SlideShare a Scribd company logo
Avoiding the Pandora Pitfall   Tyler Shields
 Secure Coding Practices for   Veracode Research
 Android Application Privacy   November 3, 2011
Mobile Security                    Privacy
  Landscape                      Implications


  START                                         END
     1                2              3          4
                  Case Studies                  Q&A
Risk - noun `risk
The possibility of loss or injury
PC Sensitive Data
         Financial data
        Corporate data
       Computing power
             Email
                              Call L
          Contact List              ogs!

            Photos
              …

                   ages!    MMS!
         Vi deo Im
SMS!
Mobile Mitigations
                   Patch methodology
                    Process isolation
               Reasonable permission model
                  Some disk encryption
                     Code signatures
                           …


                   DEP!
       irus!
Anti-V
10.9 billion mobile apps downloaded in
2010, according to IDC




                       Expected to rise to
                       76.9 billion apps by 2014
Part 1: Malicious Code
 Activity monitoring and data retrieval

    Unauthorized dialing, SMS, and
      payments

              Unauthorized network
               connectivity (exfiltration
               or command & control)

                 UI impersonation

                   System modification
                    (rootkit, APN proxy
                    config)
                 Logic or time bomb
Part 2: Code Vulnerabilities

Sensitive data leakage (inadvertent or side channel)

Unsafe sensitive data storage

Unsafe sensitive data transmission

Hardcoded password/keys
Case Study: Hardcoded Passwords
eys!
              passw ord or k
             ed
Hardcod
                                 g?!
!
                 cut –  Debuggin
  La    zy short
                                E!!
  !
                – Get  ALL FRE
    O   wn one
    !
      !
Case Study: Unsafe Data Transmission
Goo
                                                        gle
                                           Tran               Cale
                                               smi                ndar
                                                  tted     !         !
                                                  in c appoint
                                   on!                lear       m
              ebook      applicati                           text ent dat
Off icial Fac       rything e
                                xcept                            !        a
           ed eve
T ransmitt      in clear
                             text!
              d
    passwor       !
                                  es,
             privat    e messag
   Photos,               , etc!
          wall posts
                     !
                                   bled!
               Web-      SSL Ena
   E ven with
!
Or better yet…
                                           er!!
!
                  ert che cking all togeth
  Just disable c
                              WILD!
             As Seen In The
Case Study: Unsafe Data Writes
Imp
        rope
                 r Da
                      ta S
   Acc              !      tora
Paym   ount                      ge!
     ents        Nu
          , Se mbers,
                 cur         Bil
             Code ity Acc l
                   s!         ess
 WOR           !
WOR    LD_
     LD_ READAB
          WRI            L
                   TEA E!
             !          BLE!
           !
Impr
           oper
                  Data
                        Stor
    SQLi          !           age!
           te3 D
                    ataba
                !         se!
     Cont
            ac
     Chat t List!
               Logs
                      !
 WOR         !
WOR LD_REA
   LD_W           DA
            RIT BLE!
                    EABL
         !                E!
       !
Case Study: Data Exfiltration
WSJ Breaks Story on Pandora Investigation


              “Federal prosecutors in
              New Jersey are investigating
              whether numerous
              smartphone applications
              illegally obtained or
              transmitted information
              about their users without
              proper disclosures”
!
                         m     execution
              No progra
                           !
                                           urce!
                             bin ary or so
         Full c overage of
                             !               y!
                         of bu    g discover
            Wi der range
                               !            a !
                          by ru    ntime dat
             N ot limited

Sta
   tic                       -- JD-GUI!
         Ana                 -- Veracode Engine!
             lysi
                 s   !
JD-Gui Analysis
AdMob Location Requests
AdMob AndroidID Request
Medialets Location Request
Medialets AndroidID Requests
SecureStudies getDeviceID Request
Android Manifest Permissions

