Privacy: Custom Profiling • Malls used phones signals to track shoppers on black Friday1. • Could lead to spam advertisement. 1 [http://money.cnn.com/2011/11/22/technology/malls_track_cell_phones_black_friday/index.htm]
Recommendations on how to better protect your data • Use password and auto-lock feature. • Do not auto save passwords in applications. • Do not let your mobile device out of your sight. • Make sure that your phone OS and apps are updated. • Try not to use un-secure wireless hotspots. • Encryption on local drive and external flash drives: • Windows mobile: SecuBox, 3rd party application1. • Android: Droid Crypt, AnDisk Encryption, 3rd party uses AES 128-bit2. • iPhone: no apps available yet, some apps for encrypting voice calls and messages. • Blackberry: offers “content protection” that encrypts all data in the device4. • Subscribe with remote wipe (if available). • Possible newer security methods like Picture Password3. 1 [http://www.aikosolutions.com] 2 [http://www.pcworld.com/article/242650/how_to_encrypt_your_smartphone.html] 3 [http://blogs.msdn.com/b/b8/archive/2011/12/16/signing-in-with-a-picture-password.aspx] 4 [http://docs.blackberry.com/en/smartphone_users/deliverables/1487/About_content_protection_29009_11.jsp]