SlideShare a Scribd company logo
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
iOS and Android Security:
Differences You Need to Know
August 22, 2016 | Security By Design Meetup
David Weinstein
Director of Research
@insitusec
● 10+ years of cybersecurity experience
● Former senior engineer at MITRE
Email: dweinstein@nowsecure.com
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
NowSecure: Forged in mobile from day one
Top engineers and researchers
OSS authors of Radare, Frida,
Santoku Linux, and Android VTS
Disclosed Samsung keyboard vulnerability
Impacting 650M+ devices
worldwide
Regular speaking appearances
Black Hat USA, RSA Conference,
OWASP AppSec USA & more
100+ customers
From banking, healthcare, tech,
government & more
Founded in Oak Park, IL
With a strong background in
forensics & enterprise security
2009
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information..
Risk extends deeper than what’s on the surface
What everyone is focused
on: malware
The real security problem
extends much deeper:
Mobile apps leaking
sensitive data
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Mobile app security testing
● Fully automated static and dynamic
analysis with results in minutes
● Analysis for iOS and Android
performed on real devices
● Scalability and consistency via
Cloud-based solution
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Problems we address:
So you can succeed in testing mobile apps
1 Teams are overwhelmed with mobile app testing
2 Static testing returns too many false positives
3 Organizations lack a process for mobile
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Platform Security - Year In Review
Differential Privacy
Lock Screen Widgets
`
image3/image4 no longer enc.
Personal ID Codesigning
App Transport Security
Keychain ACLs, TouchID
canOpenUrl changes
Hardened Webkit
usesCleartextTraffic
SE Android Enforcing, Breaking
Apps
Instant Apps
Verified Boot
networkSecurityConfig
“Project Svelte”
Runtime Permissions
FS Permissions
Apple Android
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Quick Stats
Top 50 free iOS apps:
- 80% using NSAllowsArbitraryLoads
- 34% using NSExceptionDomains
- 0 using MinimumTLSVersion exception
Top 50 free Android apps:
- Only Chrome using networkSecurityPolicy,
services with isolatedProcess
- None leaving debuggable flag enabled
- 66% set allowBackup true
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information..

More Related Content

PDF
The fundamentals of Android and iOS app security
PDF
How to make Android apps secure: dos and don’ts
PDF
Five mobile security challenges facing the enterprise
PDF
Shifting left: Continuous testing for better app quality and security
PDF
Mobile Penetration Testing: Episode II - Attack of the Code
PDF
Mobile Penetration Testing: Episode 1 - The Forensic Menace
PDF
OWASP Mobile Top 10
PDF
5 Ways to Protect your Mobile Security
The fundamentals of Android and iOS app security
How to make Android apps secure: dos and don’ts
Five mobile security challenges facing the enterprise
Shifting left: Continuous testing for better app quality and security
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode 1 - The Forensic Menace
OWASP Mobile Top 10
5 Ways to Protect your Mobile Security

What's hot (20)

PDF
2015 Cybersecurity Predictions
PDF
Debunking the Top 5 Myths About Mobile AppSec
PPTX
How Healthcare CISOs Can Secure Mobile Devices
PPTX
Accessibility Clickjacking, Devastating Android Vulnerability
PPTX
How to Add Advanced Threat Defense to Your EMM
PDF
Case Closed with IBM Application Security on Cloud infographic
PDF
Xamarin security talk slideshare
PDF
Mobile hacking, pentest, and malware
PDF
The New NotCompatible
PDF
Mobile App Hacking In A Nutshell
PDF
Android Security Development
PDF
Patches Arrren't Just for Pirates
PDF
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
PDF
Cybersecurity Fundamentals for Bar Associations
PPTX
Three Secrets to Becoming a Mobile Security Superhero
PDF
Jump-Start The MASVS
PDF
Mobile Hacking
PPTX
Web Application Security
PDF
How To [relatively] Secure your Web Applications
PDF
Malware on Smartphones and Tablets - The Inconvenient Truth
2015 Cybersecurity Predictions
Debunking the Top 5 Myths About Mobile AppSec
How Healthcare CISOs Can Secure Mobile Devices
Accessibility Clickjacking, Devastating Android Vulnerability
How to Add Advanced Threat Defense to Your EMM
Case Closed with IBM Application Security on Cloud infographic
Xamarin security talk slideshare
Mobile hacking, pentest, and malware
The New NotCompatible
Mobile App Hacking In A Nutshell
Android Security Development
Patches Arrren't Just for Pirates
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
Cybersecurity Fundamentals for Bar Associations
Three Secrets to Becoming a Mobile Security Superhero
Jump-Start The MASVS
Mobile Hacking
Web Application Security
How To [relatively] Secure your Web Applications
Malware on Smartphones and Tablets - The Inconvenient Truth
Ad

Similar to iOS and Android security: Differences you need to know (20)