ACCESS_CHECKIN_PROPERTIES        DIAGNOSTIC                  READ_SYNC_STATS
ACCESS_COARSE_LOCATION           DISABLE_KEYGUARD            REBOOT
ACCESS_FINE_LOCATION             DUMP                        RECEIVE_BOOT_COMPLETED
ACCESS_LOCATION_EXTRA_COMMANDS   EXPAND_STATUS_BAR           RECEIVE_MMS
ACCESS_MOCK_LOCATION             FACTORY_TEST                RECEIVE_SMS
ACCESS_NETWORK_STATE             FLASHLIGHT                  RECEIVE_WAP_PUSH
ACCESS_SURFACE_FLINGER           FORCE_BACK                  RECORD_AUDIO
ACCESS_WIFI_STATE                GET_ACCOUNTS                REORDER_TASKS
ACCOUNT_MANAGER                  GET_PACKAGE_SIZE            RESTART_PACKAGES
AUTHENTICATE_ACCOUNTS            GET_TASKS                   SEND_SMS
BATTERY_STATS                    GLOBAL_SEARCH               SET_ACTIVITY_WATCHER
BIND_APPWIDGET                   HARDWARE_TEST               SET_ALARM
BIND_DEVICE_ADMIN                INJECT_EVENTS               SET_ALWAYS_FINISH
BIND_INPUT_METHOD                INSTALL_LOCATION_PROVIDER   SET_ANIMATION_SCALE
BIND_REMOTEVIEWS                 INSTALL_PACKAGES            SET_DEBUG_APP
BIND_WALLPAPER                   INTERNAL_SYSTEM_WINDOW      SET_ORIENTATION
BLUETOOTH                        INTERNET                    SET_PREFERRED_APPLICATIONS
BLUETOOTH_ADMIN                  KILL_BACKGROUND_PROCESSES   SET_PROCESS_LIMIT
BRICK                            MANAGE_ACCOUNTS             SET_TIME
BROADCAST_PACKAGE_REMOVED        MANAGE_APP_TOKENS           SET_TIME_ZONE
BROADCAST_SMS                    MASTER_CLEAR                SET_WALLPAPER
BROADCAST_STICKY                 MODIFY_AUDIO_SETTINGS       SET_WALLPAPER_HINTS
BROADCAST_WAP_PUSH               MODIFY_PHONE_STATE          SIGNAL_PERSISTENT_PROCESSES
CALL_PHONE                       MOUNT_FORMAT_FILESYSTEMS    STATUS_BAR
CALL_PRIVILEGED                  MOUNT_UNMOUNT_FILESYSTEMS   SUBSCRIBED_FEEDS_READ
CAMERA                           NFC                         SUBSCRIBED_FEEDS_WRITE
CHANGE_COMPONENT_ENABLED_STATE   PERSISTENT_ACTIVITY         SYSTEM_ALERT_WINDOW
CHANGE_CONFIGURATION             PROCESS_OUTGOING_CALLS      UPDATE_DEVICE_STATS
CHANGE_NETWORK_STATE             READ_CALENDAR               USE_CREDENTIALS
CHANGE_WIFI_MULTICAST_STATE      READ_CONTACTS               USE_SIP
CHANGE_WIFI_STATE                READ_FRAME_BUFFER           VIBRATE
CLEAR_APP_CACHE                  READ_HISTORY_BOOKMARKS      WAKE_LOCK
CLEAR_APP_USER_DATA              READ_INPUT_STATE            WRITE_APN_SETTINGS
CONTROL_LOCATION_UPDATES         READ_LOGS                   WRITE_CALENDAR
DELETE_CACHE_FILES               READ_PHONE_STATE            WRITE_CONTACTS
DELETE_PACKAGES                  READ_SMS                    WRITE_EXTERNAL_STORAGE
DEVICE_POWER                     READ_SYNC_SETTINGS          WRITE_GSERVICES
                                                             WRITE_HISTORY_BOOKMARKS
                                                             WRITE_SECURE_SETTINGS
                                                             WRITE_SETTINGS
                                                             WRITE_SMS
                                                             WRITE_SYNC_SETTINGS
Phone Calls
                                             Read Phone State and Identity

                                      System Tools
                                             Modify Global System Settings
                                             Prevent Device From Sleeping
        Permissions !

