SlideShare a Scribd company logo
Building Secure Mobile Apps
Sergey Gorbaty
Senior Product Security Engineer
@ser_gor
Martin Vigo
Associate Product Security Engineer
@martin_vigo
Safe Harbor
Safe harbor statement under the Private Securities Litigation ReformAct of 1995:
This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of
the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking
statements we make.All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service
availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future
operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of
our services.
The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service,
new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or
delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and
acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and
manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization
and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our
annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and
others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site.
Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be
delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available.
Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
Martin Vigo
Product Security Engineer
Sergey Gorbaty
Senior Product Security Engineer
Outline
• Attacks on Mobile Apps
• Developing Secure Mobile Apps
• What Frameworks Help You With
Attacks on Mobile Apps
Mobile App Threats
• Native Mobile App Threats
– File system, DB Storage, Logs
– Network Communication
– Clipboard
– Backups
– RPC, URL scheme handlers
• Web App Threats
– Input validation
• Session management
• Web app logic flaws
– Web vulnerabilities
• XSS, CSRF
• Injections
– SQL, header
Native App Threats
• File system
– Excessive Logging
– Storing credentials and sensitive data unencrypted
– Hardcoded secrets
– Cached data
• Network Communication
– Not using TLS/SSL
– Using self-signed SSL in QA and not disabling in production
– Not using proper session management
• Clipboard
– Any app can read all messages
• Backups
– Sensitive data can be backed up to PC/Cloud
Web App Threats
• Application logic flaws
– Skipping through Activities in Android applications
– Malicious Intents launched from attacker’s website
• Web security
– Input validation
• Accept any input
– Output Encoding
• Make sure the tainted data is sanitized
• XSS
• Header injections
– Protecting sensitive actions
• CSRF
Outline
• Attacks on Mobile Apps
• Developing Secure Mobile Apps
• What Frameworks Help You With
Developing Secure Mobile Apps
• iOS/OS X ‘Secure Coding Guide’
– Comprehensive, 120 pages long
– Covers topics from buffer overflows to web vulnerabilities
– https://developer.apple.com/library/iOs/documentation/Security/Conceptual/SecureCodingGuide/S
ecureCodingGuide.pdf
• Android.com ‘Security Tips’
– 6 articles on
• Storing data
• Using permissions
• Using networking
• Using RPC
• Webview security
– http://developer.android.com/training/articles/security-tips.html
Outline
• Attacks on Mobile Apps
• Developing Secure Mobile Apps
• What Frameworks Help You With
Mobile Frameworks
The breakdown
• All focus on rapid development using HTML
• Most provide easy ways of creating secure TLS connections
• Fair amount provide authentication support
• Few provide secure credential storage
• Very few provide secure data storage
Protecting Data
Salesforce Mobile SDK - github.com/forcedotcom
• Uses proper peer reviewed crypto with random IV, cipher mode and padding
• Secrets are properly stored
– Keychain
– AccountManager
• PIN code support for added security
• TLS
• Cordova plugins are properly scoped
• Limited amount of logging
Demo
Looking at files inside Apple Sandbox - iExplorer
Hybrid Apps
• Can access device internals through plugins
– Camera, photos
– Accelerometer, GPS, Compass, Gyroscope
– Keychain
– SD card
– Etc.
Demo
XSS with BEEF on Hybrid mobile app
Protecting Mobile Apps
What to focus on
• Follow best development practices
– Brush up on OWASP top 10 mobile threats
– Review official vendor recommendations
– Follow recommendations for storing secrets and data
– Exercise minimal logging
– Using TLS
– Use security frameworks, don’t roll your own crypto
• Use free security assessment tools
– HTTP traffic examination: Burp Suite, Fiddler, Charles Proxy
– App sandbox examination: iExplorer, drozer, Android debugging bridge
– Source code review: Findbugs, Brakeman, Scanjs
Building secure mobile apps

More Related Content

PDF
Mobile Application Security Code Reviews
PDF
Tips and Tricks for Building Secure Mobile Apps
PDF
Designing Secure Mobile Apps
PPTX
Secure SDLC in mobile software development.
PDF
Tips and Tricks for Building Secure Mobile Apps
PPTX
PDF
Jump Start Your Application Security Knowledge
PDF
Symantec Mobile Security Whitepaper June 2011
Mobile Application Security Code Reviews
Tips and Tricks for Building Secure Mobile Apps
Designing Secure Mobile Apps
Secure SDLC in mobile software development.
Tips and Tricks for Building Secure Mobile Apps
Jump Start Your Application Security Knowledge
Symantec Mobile Security Whitepaper June 2011

What's hot (20)

