Mobile OS Security
Smartphones—phones that allow users to download and install
third-party applications from the Internet—present new security and
privacy risks to users and network providers. My research has
investigated the limitations of current security in smartphones and how
to improve the state of the art. My efforts have been directed at the
Android platform, as it is representative of the functionality available
in popular smartphone operating systems, and it is open source, which
allows the creation of proof-of-concept prototypes for evaluation and
experimentation.
Kirin: The Kirin project provides lightweight certification of
applications at the time of install by looking at configuration metadata
such as requested permissions, which accompanies Android applications.
From this metadata, Kirin infers potential functionality and compares it
against a ruleset of potentially dangerous properties. If any rule
fails, the application is not installed. A set of Kirin security rules
was created using security requirements engineering and evaluated
against over 300 popular applications. The results indicate Kirin can
provide a practical security enhancement to Android, with minimal cases
where user override is necessary. [Download Kirin]
TaintDroid: The TaintDroid project provides realtime analysis to
watch how applications use different types of privacy sensitive
information. TaintDroid uses dynamic taint analysis to track taint
markings assigned to data when it is accessed from application
programming interfaces. When information leaves the phone's network
interface, TaintDroid records any present taint markings. To provide
realtime analysis on smartphones, TaintDroid has a carefully designed
architecture, trading tracking granularity for performance. We used
TaintDroid to study the behavior 30 popular Android applications. Of the
30 applications, 15 shared location information with advertisement
servers, and 7 shared device and phone identifiers with remote servers
without the user's knowledge. These results indicate that smartphone
applications do not always behave as we expect, and that users should be
more vigilant when installing new applications. [Download TaintDroid]
ded: Smartphone applications are frequently incompletely vetted, poorly
isolated, and installed by users without restraint. Such behavior is fraught
with peril: applications containing malicious logic or critical vulnerabilities
are likely to be identified only after substantial damage has already occurred.
Unfortunately, the limitations of application markets make them a poor agent
for certifying that applications are secure. ded is a project which aims at
decompiling Android applications. The ded tool retargets Android applications
in .dex format to traditional .class files. These .class files can then be
processed by existing Java tools, including decompilers. Thus, Android
applications can be analyzed using a vast range of techniques developed for
traditional Java applications. We used ded to perform a large scale analysis of
Android applications. We decompiled the 1,100 most popular applications
using ded. We then analyzed the source code of the applications using a battery
of custom program analysis tests designed to identify both vulnerabilities and
malicious behavior. While this analysis did not reveal any malware, we found
that phone identifiers and other personally identifiable information were
widely used by Android applications. We also found that many applications
insecurely use Android APIs. [Download ded]
Related Publications
William Enck, Damien Octeau, Patrick McDaniel, and Swarat
Chaudhuri. A Study of Android Application Security, Proceedings of
the 20th USENIX Security Symposium, August, 2011. San
Francisco, CA.
(acceptance rate=17.2%) [pdf]
(acceptance rate=17.2%) [pdf]
Patrick McDaniel and William Enck, Not So Great Expectations: Why
Application Markets Haven't Failed Security.
IEEE Security & Privacy Magazine, 8(5):76--78,
September/October, 2010. (Secure Systems issue column).
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox , Jaeyeon
Jung, Patrick McDaniel, and Anmol N. Sheth. TaintDroid: An Information-Flow
Tracking System for Realtime Privacy Monitoring on Smartphones.
Proceedings of the 9th USENIX Symposium on Operating Systems
Design and Implementation (OSDI), October 2010. Vancouver, BC.
(acceptance rate=16.1%) [pdf]
(acceptance rate=16.1%) [pdf]
Machigar Ongtang, Stephen McLaughlin, William Enck, and Patrick
McDaniel. Semantically Rich Application-Centric Security in Android.
Proceedings of the 25th Annual Computer Security Applications
Conference (ACSAC), December 2009. Honolulu, HI. (best
paper).
(acceptance rate=19.0%) [pdf]
(acceptance rate=19.0%) [pdf]
William Enck, Machigar Ongtang, and Patrick McDaniel. On Lightweight
Mobile Phone Application Certification. Proceedings of the 16th ACM
Conference on Computer and Communications Security (CCS),
November 2009. Chicago, IL.
(acceptance rate=18.4%) [pdf]
(acceptance rate=18.4%) [pdf]
William Enck, Machigar Ongtang, and Patrick McDaniel, Understanding
Android Security. IEEE Security & Privacy Magazine,
7(1):10--17,
January, 2009.
William Enck, Machigar Ongtang, and Patrick McDaniel, Mitigating Android
Software Misuse Before It Happens.