                                             Bluetooth Administration
                                             Change Wi-Fi State
                                             Change Network Connectivity
                                             Automatically Start at Boot


                                                                        Network Communication
                                                                              Full Internet Access
                                                                              Create Bluetooth Connections
                                                                              View Network State
                                                                              View Wi-Fi State
                                                                        Your Personal Information
                                                                              Read Contact Data
                                                                              Add or Modify Calendar Events
                                                                                and Send Email To Guests
https://market.android.com/details?id=com.pandora.android&feature=search_result – 4/25/2011
Just a bit deeper…




Google purchases AdMob for
$750 million dollars. Closed
        May, 2010
ESPN, CBS Interactive, Geico, Starbucks…

                                   100,000 – 500,000 installations
                                   Permissions:
                                   • FINE (GPS) LOCATION
                                   • COARSE (NETWORK-BASED) LOCATION
                                   • FULL INTERNET ACCESS


                                  5,000,000 – 10,000,000 installation
                                  Permissions:
                                  • RECORD AUDIO
                                  • CHANGE YOUR AUDIO SETTINGS
                                  • FINE (GPS) LOCATION
                                  • COARSE (NETWORK-BASED) LOCATION
                                  • FULL INTERNET ACCESS
                                  • MODIFY/DELETE USB STORAGE CONTENTS MODIFY/DELETE SD CARD
                                    CONTENTS
                                  • PREVENT DEVICE FROM SLEEPING




Permissions retrieved from official Android Marketplace on 4/25/2011
CBS News Advertising Networks
TV.com Advertising Networks
One
                                                                              week
                                                                              later...




1.
     http://www.rollingstone.com/culture/blogs/gear-up/pandora-responds-to-
     claims-that-its-online-service-violates-user-privacy-20110415
Privacy?
Here are Some Numbers…


                                             Permissions Requeste
                                                                       d!
                                          24% GPS information
                                                                  (11,929)!
                                          8% Read Contacts (3,6
                                                                  26)!
 53,000 - # Of                            4% Send SMS (1,693)!
 Applications                             3% Receive SMS (1262
                                                               )!
                                          2%Record Audio (1100
 Analyzed!                                                     )!
                                         2% Read SMS (832)!
 !                                       1% Process Outgoing!
 ~48,000 Android    3 Average Numb
                                   er   of Calls (323)!
 Market!            Permissions         .5% Use Credentials (2
                                                                48)!
 ~5,000 3rd Party   Requested!
 Markets!           !
                    117 Most Reque
                                   sted
                    for Single
                    Application!
And Even More Numbers…
Total Third Party Libraries: ~83,000!
!
Top Shared Libraries "!
   38% com.admob (18,426 apps )!
   8% org.apache ( 3,684 apps )!
   6% com.google.android ( 2,838 apps )!
   6% com.google.ads ( 2,779 apps )!
   6% com.flurry ( 2,762 apps )!
   4% com.mobclix ( 2,055 apps )!
   4% com.millennialmedia ( 1,758 apps)!
   4% com.facebook ( 1,707 apps)!
Code Reuse
                                  Most Code Is!
                                            !
Outsourcing                           Reused!
                                    Outsourced!
                        3rd Party Libraries (with source)!
                        3rd Party Libraries (binary format)!
Third Party Libraries                     !
                         Nobody really knows what their
                                    code does!!
Risk Transference!
                                    !
                               Your code!
                             Your libraries!
                           Outsourced code!
                           3rd party libraries!
                            Purchased code!
                               COTS code!
                                      !
                                        !
                         Contract your vendors
                            to do the same!
I’ll Accept that Risk!

Pass it on over..
Tyler Shields                                                                         @txs
tshields@veracode.com
txs@donkeyonawaffle.org               Summary


                                           Case Studies!
                                   ape!          !
                          L andsc
                    rity            No Hardcoded Passwords! On
         ile  Secu                                               ly T      P
     Mob              !
                            atio ns !              !                  ake rivacy!
                     pplic k!                                              Wh
                l e A                 Encrypt Data In Transit!                  at Y
          Mobi High Ris                                        Be H
                                                                    one      !      ou
                                                                                        Nee
               Ar e                                  !                  st W                d!
                        !               !
                            bile  Code  Secure Data At Rest!           Use      ith
                                                                                    You
                 iou s Mo Flaws!                                            rs!         r!
          M  alic     Co  ding                         !       Be W      !
            M  obile                                                a
                                Analyze Security of ALL Code! Tran ry of R
                                                                    sfe
                                      (Includes Code Reuse)!             renc isk
                                                                               e !

