SlideShare a Scribd company logo
Android Security

Presentation By,
Midhun P G
8th Nov, 2013
WALK THROUGH


Android Basics






Android Security Model














Application Sandboxing
Permission Model

What is an Android application?






Introduction
Versions
Android Stack

Application Components
Manifest file
Requesting Permissions

Android more secure than IOS??
Multiple Layers of Android security
Android Malwares
How effective are mobile anti-viruses
Android Rooting
Android Market
Android Application Vulnerability Scanner Toolkit
Open Security issues in Android platform
Top 7 Vulnerabilities Android Application Developers May Jump Into
Android Basics
There are 4 billion mobile phones among 7 billion
people in the world
 Android owns the crown among its competitors
 The use of smartphones for financial transactions
and storing private information is increasing
 Losing the mobile phone is more worse than losing
wallets
 Securing the data residing in mobiles is of prime
importance.

Android uses a kind of UNIX sandboxing method
to run its applications
 Applications uses IPC mechanisms to
communicate among each other
 These IPC mechanisms uses concept of
endpoints
 All the configuration parameters and the security
parameters of an application are defined in a file
called AndroidManifest.xml

ANDROID VERSIONS
ANDROID SOFTWARE STACK
Android Security Model


Unix Sandboxing



Each application have its own user name and
memory space



One app cannot access resources of other app



Android permission enforcement
Android security
Android security
Android permissions protect
-- Access to sensitive APIs
-- Access to content providers
-- Inter- and intra-application communication
What is an Android Application…?
WHAT IS AN ANDROID APPLICATION…?


Android applications are composed of one or more
application components
Activities
 Services
 Broadcast Receivers
 Content Providers


Each component performs a different role in the
overall application behavior, and each one can be
activated individually (even by other applications)
 The manifest file must declare all components in
the application and should also declare all
application requirements.

Android security
ACTIVITIES
SERVICES
BROADCAST RECEIVERS
CONTENT PROVIDERS
INTENTS & INTENT FILTERS
MANIFEST FILE
COMPONENT PERMISSION


Components can be made accessible to other
applications (exported) or be made private
Default is private 
 Converted to public when component is registered to
receive an implicit intents 




Components can be protected by permission
REQUESTING PERMISSIONS
Android more secure than IOS??
Android security
Eric Schmidt made a comment that Android is
more secure than IOS.
The comment only prompted laughter from the crowd


Google backed up their chairman, stating that only
0.001% of installed apps are malicious.



They provided data for it.
Multiple Layers of Android security
Android security
Android security
Android Malwares
Android security
Android Is Secure...Users Aren‘t
 Google can't count malware it doesn't see
 Android has defenses...to protect itself, not your
data
 Many of Android's defenses are bypassed with a
few taps, or by users


unauthorized sources
 Rooting
 What else.. ?

How effective are mobile anti-viruses…?


No, Mobile Anti-Malware Utilities for Android are
Not Perfect, or Even the Same Protection You Get
on the Desktop



You can't just install a mobile security suite on your
Android phone and assume you'll be safe
regardless of what you do.



The real weapon you have against Android
malware is common sense.
How Do You Protect Yourself…?
LEARN TO TELL IF AN ANDROID APP IS
MALWARE BEFORE YOU INSTALL IT


Take a look at app store reviews



Pay attention to the permissions an app requests



Check the developer's other apps



Don't install applications from unusual or suspicious
sources



Keep a close watch on SMS and data activity
ANDROID ROOTING


Android rooting is the process of allowing users
of smartphones, tablets, and other devices running
the Android mobile operating system to
attain privileged control (known as "root access")
within Android's subsystem.
GENERAL ROOTING TERMS
Root
 ROM
 Kernel
 Flash
 Brick
 Bootloader
 Recovery
 ADB

"Rooting" vs. "jailbreaking"


In the tightly-controlled iOS world, technical
restrictions prevent
installing or booting into a modified or entirely new
operating system (a "locked bootloader" prevents this)
 sideloading unsigned applications onto the device
 user-installed apps from having root privileges (and are
run in a secure sandboxed environment)




Bypassing all these restrictions together constitute
the expansive term "jailbreaking" of Apple devices
Android Market
OPEN SECURITY ISSUES IN ANDROID
PLATFORM
OPEN SECURITY ISSUES






Malicious Applications
 Rooting Exploits
 SMS Fraud
 Rapid Malware Production
Dynamic Analysis
 Sandbox
 Real-time Monitoring
 Mobile Specific Features
Static Analysis
 Permissions
 Data Flow
 Control Flow



