8. Security of Mobile Devicesfinancial profit. Given the importance of the problem, significant researchefforts have been invested in gaining a better understanding of the mobilemalware phenomenon. However, given the rate at which mobile malware isgrowing, it seems we are still a long way from solving the problem, and wemust hope we are not already of time.It is important to point out that understanding is not a mere academicexercise: it is of paramount importance to acquire the knowledge necessary tocharacterize a specific threat, in order to devise novel, effective, and efficienttechniques for detection and mitigation.8.1 Who Is Going to Be Affected?The consequences of infected mobile devices will affect all users alike. Smartphoneshave now become ubiquitous, and they are a constant presence inalmost every household. However, we currently lack flexible and efficient policiesto regulate private-to-enterprise bring-your-own-device (BYOD) contexts,just to give an example. How can we effectively implement evasion-resistanttechniques for information leakage detection? How can we detect, mitigate, orcontain unknown malicious behaviors?8.2 What Is Expected to Happen?Even in a non-BYOD scenario, the compromise of a smartphone can be catastrophic.Apart from breaches of user privacy (e.g., access to address <strong>book</strong>s andGPS coordinates) [416], monetization through premium SMS and calls [416],and colluding malware to bypass 2-factor authentication schemes [150, 231], asnoted above, this may also ultimately turn an infected smartphone into a realmobile bot, with serious consequences (see for instance Chapter 11) [8].Although the mobile malware harvested recently on a major US cellularprovider by the research community over a 3-month period in 2012 appearsin a very limited number of devices (3,492 out of over 380 million—less than0.0009% [253]), forecasts for 2013 are not looking good. According to Lookout2013 Mobile Threat P<strong>red</strong>ictions, “[...] people will purchase more than 1.2 billionmobile devices, surpassing PCs as the most common Internet access device in theworld. Mobile platforms will continue to expand at breakneck speed, as people areforecast to download over 70 billion mobile apps in 2014.” [261]. Globally, 18million Android users are expected to face malware infection during 2013,with monetization through premium SMS and calls being the p<strong>red</strong>ominantrevenue for cybercriminals. Moreover, during the same year mobile spam isexpected to increase, turning into a serious threat vector.60
8.3. What Is the Worst That Can Happen?8.3 What Is the Worst That Can Happen?Losses can happen in almost any domain: financial, personal data [212], andintellectual property are the easiest to think of, but other attacks could alsobe potentially life-threatening. For instance, denial of services to avoid callingemergency numbers, malicious location-based services and leakage of GPScoordinates, which may enable traditional crime activities (as outlined above),may all be concrete attacks rather than fictional artifacts. In addition, anylife-affecting device (e.g., cars, NFC-based insulin pumps), if improperly usedand fully controlled by a smartphone (assuming read/write/exec accesses andno fallback safety checks) may threaten life itself or violate an individualsprivacy.8.4 State of the ArtTo contribute to an understanding of the security problems affecting smartphones,La Polla et al. surveyed the related literature in the 2004–2011 period,highlighting threats, vulnerabilities, and attacks [246]. Despite the similarities,there are in fact a number of security-related differences between mobile devicesand PCs (e.g., monetization through premium SMS and calls [416]) andthey need to be dealt with specifically.With a few exceptions focused on enhancing mobile OSes with state-of-theartmemory error protections [105], iOS privacy violation detection [162], anda recent detailed analysis of cellular networks [253], current research is mainlyconcerned with understanding, analyzing, and mitigating Android malwarethreats.DroidScope [405] is a framework for creating dynamic analysis tools forAndroid malware that trades simplicity and efficiency for transparency. As anout-of-the-box approach, it instruments the Android emulator, but it may incurhigh overhead (for instance, when taint-tracking is enabled). DroidScope employsa 2-level virtual machine introspection (VMI) [187] to gather informationabout the system (i.e., OS-level and Android-specific behaviors) and exposeshooks and a set of APIs that enable the development of plugins to perform bothfine and coarse-grained analyses (e.g., system call, single instruction tracing,and taint tracking). Unfortunately, DroidScope just offers a set of hooks thatother analyses can build upon to intercept interesting events and does notperform any behavioral analysis per se.Enck et al. presented TaintDroid [167], a framework to enable dynamictaint analysis of Android applications. TaintDroid’s main goal is to trackhow sensitive information flows between the system and applications, orbetween applications, in order to automatically identify information leaks.Because of the complexity of Android, TaintDroid relies on different levelsof instrumentation to perform its analyses. For example, to propagate taint61