More Related Content

PDF
Managing Innovation
PDF
New approaches to vulnerability management
PDF
PDF
Social life networks presentation at fb 110713
PDF
Recent Work
PDF
PPTX
Ppt nc
PPTX
digital-water-marking-created-by-subrat&rubi
Managing Innovation
New approaches to vulnerability management
Social life networks presentation at fb 110713
Recent Work
Ppt nc
digital-water-marking-created-by-subrat&rubi

What's hot (6)

DOCX
Digitalwatermarking
PDF
Copyright and Technology London 2012: Content Identification - Werner Strydom...
PPT
Watermark
DOC
Technical seminar
PDF
0c96052b28b8e9f1cf000000
PDF
SLASH-Seminar-security awareness-v1-0-20121212
Digitalwatermarking
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Watermark
Technical seminar
0c96052b28b8e9f1cf000000
SLASH-Seminar-security awareness-v1-0-20121212
Ad

Viewers also liked (10)

PPTX
Defending Behind the Mobile Device
PDF
The New Mobile Landscape - OWASP Ireland
PDF
Praetorian Veracode Webinar - Mobile Privacy
PDF
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
PPTX
Social and Mobile and Cloud - OH MY!
PPTX
Social Media Basics: Security Loopholes with Twitter & Other Social Media
PDF
Shmoocon 2010 - The Monkey Steals the Berries
PDF
Anti-Debugging - A Developers View
PPT
Del Garabateo A La Escritura Convencional
Defending Behind the Mobile Device
The New Mobile Landscape - OWASP Ireland
Praetorian Veracode Webinar - Mobile Privacy
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
Social and Mobile and Cloud - OH MY!
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Shmoocon 2010 - The Monkey Steals the Berries
Anti-Debugging - A Developers View
Del Garabateo A La Escritura Convencional
Ad

Similar to Avoiding the Pandora Pitfall (20)

PDF
Social and Mobile and Cloud OH MY!
PPT
Mobile code mining for discovery and exploits nullcongoa2013
PDF
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
PPT
Bypassing the Android Permission Model
PDF
Mobile Securty - An Oxymoron?
PDF
AITP Presentation on Mobile Security
PDF
Info security - mobile approach
PDF
Smart Bombs: Mobile Vulnerability and Exploitation
PDF
Hacking school computers for fun profit and better grades short
PPTX
Phish training final
PDF
Securing Mobile Apps: New Approaches for the BYOD World
PPT
Emerging Threats and Attack Surfaces
PPT
network security for mobile and others types
PDF
Objective briefing on the current mobile threat 2010/2011
PPT
Mobile Apps Security
PPTX
Enterprise Mobile Security
PDF
Android OS Security: Risks and Limitations. AISEC Technical Report
PDF
Reading Group Presentation: Why Eve and Mallory Love Android
PDF
iScan Online - PCI DSS Mobile Task Force
PPT
Lumension Security - Adjusting our defenses for 2012
Social and Mobile and Cloud OH MY!
Mobile code mining for discovery and exploits nullcongoa2013
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
Bypassing the Android Permission Model
Mobile Securty - An Oxymoron?
AITP Presentation on Mobile Security
Info security - mobile approach
Smart Bombs: Mobile Vulnerability and Exploitation
Hacking school computers for fun profit and better grades short
Phish training final
Securing Mobile Apps: New Approaches for the BYOD World
Emerging Threats and Attack Surfaces
network security for mobile and others types
Objective briefing on the current mobile threat 2010/2011
Mobile Apps Security
Enterprise Mobile Security
Android OS Security: Risks and Limitations. AISEC Technical Report
Reading Group Presentation: Why Eve and Mallory Love Android
iScan Online - PCI DSS Mobile Task Force
Lumension Security - Adjusting our defenses for 2012

More from Tyler Shields (20)