Browser Attacks
 Phishing
 Click Through



Mobile Botnets
 Epidemic Spread
 Attacking Network Services
 Tracking Uninfected Devices



User Education
 Ignoring Permissions
 Phishing
 Improperly Rooting Devices
 Alternative Markets
OTHER OPEN PROBLEMS


Hard to separate malicious code from benign
 Poor Application Verification
 Obfuscation
 Dynamic code loading
 Limited availability of tools
 Repackaging
 Resources for Understanding Android Security
TOP 7 VULNERABILITIES ANDROID
APPLICATION DEVELOPERS JUMP INTO
Unauthorized Intent Receipt
 Intent Spoofing
 Insecure Storage
 Insecure Network Communication
 SQL Injection
 Over Privileged Applications
 Persistent Messages: Sticky Broadcasts

SOME SOLUTIONS…
Bouncer
 Taintdroid
 Droidbox
 Mercury Framework
 Androguard
 Apktool
 Dex2Jar
 Dexdump
 … and much more …

ANDROID APPLICATION
VULNERABILITY SCANNER TOOLKIT


Vulnerabilities in Android applications
Intent Spoofing (Confused-deputy Vulnerability)
 Insecure Storage (Cross-application Data Stealing
Vulnerability)
 Over Privileged Applications
 Debuggable Applications


No tool available for finding and fixing vulnerabilities
in Android applications
 Sensitive user data is getting leaked due to
insecure applications

Android security
Android security
Android security
Android security
Android security
Android security
Android security


http://securityresearch.in/index.php/mobile/androidapplication-vulnerability-scanner-toolkit
SOME TIPS TO KEEP YOUR DATA SECURE


Always use encryption (whatsapp)



Never download apps from unsolicited emails and
texts (malware)



Always check apps permissions (confused-deputy
attacks, malware)



Monitor your data and messages
Android security
Android security

More Related Content

PPTX
Android Security
PDF
Android Security
PPTX
Android security
PPTX
Mobile security
PPT
Android Security
PPTX
Understanding android security model
PPTX
Mobile Application Security
PPTX
7 Steps to Threat Modeling
Android Security
Android Security
Android security
Mobile security
Android Security
Understanding android security model
Mobile Application Security
7 Steps to Threat Modeling

What's hot (20)

PDF
Mobile Security
PPTX
Secure Software Development Life Cycle (SSDLC)
PPTX
Mobile security
PDF
Android Security & Penetration Testing
PDF
Mobile Malware
PPTX
Day: 1 Introduction to Mobile Application Development (in Android)
PPTX
IoT - Attacks and Solutions
PDF
Zero Trust Model Presentation
PPTX
Cyber security
PPT
Mobile application development
PPTX
Mobile security
PPTX
Threat Modeling In 2021
PPTX
PPT on Android
PPT
IoT security (Internet of Things)
PDF
Mobile Security
PPTX
Basic android-ppt
PPTX
Network Security
PPTX
Virus and malware presentation
PPTX
Threat modelling with_sample_application
Mobile Security
Secure Software Development Life Cycle (SSDLC)
Mobile security
Android Security & Penetration Testing
Mobile Malware
Day: 1 Introduction to Mobile Application Development (in Android)
IoT - Attacks and Solutions
Zero Trust Model Presentation
Cyber security
Mobile application development
Mobile security
Threat Modeling In 2021
PPT on Android
IoT security (Internet of Things)
Mobile Security
Basic android-ppt
Network Security
Virus and malware presentation
Threat modelling with_sample_application
Ad

Viewers also liked (20)

PDF
Deep Dive Into Android Security
PPT
Analysis and research of system security based on android
PPTX
Permission in Android Security: Threats and solution
PPTX
Android sandbox
PDF
Brief Tour about Android Security
PDF
Android Security - Common Security Pitfalls in Android Applications
PPTX
Presentation on Android operating system
PPT
PDF
Android Security Overview and Safe Practices for Web-Based Android Applications
PPTX
Android security model
ODP
Android security in depth
PDF
Android system security
PPTX
[Wroclaw #1] Android Security Workshop
PPTX
Security threats in Android OS + App Permissions
PPT
Understanding Android Security
PDF
Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...
PDF
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
PDF
2015.04.24 Updated > Android Security Development - Part 1: App Development
PDF
Testing Android Security Codemotion Amsterdam edition
PDF
Android Security Development
Deep Dive Into Android Security
Analysis and research of system security based on android
Permission in Android Security: Threats and solution
Android sandbox
Brief Tour about Android Security
Android Security - Common Security Pitfalls in Android Applications
Presentation on Android operating system
Android Security Overview and Safe Practices for Web-Based Android Applications
Android security model
Android security in depth
Android system security
[Wroclaw #1] Android Security Workshop
Security threats in Android OS + App Permissions
Understanding Android Security
Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
2015.04.24 Updated > Android Security Development - Part 1: App Development
Testing Android Security Codemotion Amsterdam edition
Android Security Development
Ad