PDF
Mobile Browser Content Handling
PDF
Mobile Security
PDF
Top Strategies to Capture Security Intelligence for Applications
PPTX
Security testing of mobile applications
PDF
2012 State of Mobile Survey Global Key Findings
PDF
Mobile Security for Smartphones and Tablets
PDF
Bringing Government and Enterprise Security Controls to the Android Endpoint
PDF
Malware on Smartphones and Tablets: The Inconvenient Truth
PDF
Challenges in Testing Mobile App Security
PDF
C0c0n 2011 mobile security presentation v1.2
PDF
New trends in Payments Security: NFC & Mobile
PPT
2010: Mobile Security - WHYMCA Developer Conference
PDF
Malware on Smartphones and Tablets - The Inconvenient Truth
PPTX
Understanding Your Attack Surface and Detecting & Mitigating External Threats
PDF
Mobile Application Security
PDF
Security Testing Mobile Applications
PPTX
Mobile security
PDF
What’s the State of Your Endpoint Security?
PDF
Mobile Security: The 5 Questions Modern Organizations Are Asking
PPTX
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Mobile Browser Content Handling
Mobile Security
Top Strategies to Capture Security Intelligence for Applications
Security testing of mobile applications
2012 State of Mobile Survey Global Key Findings
Mobile Security for Smartphones and Tablets
Bringing Government and Enterprise Security Controls to the Android Endpoint
Malware on Smartphones and Tablets: The Inconvenient Truth
Challenges in Testing Mobile App Security
C0c0n 2011 mobile security presentation v1.2
New trends in Payments Security: NFC & Mobile
2010: Mobile Security - WHYMCA Developer Conference
Malware on Smartphones and Tablets - The Inconvenient Truth
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Mobile Application Security
Security Testing Mobile Applications
Mobile security
What’s the State of Your Endpoint Security?
Mobile Security: The 5 Questions Modern Organizations Are Asking
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Ad

Similar to Building secure mobile apps (20)

PDF
Secure Salesforce: Hardened Apps with the Mobile SDK
PDF
Secure Salesforce: Hardened Apps with the Mobile SDK
PPT
Security Best Practices for Mobile Development @ Dreamforce 2013
PPTX
S1 Tour Paris Developpeurs
PDF
Security Best Practices for Mobile Development
PDF
Creating HTML5 Applications with jQuery Mobile, Ruby and Database.com
PDF
Creating HTML5 Applications with jQuery Mobile, Ruby and Database.com
PPTX
Mobile Packs From Salesforce.com
PDF
Security Best Practices for Mobile Development
PPTX
Building a great mobile experience on the force.com platforms
PPTX
Creating HTML5 Applications with jQuery Mobile, Ruby and Database.com
PDF
Intro to the Salesforce Mobile SDK: Building iOS Apps Webinar
PDF
An Insider's Guide to Security Review (October 13, 2014)
PPTX
Modev presentation
PDF
Intro to the Salesforce Mobile SDK: Building Android Apps
PPT
Salesforce Summer of Hacks London - Introduction
PDF
Creating secure apps using the salesforce mobile sdk
PPTX
Mobile Developer Week
PPTX
Mobile App Security: Enterprise Checklist
PPTX
Salesforce App Cloud First Call Deck
Secure Salesforce: Hardened Apps with the Mobile SDK
Secure Salesforce: Hardened Apps with the Mobile SDK
Security Best Practices for Mobile Development @ Dreamforce 2013
S1 Tour Paris Developpeurs
Security Best Practices for Mobile Development
Creating HTML5 Applications with jQuery Mobile, Ruby and Database.com
Creating HTML5 Applications with jQuery Mobile, Ruby and Database.com
Mobile Packs From Salesforce.com
Security Best Practices for Mobile Development
Building a great mobile experience on the force.com platforms
Creating HTML5 Applications with jQuery Mobile, Ruby and Database.com
Intro to the Salesforce Mobile SDK: Building iOS Apps Webinar
An Insider's Guide to Security Review (October 13, 2014)
Modev presentation
Intro to the Salesforce Mobile SDK: Building Android Apps
Salesforce Summer of Hacks London - Introduction
Creating secure apps using the salesforce mobile sdk
Mobile Developer Week
Mobile App Security: Enterprise Checklist
Salesforce App Cloud First Call Deck
Ad

More from Martin Vigo (11)