PDF
5 Mobile App Security MUST-DOs in 2018
PDF
Mobile App Security Predictions 2019
PDF
Building a Mobile App Pen Testing Blueprint
PDF
Android Q & iOS 13 Privacy Enhancements
PDF
How to scale mobile application security testing
PDF
Vetting Mobile Apps for Corporate Use: Security Essentials
PDF
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
PDF
It's not about you: Mobile security in 2016
PDF
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
PDF
Security Best Practices for Mobile Development
PDF
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
PDF
Challenges in Testing Mobile App Security
PDF
Unicom Conference - Mobile Application Security
PPTX
Building a Mobile Security Program
PDF
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
PDF
Preparing for the inevitable: The mobile incident response playbook
PDF
Android P Security Updates: What You Need to Know
PPTX
Security Imeprative for iOS and Android Apps
PDF
What attackers know about your mobile apps that you don’t: Banking & FinTech
PDF
Ios Application Security The Definitive Guide For Hackers And Developers Davi...
5 Mobile App Security MUST-DOs in 2018
Mobile App Security Predictions 2019
Building a Mobile App Pen Testing Blueprint
Android Q & iOS 13 Privacy Enhancements
How to scale mobile application security testing
Vetting Mobile Apps for Corporate Use: Security Essentials
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
It's not about you: Mobile security in 2016
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Security Best Practices for Mobile Development
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
Challenges in Testing Mobile App Security
Unicom Conference - Mobile Application Security
Building a Mobile Security Program
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
Preparing for the inevitable: The mobile incident response playbook
Android P Security Updates: What You Need to Know
Security Imeprative for iOS and Android Apps
What attackers know about your mobile apps that you don’t: Banking & FinTech
Ios Application Security The Definitive Guide For Hackers And Developers Davi...
Ad

More from NowSecure (14)

PDF
iOS recon with Radare2
PDF
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
PDF
Jeff's Journey: Best Practices for Securing Mobile App DevOps
PDF
A Risk-Based Mobile App Security Testing Strategy
PDF
iOS 12 Preview - What You Need To Know
PDF
5 Tips for Agile Mobile App Security Testing
PDF
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
PDF
Solving for Compliance: Mobile app security for banking and financial services
PDF
Leaky Mobile Apps: What You Need to Know
PDF
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
PDF
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
PDF
Next-level mobile app security: A programmatic approach
PDF
How Android and iOS Security Enhancements Complicate Threat Detection
PDF
Mobile Penetration Testing: Episode III - Attack of the Code
iOS recon with Radare2
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
Jeff's Journey: Best Practices for Securing Mobile App DevOps
A Risk-Based Mobile App Security Testing Strategy
iOS 12 Preview - What You Need To Know
5 Tips for Agile Mobile App Security Testing
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Solving for Compliance: Mobile app security for banking and financial services
Leaky Mobile Apps: What You Need to Know
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Next-level mobile app security: A programmatic approach
How Android and iOS Security Enhancements Complicate Threat Detection
Mobile Penetration Testing: Episode III - Attack of the Code

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
sap open course for s4hana steps from ECC to s4
PDF
KodekX | Application Modernization Development
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Big Data Technologies - Introduction.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Per capita expenditure prediction using model stacking based on satellite ima...
Programs and apps: productivity, graphics, security and other tools
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
sap open course for s4hana steps from ECC to s4
KodekX | Application Modernization Development
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation theory and applications.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
MIND Revenue Release Quarter 2 2025 Press Release
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Approach and Philosophy of On baking technology
20250228 LYD VKU AI Blended-Learning.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Big Data Technologies - Introduction.pptx
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
Review of recent advances in non-invasive hemoglobin estimation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

iOS and Android security: Differences you need to know

  • 1. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. iOS and Android Security: Differences You Need to Know August 22, 2016 | Security By Design Meetup
  • 2. David Weinstein Director of Research @insitusec ● 10+ years of cybersecurity experience ● Former senior engineer at MITRE Email: dweinstein@nowsecure.com © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
  • 3. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. NowSecure: Forged in mobile from day one Top engineers and researchers OSS authors of Radare, Frida, Santoku Linux, and Android VTS Disclosed Samsung keyboard vulnerability Impacting 650M+ devices worldwide Regular speaking appearances Black Hat USA, RSA Conference, OWASP AppSec USA & more 100+ customers From banking, healthcare, tech, government & more Founded in Oak Park, IL With a strong background in forensics & enterprise security 2009
  • 4. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.. Risk extends deeper than what’s on the surface What everyone is focused on: malware The real security problem extends much deeper: Mobile apps leaking sensitive data
  • 5. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Mobile app security testing ● Fully automated static and dynamic analysis with results in minutes ● Analysis for iOS and Android performed on real devices ● Scalability and consistency via Cloud-based solution
  • 6. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Problems we address: So you can succeed in testing mobile apps 1 Teams are overwhelmed with mobile app testing 2 Static testing returns too many false positives 3 Organizations lack a process for mobile
  • 7. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Platform Security - Year In Review Differential Privacy Lock Screen Widgets ` image3/image4 no longer enc. Personal ID Codesigning App Transport Security Keychain ACLs, TouchID canOpenUrl changes Hardened Webkit usesCleartextTraffic SE Android Enforcing, Breaking Apps Instant Apps Verified Boot networkSecurityConfig “Project Svelte” Runtime Permissions FS Permissions Apple Android
  • 8. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Quick Stats Top 50 free iOS apps: - 80% using NSAllowsArbitraryLoads - 34% using NSExceptionDomains - 0 using MinimumTLSVersion exception Top 50 free Android apps: - Only Chrome using networkSecurityPolicy, services with isolatedProcess - None leaving debuggable flag enabled - 66% set allowBackup true
  • 9. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information..