Similar to Android security (20)

PDF
Securing Android
PDF
Android security
PDF
android Security
PPTX
Android security
PDF
Mediating Applications on the Android System
PDF
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
PPTX
Security testing of mobile applications
PDF
Hacking Android [MUC:SEC 20.05.2015]
PDF
Introduction to Android Application Security Testing - 2nd Sep 2017
PPT
Outsmarting SmartPhones
PDF
ToorCon 14 : Malandroid : The Crux of Android Infections
PPTX
Untitled 1
PPTX
IPhone Application Development India |#IPhoneApplicationDevelopmentIndia
PPTX
Andriod
PPTX
Security models of modern mobile systems
PPTX
Advanced Malware Analysis Training Session 8 - Introduction to Android
PDF
Android Security: A Survey of Security Issues and Defenses
PPTX
Android overview
PPTX
Secure Android Apps- nVisium Security
PPTX
Mobile security
Securing Android
Android security
android Security
Android security
Mediating Applications on the Android System
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
Security testing of mobile applications
Hacking Android [MUC:SEC 20.05.2015]
Introduction to Android Application Security Testing - 2nd Sep 2017
Outsmarting SmartPhones
ToorCon 14 : Malandroid : The Crux of Android Infections
Untitled 1
IPhone Application Development India |#IPhoneApplicationDevelopmentIndia
Andriod
Security models of modern mobile systems
Advanced Malware Analysis Training Session 8 - Introduction to Android
Android Security: A Survey of Security Issues and Defenses
Android overview
Secure Android Apps- nVisium Security
Mobile security

Recently uploaded (20)

PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Cell Structure & Organelles in detailed.
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Institutional Correction lecture only . . .
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Insiders guide to clinical Medicine.pdf
PDF
Classroom Observation Tools for Teachers
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
human mycosis Human fungal infections are called human mycosis..pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Complications of Minimal Access Surgery at WLH
Cell Structure & Organelles in detailed.
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
TR - Agricultural Crops Production NC III.pdf
Microbial disease of the cardiovascular and lymphatic systems
Module 4: Burden of Disease Tutorial Slides S2 2025
102 student loan defaulters named and shamed – Is someone you know on the list?
Week 4 Term 3 Study Techniques revisited.pptx
PPH.pptx obstetrics and gynecology in nursing
Pharma ospi slides which help in ospi learning
Institutional Correction lecture only . . .
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Insiders guide to clinical Medicine.pdf
Classroom Observation Tools for Teachers
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Anesthesia in Laparoscopic Surgery in India