PDF
Survey of Rootkit Technologies and Their Impact on Digital Forensics
PDF
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
PDF
Source Boston 2010 - The Monkey Steals the Berries Part Deux
PDF
Software Developers Forum 2010 - The Monkey Steals the Berries
PDF
Raleigh ISSA 2010 - The Monkey Steals the Berries
PDF
Static Detection of Application Backdoors
PDF
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
PDF
Owasp Ireland - The State of Software Security
PDF
More Apps More Problems
PDF
Dirty Little Secret - Mobile Applications Invading Your Privacy
PDF
IT Hot Topics - Mobile Security Threats at Every Layer
PDF
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
PDF
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
PPTX
IQT 2010 - The App Does That!?
PDF
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
PDF
GovCert.NL - The Monkey Steals The Berries
PPTX
Intelligence on the Intractable Problem of Software Security
PDF
The Coming Wave of Smartphone Attacks - Texas DIR
PPTX
CarolinaCon 2009 Anti-Debugging
PDF
CarolinaCon 2006 Reverse Engineering 101
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Software Developers Forum 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the Berries
Static Detection of Application Backdoors
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Owasp Ireland - The State of Software Security
More Apps More Problems
Dirty Little Secret - Mobile Applications Invading Your Privacy
IT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
IQT 2010 - The App Does That!?
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
GovCert.NL - The Monkey Steals The Berries
Intelligence on the Intractable Problem of Software Security
The Coming Wave of Smartphone Attacks - Texas DIR
CarolinaCon 2009 Anti-Debugging
CarolinaCon 2006 Reverse Engineering 101

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPTX
sap open course for s4hana steps from ECC to s4
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Machine Learning_overview_presentation.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
The AUB Centre for AI in Media Proposal.docx
Digital-Transformation-Roadmap-for-Companies.pptx
Empathic Computing: Creating Shared Understanding
Assigned Numbers - 2025 - Bluetooth® Document
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Chapter 3 Spatial Domain Image Processing.pdf
Spectroscopy.pptx food analysis technology
sap open course for s4hana steps from ECC to s4
A comparative analysis of optical character recognition models for extracting...
Machine Learning_overview_presentation.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Network Security Unit 5.pdf for BCA BBA.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The Rise and Fall of 3GPP – Time for a Sabbatical?
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Avoiding the Pandora Pitfall