- Page 1:
SEVENTH FRAMEWORK PROGRAMMETHERED B
- Page 4 and 5:
The Red Book. ©2013 The SysSec Con
- Page 7 and 8:
PrefaceAfter the completion of its
- Page 9 and 10:
Contents1 Executive Summary 32 Intr
- Page 11 and 12:
1 Executive SummaryBased on publish
- Page 13:
1.2. Grand Challenges4. will have t
- Page 16 and 17:
2. Introductionwho want to get at t
- Page 18 and 19: 2. Introduction• Although conside
- Page 20 and 21: 2. Introductionfuture, where each a
- Page 22 and 23: 2. Introductiondrones), such sensor
- Page 24 and 25: 2. Introductioncover our energy nee
- Page 27: Part I: Threats Identified
- Page 30 and 31: 3. In Search of Lost Anonymity3.2 W
- Page 32 and 33: 3. In Search of Lost Anonymityguide
- Page 35 and 36: 4 Software VulnerabilitiesExtending
- Page 37 and 38: 4.1. What Is the Problem?infrastruc
- Page 39 and 40: 4.5. State of the Artparts of criti
- Page 41: 4.7. Example Problemstem mitigation
- Page 44 and 45: 5. Social Networks5.1 Who Is Going
- Page 46 and 47: 5. Social Networksby such an applic
- Page 48 and 49: 5. Social Networksdisasters. This r
- Page 50 and 51: 6. Critical Infrastructure Security
- Page 52 and 53: 6. Critical Infrastructure Security
- Page 54 and 55: 6. Critical Infrastructure Security
- Page 56 and 57: 6. Critical Infrastructure Security
- Page 59 and 60: 7 Authentication and AuthorizationH
- Page 61 and 62: 7.2. Who Is Going to Be Affected?so
- Page 63 and 64: 7.5. State of the ArtFinally, ident
- Page 65 and 66: 7.6. Research Gapshashes and evalua
- Page 67: 8 Security of Mobile DevicesIn an e
- Page 71 and 72: 8.4. State of the ArtAll the other
- Page 73: 8.6. Example Problemserated anomaly
- Page 76 and 77: 9. Legacy Systemsthe execution of a
- Page 78 and 79: 9. Legacy Systemsparts of the progr
- Page 81 and 82: 10 Usable SecurityKeys, locks, and
- Page 83 and 84: 10.4. What Is the Worst That Can Ha
- Page 85 and 86: 10.6. Research Gaps10.6 Research Ga
- Page 87: 10.7. Example Problemsof value for
- Page 90 and 91: 11. The Botnet that Would not DieNu
- Page 92 and 93: 11. The Botnet that Would not Diefa
- Page 94 and 95: 11. The Botnet that Would not Dieti
- Page 96 and 97: 12. Malwarethan 128 million malware
- Page 98 and 99: 12. Malwareequipped with auto-updat
- Page 100 and 101: 12. Malwarethe introduction of App
- Page 102 and 103: 13. Social Engineering and Phishing
- Page 104 and 105: 13. Social Engineering and Phishing
- Page 106 and 107: 13. Social Engineering and Phishing
- Page 108 and 109: 13. Social Engineering and Phishing
- Page 111 and 112: 14 Grand ChallengesOne of the most
- Page 113: Part II: Related Work
- Page 116 and 117: 15. A Crisis of Prioritization•
- Page 118 and 119:
16. Forwardare accessible from the
- Page 120 and 121:
16. ForwardRecommendation 4: “The
- Page 122 and 123:
17. Federal Plan for Cyber Security
- Page 124 and 125:
17. Federal Plan for Cyber Security
- Page 126 and 127:
18. EffectsPlus18.1 Roadmap Structu
- Page 128 and 129:
18. EffectsPlus18.6 Identified Prio
- Page 130 and 131:
19. Digital GovernmentThe roadmap o
- Page 132 and 133:
20. Horizon2020• “Making cyber
- Page 135 and 136:
21 Trust in the Information Society
- Page 137:
21.2. Recommendationsallows for the
- Page 140 and 141:
22. ENISA Threat Landscape2. Malwar
- Page 142 and 143:
22. ENISA Threat LandscapeSocial Te
- Page 144 and 145:
22. ENISA Threat Landscapewriters w
- Page 146 and 147:
23. Cyber Security Research Worksho
- Page 149 and 150:
24 Cyber Security Strategy of theEu
- Page 151 and 152:
24.2. Strategic PrioritiesProposed
- Page 153 and 154:
25 The Dutch National Cyber Securit
- Page 155 and 156:
25.1. ContextsInternet (e.g., smart
- Page 157 and 158:
25.1. Contextsdefensive approaches
- Page 159 and 160:
25.2. Research Themesand radio broa
- Page 161 and 162:
25.2. Research Themesconsists of se
- Page 163 and 164:
25.2. Research ThemesRisk managemen
- Page 165 and 166:
AMethodologiesIn this appendix we o
- Page 167 and 168:
BSysSec Threats Landscape Evolution
- Page 169 and 170:
B.4. SysSec 2013 Threats LandscapeT
- Page 171 and 172:
B.4. SysSec 2013 Threats LandscapeS
- Page 173 and 174:
Bibliography[1] 10 Questions for Ke
- Page 175 and 176:
Bibliography[45] SCADA & Security o
- Page 177 and 178:
Bibliography[88] A. Avizienis, J.-C
- Page 179 and 180:
Bibliography[130] G. Cluley. 600,00
- Page 181 and 182:
Bibliography[172] D. Evans. Top 25
- Page 183 and 184:
Bibliography[214] ICS-CERT. Monthly
- Page 185 and 186:
Bibliography[253] C. Lever, M. Anto
- Page 187 and 188:
Bibliography[291] Mozilla. Browseri
- Page 189 and 190:
Bibliography[329] F. Raja, K. Hawke
- Page 191 and 192:
Bibliography[370] T. Telegraph. Bog
- Page 193 and 194:
Bibliography[407] W. Yang, N. Li, Y