Technical Report NAS-TR-0094-2008, Network and Security Research
Center, Department of Computer Science and Engineering,
Pennsylvania State University, University Park, PA, USA, September
2008. Updated November 2008. [pdf]
PinUP
Users commonly download, patch, and use applications such as email
clients, office applications, and media-players from the Internet. Such
applications are run with the user's full permissions. Because system
protections do not differentiate applications from each other, any
malcode present in the downloaded software can compromise or otherwise
leak all user data. Interestingly, our investigations show that
inter-application sharing is well-defined, following recognizable
workflows. The degenerate and most frequent workflow exists when files
are only access by the application that creates them; however more
complex workflows can be modeled as stages in the lifetime of data
(e.g., writing, compiling, linking, and executing an application). We
have also found that inter-user sharing, commonly done between systems,
follows predictable patterns. This reality represents an opportunity for
new protection schemes. We propose the PinUP access control overlay
system that "pins" files to specific applications. More information can
be found on the SIIS Lab PinUP
Page along with source code for our implementation.
Related Publications
William Enck, Patrick McDaniel, and Trent Jaeger. PinUP: Pinning User
Files to Known Applications.
Proceedings of the 24th Annual Computer Security Applications
Conference (ACSAC), December 2008. Anaheim, CA.
(acceptance rate=24.3%) [pdf]
(acceptance rate=24.3%) [pdf]
William Enck, Sandra Rueda, Yogesh Sreenivasan, Joshua Schiffman,
Luke St. Clair, Trent Jaeger, and Patrick McDaniel. Protecting Users
from "Themselves". Proceedings of the 1st ACM Computer Security
Architectures Workshop, November 2007. Alexandria, VA.
(acceptance rate=30%) [pdf]
(acceptance rate=30%) [pdf]
Telecommunications Security
Securing national infrastructure such as the telecommunications network
is of utmost importance. We discovered vulnerabilities in the celluar
phone network that allow a careful attacker to deny voice service to
metropolitain areas the size of Manhattan with little more than a cable
modem by sending SMS messages from the Internet. We extended our
original analysis by building a detailed GSM simulator. Through a
combination of simulation and mathematical modeling, we derived a deeper
understanding of the necessary preconditions for an attack, as well as
an array of mitigation techniques. This work was the primary focus of my
Masters thesis.
Related Publications
Patrick Traynor, William Enck, Patrick McDaniel, and Tom La Porta,
Mitigating Attacks on Open Functionality in SMS-Capable Cellular
Networks. IEEE/ACM Transactions on Networking (TON). (to
appear).
(extends teml06)
(extends teml06)
Patrick Traynor, William Enck, Patrick McDaniel, and Tom La Porta,
Exploiting Open Functionality in SMS-Capable Cellular Networks.
Journal of Computer Security, 16(6), December, 2008.
(extends etml05)
(extends etml05)
Patrick Traynor, William Enck, Patrick McDaniel, and Tom La Porta.
Mitigating Attacks on Open Functionality in SMS-Capable Cellular
Networks. Proceedings of the Twelfth Annual International
Conference on Mobile Computing and Networking (MobiCom),
September 2006. Los Angeles, CA.
(acceptance rate=11.7%) [pdf]
(acceptance rate=11.7%) [pdf]
William Enck, Patrick Traynor, Patrick McDaniel, and Tom La Porta.
Exploiting Open Functionality in SMS-Capable Cellular Networks.
Proceedings of the 12th ACM Conference on Computer and
Communications Security (CCS), pages 393--404, November 2005.
Alexandria, VA.
(acceptance rate=15.0%) [pdf]
(acceptance rate=15.0%) [pdf]
Secure Non-Volatile Main Memory
Non-volatile memories provide energy efficiency, tolerance against power
failure, and "instant-on" power-up. These memories are likely to
replace traditional volatile memory in next-generation laptops and
desktops. However, the move to non-volatile memory introduces new
vulnerabilities; sensitive data such as passwords and keys residing in
main memory persists across reboots and can be probed during hardware
suspension.
We propose a Memory Encryption Control Unit (MECU) to address
the vulnerabilities introduced by non-volatile memories. The MECU
encrypts all memory transfers between the level 2 cache and main memory.
The keys used to encrypt memory blocks are derived from secret
information present on removable authentication tokens, e.g., smart
card, or other similar secure storage devices. This provides protection
against physical attacks in absence of the token.
We evaluated a MECU-enhanced architecture using the SimpleScalar hardware
simulation framework on several hardware benchmarks. The performance
analysis shows that we can secure non-volatile memories with minimal
overhead---the majority of memory accesses are delayed by less than 1
ns, with limited degradation subsiding within 670 milliseconds of a system
resume. In effect, we provide zero-cost steady state confidentiality for
main memory.
No comments:
Post a Comment
Thank You , For Immediate Assistance Plz Put Email Copy to Deviceporting@gmail.com