Android security

  • 2. WALK THROUGH  Android Basics     Android Security Model            Application Sandboxing Permission Model What is an Android application?     Introduction Versions Android Stack Application Components Manifest file Requesting Permissions Android more secure than IOS?? Multiple Layers of Android security Android Malwares How effective are mobile anti-viruses Android Rooting Android Market Android Application Vulnerability Scanner Toolkit Open Security issues in Android platform Top 7 Vulnerabilities Android Application Developers May Jump Into
  • 4. There are 4 billion mobile phones among 7 billion people in the world  Android owns the crown among its competitors  The use of smartphones for financial transactions and storing private information is increasing  Losing the mobile phone is more worse than losing wallets  Securing the data residing in mobiles is of prime importance. 
  • 5. Android uses a kind of UNIX sandboxing method to run its applications  Applications uses IPC mechanisms to communicate among each other  These IPC mechanisms uses concept of endpoints  All the configuration parameters and the security parameters of an application are defined in a file called AndroidManifest.xml 
  • 9.  Unix Sandboxing  Each application have its own user name and memory space  One app cannot access resources of other app  Android permission enforcement
  • 12. Android permissions protect -- Access to sensitive APIs -- Access to content providers -- Inter- and intra-application communication
  • 13. What is an Android Application…?
  • 14. WHAT IS AN ANDROID APPLICATION…?  Android applications are composed of one or more application components Activities  Services  Broadcast Receivers  Content Providers  Each component performs a different role in the overall application behavior, and each one can be activated individually (even by other applications)  The manifest file must declare all components in the application and should also declare all application requirements. 
  • 20. INTENTS & INTENT FILTERS
  • 22. COMPONENT PERMISSION  Components can be made accessible to other applications (exported) or be made private Default is private   Converted to public when component is registered to receive an implicit intents    Components can be protected by permission
  • 24. Android more secure than IOS??
  • 26. Eric Schmidt made a comment that Android is more secure than IOS.
  • 27. The comment only prompted laughter from the crowd
  • 28.  Google backed up their chairman, stating that only 0.001% of installed apps are malicious.  They provided data for it.
  • 29. Multiple Layers of Android security
  • 34. Android Is Secure...Users Aren‘t  Google can't count malware it doesn't see  Android has defenses...to protect itself, not your data  Many of Android's defenses are bypassed with a few taps, or by users  unauthorized sources  Rooting  What else.. ? 
  • 35. How effective are mobile anti-viruses…?
  • 36.  No, Mobile Anti-Malware Utilities for Android are Not Perfect, or Even the Same Protection You Get on the Desktop  You can't just install a mobile security suite on your Android phone and assume you'll be safe regardless of what you do.  The real weapon you have against Android malware is common sense.
  • 37. How Do You Protect Yourself…?
  • 38. LEARN TO TELL IF AN ANDROID APP IS MALWARE BEFORE YOU INSTALL IT  Take a look at app store reviews  Pay attention to the permissions an app requests  Check the developer's other apps  Don't install applications from unusual or suspicious sources  Keep a close watch on SMS and data activity
  • 40.  Android rooting is the process of allowing users of smartphones, tablets, and other devices running the Android mobile operating system to attain privileged control (known as "root access") within Android's subsystem.
  • 41. GENERAL ROOTING TERMS Root  ROM  Kernel  Flash  Brick  Bootloader  Recovery  ADB 
  • 43.  In the tightly-controlled iOS world, technical restrictions prevent installing or booting into a modified or entirely new operating system (a "locked bootloader" prevents this)  sideloading unsigned applications onto the device  user-installed apps from having root privileges (and are run in a secure sandboxed environment)   Bypassing all these restrictions together constitute the expansive term "jailbreaking" of Apple devices
  • 45. OPEN SECURITY ISSUES IN ANDROID PLATFORM
  • 46. OPEN SECURITY ISSUES    Malicious Applications  Rooting Exploits  SMS Fraud  Rapid Malware Production Dynamic Analysis  Sandbox  Real-time Monitoring  Mobile Specific Features Static Analysis  Permissions  Data Flow  Control Flow  Browser Attacks  Phishing  Click Through  Mobile Botnets  Epidemic Spread  Attacking Network Services  Tracking Uninfected Devices  User Education  Ignoring Permissions  Phishing  Improperly Rooting Devices  Alternative Markets
  • 47. OTHER OPEN PROBLEMS  Hard to separate malicious code from benign  Poor Application Verification  Obfuscation  Dynamic code loading  Limited availability of tools  Repackaging  Resources for Understanding Android Security
  • 48. TOP 7 VULNERABILITIES ANDROID APPLICATION DEVELOPERS JUMP INTO Unauthorized Intent Receipt  Intent Spoofing  Insecure Storage  Insecure Network Communication  SQL Injection  Over Privileged Applications  Persistent Messages: Sticky Broadcasts 
  • 49. SOME SOLUTIONS… Bouncer  Taintdroid  Droidbox  Mercury Framework  Androguard  Apktool  Dex2Jar  Dexdump  … and much more … 
  • 51.  Vulnerabilities in Android applications Intent Spoofing (Confused-deputy Vulnerability)  Insecure Storage (Cross-application Data Stealing Vulnerability)  Over Privileged Applications  Debuggable Applications  No tool available for finding and fixing vulnerabilities in Android applications  Sensitive user data is getting leaked due to insecure applications 
  • 60. SOME TIPS TO KEEP YOUR DATA SECURE  Always use encryption (whatsapp)  Never download apps from unsolicited emails and texts (malware)  Always check apps permissions (confused-deputy attacks, malware)  Monitor your data and messages