02.06.2013 Views

Editor's note

Editor's note

Editor's note

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

of how long it’s expected to be. The result for the user is<br />

the potentially useful compromise of being able to enter<br />

a longer passcode, but without having to resort to the<br />

potentially fiddly alphabetic keyboard to do so.<br />

Let Me Through, I’m An Impostor!<br />

Having enabled a lock of some kind, there is also the<br />

question of what people can still get to without needing<br />

to be authenticated. As shown in Figures 2 and 3, it is<br />

standard practice for emergency calls to still be possible<br />

from a locked device, but this is often not the only feature.<br />

For example, the recent launch of the iPhone 4S was<br />

followed by criticism that its Siri personal assistant was<br />

still active with the phone locked (Newman, J. 2011. Siri’s<br />

Security Hole: The Passcode Is the Problem, PCWorld,<br />

20 October 2011. http://www.pcworld.com/article/242253/<br />

siris_security_hole_the_passcode_is_the_problem.html).<br />

This is actually similar to what earlier iPhone users would<br />

find with the normal ‘voice control’ feature, which (unless<br />

disabled in the settings) allowed access to the phonebook<br />

to make calls or to the music library to play tracks. The<br />

difference with Siri was that it exposed a much greater<br />

range of functionality, such as the ability to send texts and<br />

emails, while the phone was otherwise still locked. In no<br />

sense was it a security oversight, as the iOS settings offer<br />

an explicit option for whether Siri should still be accessible<br />

when the phone is locked, but criticism could be leveled for<br />

making this the default configuration. This again highlights<br />

the balancing act that’s required in terms what should be<br />

left accessible for the convenience of the owner, versus<br />

what needs to be kept off-limits for their protection. For<br />

example, regardless of Siri, the iOS lock screen still allows<br />

the camera to be used or music to be played, so you<br />

could conceivably take unwanted photos and fill up the<br />

phone’s memory, or have an uninvited nose through the<br />

user’s music collection. Of course, neither of these are<br />

necessarily major risks in the grand scheme of things, but<br />

it’s also notable that the owner doesn’t have a choice to<br />

disable the features and lock off the phone completely.<br />

In addition to potential configuration weaknesses,<br />

there are sometimes genuine implementation<br />

vulnerabilities waiting to be exploited. In fact, one such<br />

example was publicised while this very article was<br />

being written, with an iOS vulnerability that allowed<br />

the passcode to be bypassed on an iPad 2. The exploit<br />

basically involved holding down the power button until<br />

slide to power off appeared, then closing the Smart<br />

Cover, re-opening it and selecting ‘Cancel’ (9to5Mac.<br />

2011. Anyone with a Smart Cover can break into your<br />

iPad 2, 20 October 2011. http://9to5mac.com/2011/10/<br />

20/anyone-with-a-smart-cover-can-break-into-youripad-2/).<br />

Doing so appeared to unlock the device and<br />

give an impostor access to whatever was on the screen<br />

starterkit 02/2011(2)<br />

MOBILE PENTESTING<br />

before it was locked. If the user had been running<br />

an app, then the impostor could see (and to some<br />

extent interact with) whatever was left on view. So,<br />

for example, if Mail was open, an impostor could look<br />

through the messages, or perhaps merrily go looking<br />

at web history in Safari. Alternatively, if the iPad had<br />

been left on the home screen, then the impostor could<br />

browse around and see what was installed. Trying to<br />

run an app quickly revealed that nothing would actually<br />

launch, as the device was still semi-locked, but some<br />

things could still be done to compromise both the<br />

integrity and confidentiality of the device. Specifically,<br />

apps could be deleted, and the search screen could still<br />

be used, with the results list from the latter potentially<br />

giving access to a wealth of confidential tidbits including<br />

contacts, schedule entries, and messages.<br />

Conclusions<br />

It is clear from many of the observations that our<br />

opportunities to protect mobile devices have not kept<br />

pace with the ways in which we’re now able to use<br />

them. The positive news is that there are now signs<br />

of this changing, with attention being given towards<br />

point-of-entry (PoE) approaches that people may feel<br />

more inclined to use. In addition, ongoing research is<br />

considering composite, non-intrusive approaches that<br />

have the potential to provide a measure of protection<br />

beyond the PoE judgement (Furnell, S., Clarke, N. and<br />

Karatzouni, S. 2008. Beyond the PIN: Enhancing user<br />

authentication for mobile devices, Computer Fraud &<br />

Security, August 2008, pp12-17). However, the level<br />

of protection that can be achieved on some devices<br />

will still lag behind what can be done on a full desktop<br />

system, and so if really sensitive data is at stake there<br />

remains a question of whether it ought to find its way<br />

onto a mobile device in the first place.<br />

PROF. STEVEN FURNELL<br />

Prof. Steven Furnell is the head of the Centre for Security,<br />

Communications &Network Research at Plymouth University<br />

in the United Kingdom, and an Adjunct Professor with Edith<br />

Cowan University in Western Australia. His interests include<br />

security management and culture, computer crime, user<br />

authentication, and security usability. Prof. Furnell is active<br />

within three working groups of the International Federation<br />

for Information Processing (IFIP) – namely Information<br />

Security Management, Information Security Education, and<br />

Human Aspects of Information Security & Assurance. He is the<br />

author of over 210 papers in refereed international journals<br />

and conference proceedings, as well as books including<br />

Cybercrime: Vandalizing the Information Society (2001) and<br />

Computer Insecurity: Risking the System (2005). Further<br />

details can be found at www.plymouth.ac.uk/cscan.<br />

Page 22 http://pentestmag.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!