PDF
Phonerator, an advanced *valid* phone number generator for your OSINT/SE needs
PDF
Phonerator, an advanced *valid* phone number generator for your OSINT/SE needs
PDF
From email address to phone number, a new OSINT approach
PDF
Ransombile: yet another reason to ditch sms
PDF
Compromising online accounts by cracking voicemail systems
PDF
Mobile apps security. Beyond XSS, CSRF and SQLi
PDF
Breaking vaults: Stealing Lastpass protected secrets
PDF
Even the LastPass Will be Stolen Deal with It!
PDF
Security Vulnerabilities: How to Defend Against Them
PDF
Do-it-Yourself Spy Program: Abusing Apple’s Call Relay Protocol
PDF
Do-it-Yourself Spy Program: Abusing Apple’s Call Relay Protocol
Phonerator, an advanced *valid* phone number generator for your OSINT/SE needs
Phonerator, an advanced *valid* phone number generator for your OSINT/SE needs
From email address to phone number, a new OSINT approach
Ransombile: yet another reason to ditch sms
Compromising online accounts by cracking voicemail systems
Mobile apps security. Beyond XSS, CSRF and SQLi
Breaking vaults: Stealing Lastpass protected secrets
Even the LastPass Will be Stolen Deal with It!
Security Vulnerabilities: How to Defend Against Them
Do-it-Yourself Spy Program: Abusing Apple’s Call Relay Protocol
Do-it-Yourself Spy Program: Abusing Apple’s Call Relay Protocol

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
KodekX | Application Modernization Development
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Understanding_Digital_Forensics_Presentation.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
KodekX | Application Modernization Development
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Modernizing your data center with Dell and AMD
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Monthly Chronicles - July 2025
Electronic commerce courselecture one. Pdf
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The AUB Centre for AI in Media Proposal.docx
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx

Building secure mobile apps

  • 1. Building Secure Mobile Apps Sergey Gorbaty Senior Product Security Engineer @ser_gor Martin Vigo Associate Product Security Engineer @martin_vigo
  • 2. Safe Harbor Safe harbor statement under the Private Securities Litigation ReformAct of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make.All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
  • 4. Sergey Gorbaty Senior Product Security Engineer
  • 5. Outline • Attacks on Mobile Apps • Developing Secure Mobile Apps • What Frameworks Help You With
  • 7. Mobile App Threats • Native Mobile App Threats – File system, DB Storage, Logs – Network Communication – Clipboard – Backups – RPC, URL scheme handlers • Web App Threats – Input validation • Session management • Web app logic flaws – Web vulnerabilities • XSS, CSRF • Injections – SQL, header
  • 8. Native App Threats • File system – Excessive Logging – Storing credentials and sensitive data unencrypted – Hardcoded secrets – Cached data • Network Communication – Not using TLS/SSL – Using self-signed SSL in QA and not disabling in production – Not using proper session management • Clipboard – Any app can read all messages • Backups – Sensitive data can be backed up to PC/Cloud
  • 9. Web App Threats • Application logic flaws – Skipping through Activities in Android applications – Malicious Intents launched from attacker’s website • Web security – Input validation • Accept any input – Output Encoding • Make sure the tainted data is sanitized • XSS • Header injections – Protecting sensitive actions • CSRF
  • 10. Outline • Attacks on Mobile Apps • Developing Secure Mobile Apps • What Frameworks Help You With
  • 11. Developing Secure Mobile Apps • iOS/OS X ‘Secure Coding Guide’ – Comprehensive, 120 pages long – Covers topics from buffer overflows to web vulnerabilities – https://developer.apple.com/library/iOs/documentation/Security/Conceptual/SecureCodingGuide/S ecureCodingGuide.pdf • Android.com ‘Security Tips’ – 6 articles on • Storing data • Using permissions • Using networking • Using RPC • Webview security – http://developer.android.com/training/articles/security-tips.html
  • 12. Outline • Attacks on Mobile Apps • Developing Secure Mobile Apps • What Frameworks Help You With
  • 13. Mobile Frameworks The breakdown • All focus on rapid development using HTML • Most provide easy ways of creating secure TLS connections • Fair amount provide authentication support • Few provide secure credential storage • Very few provide secure data storage
  • 14. Protecting Data Salesforce Mobile SDK - github.com/forcedotcom • Uses proper peer reviewed crypto with random IV, cipher mode and padding • Secrets are properly stored – Keychain – AccountManager • PIN code support for added security • TLS • Cordova plugins are properly scoped • Limited amount of logging
  • 15. Demo Looking at files inside Apple Sandbox - iExplorer
  • 16. Hybrid Apps • Can access device internals through plugins – Camera, photos – Accelerometer, GPS, Compass, Gyroscope – Keychain – SD card – Etc.
  • 17. Demo XSS with BEEF on Hybrid mobile app
  • 18. Protecting Mobile Apps What to focus on • Follow best development practices – Brush up on OWASP top 10 mobile threats – Review official vendor recommendations – Follow recommendations for storing secrets and data – Exercise minimal logging – Using TLS – Use security frameworks, don’t roll your own crypto • Use free security assessment tools – HTTP traffic examination: Burp Suite, Fiddler, Charles Proxy – App sandbox examination: iExplorer, drozer, Android debugging bridge – Source code review: Findbugs, Brakeman, Scanjs