  • 1. Avoiding the Pandora Pitfall Tyler Shields Secure Coding Practices for Veracode Research Android Application Privacy November 3, 2011
  • 2. Mobile Security Privacy Landscape Implications START END 1 2 3 4 Case Studies Q&A
  • 3. Risk - noun `risk The possibility of loss or injury
  • 4. PC Sensitive Data Financial data Corporate data Computing power Email Call L Contact List ogs! Photos … ages! MMS! Vi deo Im SMS!
  • 5. Mobile Mitigations Patch methodology Process isolation Reasonable permission model Some disk encryption Code signatures … DEP! irus! Anti-V
  • 6. 10.9 billion mobile apps downloaded in 2010, according to IDC Expected to rise to 76.9 billion apps by 2014
  • 7. Part 1: Malicious Code Activity monitoring and data retrieval Unauthorized dialing, SMS, and payments Unauthorized network connectivity (exfiltration or command & control) UI impersonation System modification (rootkit, APN proxy config) Logic or time bomb
  • 8. Part 2: Code Vulnerabilities Sensitive data leakage (inadvertent or side channel) Unsafe sensitive data storage Unsafe sensitive data transmission Hardcoded password/keys
  • 10. eys! passw ord or k ed Hardcod g?! ! cut – Debuggin La zy short E!! ! – Get ALL FRE O wn one ! !
  • 11. Case Study: Unsafe Data Transmission
  • 12. Goo gle Tran Cale smi ndar tted ! ! in c appoint on! lear m ebook applicati text ent dat Off icial Fac rything e xcept ! a ed eve T ransmitt in clear text! d passwor ! es, privat e messag Photos, , etc! wall posts ! bled! Web- SSL Ena E ven with
  • 13. ! Or better yet… er!! ! ert che cking all togeth Just disable c WILD! As Seen In The
  • 14. Case Study: Unsafe Data Writes
  • 15. Imp rope r Da ta S Acc ! tora Paym ount ge! ents Nu , Se mbers, cur Bil Code ity Acc l s! ess WOR ! WOR LD_ LD_ READAB WRI L TEA E! ! BLE! !
  • 16. Impr oper Data Stor SQLi ! age! te3 D ataba ! se! Cont ac Chat t List! Logs ! WOR ! WOR LD_REA LD_W DA RIT BLE! EABL ! E! !
  • 17. Case Study: Data Exfiltration
  • 18. WSJ Breaks Story on Pandora Investigation “Federal prosecutors in New Jersey are investigating whether numerous smartphone applications illegally obtained or transmitted information about their users without proper disclosures”
  • 19. ! m execution No progra ! urce! bin ary or so Full c overage of ! y! of bu g discover Wi der range ! a ! by ru ntime dat N ot limited Sta tic -- JD-GUI! Ana -- Veracode Engine! lysi s !
  • 26. Android Manifest Permissions ACCESS_CHECKIN_PROPERTIES DIAGNOSTIC READ_SYNC_STATS ACCESS_COARSE_LOCATION DISABLE_KEYGUARD REBOOT ACCESS_FINE_LOCATION DUMP RECEIVE_BOOT_COMPLETED ACCESS_LOCATION_EXTRA_COMMANDS EXPAND_STATUS_BAR RECEIVE_MMS ACCESS_MOCK_LOCATION FACTORY_TEST RECEIVE_SMS ACCESS_NETWORK_STATE FLASHLIGHT RECEIVE_WAP_PUSH ACCESS_SURFACE_FLINGER FORCE_BACK RECORD_AUDIO ACCESS_WIFI_STATE GET_ACCOUNTS REORDER_TASKS ACCOUNT_MANAGER GET_PACKAGE_SIZE RESTART_PACKAGES AUTHENTICATE_ACCOUNTS GET_TASKS SEND_SMS BATTERY_STATS GLOBAL_SEARCH SET_ACTIVITY_WATCHER BIND_APPWIDGET HARDWARE_TEST SET_ALARM BIND_DEVICE_ADMIN INJECT_EVENTS SET_ALWAYS_FINISH BIND_INPUT_METHOD INSTALL_LOCATION_PROVIDER SET_ANIMATION_SCALE BIND_REMOTEVIEWS INSTALL_PACKAGES SET_DEBUG_APP BIND_WALLPAPER INTERNAL_SYSTEM_WINDOW SET_ORIENTATION BLUETOOTH INTERNET SET_PREFERRED_APPLICATIONS BLUETOOTH_ADMIN KILL_BACKGROUND_PROCESSES SET_PROCESS_LIMIT BRICK MANAGE_ACCOUNTS SET_TIME BROADCAST_PACKAGE_REMOVED MANAGE_APP_TOKENS SET_TIME_ZONE BROADCAST_SMS MASTER_CLEAR SET_WALLPAPER BROADCAST_STICKY MODIFY_AUDIO_SETTINGS SET_WALLPAPER_HINTS BROADCAST_WAP_PUSH MODIFY_PHONE_STATE SIGNAL_PERSISTENT_PROCESSES CALL_PHONE MOUNT_FORMAT_FILESYSTEMS STATUS_BAR CALL_PRIVILEGED MOUNT_UNMOUNT_FILESYSTEMS SUBSCRIBED_FEEDS_READ CAMERA NFC SUBSCRIBED_FEEDS_WRITE CHANGE_COMPONENT_ENABLED_STATE PERSISTENT_ACTIVITY SYSTEM_ALERT_WINDOW CHANGE_CONFIGURATION PROCESS_OUTGOING_CALLS UPDATE_DEVICE_STATS CHANGE_NETWORK_STATE READ_CALENDAR USE_CREDENTIALS CHANGE_WIFI_MULTICAST_STATE READ_CONTACTS USE_SIP CHANGE_WIFI_STATE READ_FRAME_BUFFER VIBRATE CLEAR_APP_CACHE READ_HISTORY_BOOKMARKS WAKE_LOCK CLEAR_APP_USER_DATA READ_INPUT_STATE WRITE_APN_SETTINGS CONTROL_LOCATION_UPDATES READ_LOGS WRITE_CALENDAR DELETE_CACHE_FILES READ_PHONE_STATE WRITE_CONTACTS DELETE_PACKAGES READ_SMS WRITE_EXTERNAL_STORAGE DEVICE_POWER READ_SYNC_SETTINGS WRITE_GSERVICES WRITE_HISTORY_BOOKMARKS WRITE_SECURE_SETTINGS WRITE_SETTINGS WRITE_SMS WRITE_SYNC_SETTINGS
  • 27. Phone Calls Read Phone State and Identity System Tools Modify Global System Settings Prevent Device From Sleeping Permissions ! Bluetooth Administration Change Wi-Fi State Change Network Connectivity Automatically Start at Boot Network Communication Full Internet Access Create Bluetooth Connections View Network State View Wi-Fi State Your Personal Information Read Contact Data Add or Modify Calendar Events and Send Email To Guests https://market.android.com/details?id=com.pandora.android&feature=search_result – 4/25/2011
  • 28. Just a bit deeper… Google purchases AdMob for $750 million dollars. Closed May, 2010
  • 29. ESPN, CBS Interactive, Geico, Starbucks… 100,000 – 500,000 installations Permissions: • FINE (GPS) LOCATION • COARSE (NETWORK-BASED) LOCATION • FULL INTERNET ACCESS 5,000,000 – 10,000,000 installation Permissions: • RECORD AUDIO • CHANGE YOUR AUDIO SETTINGS • FINE (GPS) LOCATION • COARSE (NETWORK-BASED) LOCATION • FULL INTERNET ACCESS • MODIFY/DELETE USB STORAGE CONTENTS MODIFY/DELETE SD CARD CONTENTS • PREVENT DEVICE FROM SLEEPING Permissions retrieved from official Android Marketplace on 4/25/2011
  • 32. One week later... 1. http://www.rollingstone.com/culture/blogs/gear-up/pandora-responds-to- claims-that-its-online-service-violates-user-privacy-20110415
  • 34. Here are Some Numbers… Permissions Requeste d! 24% GPS information (11,929)! 8% Read Contacts (3,6 26)! 53,000 - # Of 4% Send SMS (1,693)! Applications 3% Receive SMS (1262 )! 2%Record Audio (1100 Analyzed! )! 2% Read SMS (832)! ! 1% Process Outgoing! ~48,000 Android 3 Average Numb er of Calls (323)! Market! Permissions .5% Use Credentials (2 48)! ~5,000 3rd Party Requested! Markets! ! 117 Most Reque sted for Single Application!
  • 35. And Even More Numbers… Total Third Party Libraries: ~83,000! ! Top Shared Libraries "! 38% com.admob (18,426 apps )! 8% org.apache ( 3,684 apps )! 6% com.google.android ( 2,838 apps )! 6% com.google.ads ( 2,779 apps )! 6% com.flurry ( 2,762 apps )! 4% com.mobclix ( 2,055 apps )! 4% com.millennialmedia ( 1,758 apps)! 4% com.facebook ( 1,707 apps)!
  • 36. Code Reuse Most Code Is! ! Outsourcing Reused! Outsourced! 3rd Party Libraries (with source)! 3rd Party Libraries (binary format)! Third Party Libraries ! Nobody really knows what their code does!!
  • 37. Risk Transference! ! Your code! Your libraries! Outsourced code! 3rd party libraries! Purchased code! COTS code! ! ! Contract your vendors to do the same! I’ll Accept that Risk! Pass it on over..
  • 38. Tyler Shields @txs tshields@veracode.com txs@donkeyonawaffle.org Summary Case Studies! ape! ! L andsc rity No Hardcoded Passwords! On ile Secu ly T P Mob ! atio ns ! ! ake rivacy! pplic k! Wh l e A Encrypt Data In Transit! at Y Mobi High Ris Be H one ! ou Nee Ar e ! st W d! ! ! bile Code Secure Data At Rest! Use ith You iou s Mo Flaws! rs! r! M alic Co ding ! Be W ! M obile a Analyze Security of ALL Code! Tran ry of R sfe (Includes Code Reuse)! renc isk e !