SlideShare a Scribd company logo
Mobile security and OWASP mobile
Nikola Milošević
nikola.milosevic@owasp.org
@dreadknight011
About OWASP
• The Open Web Application Security Project (OWASP) is a worldwide not-for-profit
organization focused on improving the security of software. Our mission is to make
software security visible, so that individuals and organizations worldwide can make
informed decisions about true software security risks.
• Values:
• OPEN – transparent finances, open source code
• INNOVATION - encourages experimenting
• GLOBAL - everyone can contribute
• INTEGRITY - honest and truthful, vendor neutral, global community
• Over 300 local chapters with at least quarterly meetings
• Over 130 projects
• OWASP chapter in Serbia since 2012
About Me
• My name is Nikola Milošević
• OWASP Serbia local chapter founder
• OWASP Manchester local chapter leader
• OWASP Seraphimdroid project leader
• 2014 Google Summer of Code mentor
• OWASP anti-malware project contributor
• Teaching assistant and PhD student at the University of
Manchester
• Research: Text mining, natural language processing, linked
big data, semantic web (lot of buzzwords)
Going mobile
Internet of things
Security perspective
• Smart means vulnerable
• Main motives: Money, processing power
Simple example
OWASP Mobile project
• Composed of several smaller project:
•Top 10 mobile risks
•Mobile Tools
•GoatDroid,iGoat
•Seraphimdroid
•Damn Vulnerable iOS Application
•MobiSec
•...
•Mobile Security testing
•Mobile Application Threat Model
Mobile Top 10
• aa
1. Weak Server side controls
• Everything that a mobile application can do badly that does not take
place on the phone
• Unvalidated input affecting API, web service, web application
• Injections (SQL, XSS, XXE...), Authentication flaws, Session
Management flaws, Access control vulnerabilities, Local and Remote
File Includes
• Secure coding and configuration
practices must be used on server-side
of the mobile application.
2. Insecure Data Storage
• Assumption that users or malware will not access file
system
• Sensitive and personal information stored in sensitive
format
• Identity Theft, Fraud, Reputation Damage, External Policy
Violation (PCI) or Material Loss
• SQLite databases, Log Files, Plist Files, XML Data Stores or
Manifest Files, Binary data stores, Cookie stores, SD Card,
Cloud synced
• Do not save data, cryptography
3. Insufficient Transport layer
protection
• Application may not use TLS for all client-server
communication
• Could be hard to exploit
• Identity theft, reputation damage, fraud
• Use TLS and SSL correctly, do not allow unsigned
certificates, additional encryption, avoid mixed SSL sessions
4. Unintended data leakage
• Unintended data leakage occurs when a developer places
sensitive information or data in a location on the mobile
device that is easily accessible by other apps on the device.
• Privacy Violations, PCI Violations, Reputational Damage;
or Fraud.
• The way the OS, frameworks
caches data, images,
key-presses, logging,
and buffers.
5. Poor Authorization and
Authentication
• Usually automated
• Bypass application
• Authorizes with
back-end server
• Poor or missing authentication schemes allow to execute
functionality within the app or backend server used by the
mobile app
• Authentication failure exposes authorization
• Re-enforce authentication on server-side
• Local integrity checks (M10)
6. Broken Cryptography
• Weak encryption algorithms or flaws within the
encryption process
• Unauthorized retrieval of
sensitive information
• The best algorithms don't
matter if you mishandle your
keys.
•Always use modern algorithms that are accepted as strong
by the security community
7. Client Side Injection
• Results in the execution of malicious code on the mobile
device via the mobile app.
• Cross-Application Scripting Attacks
• XML, SQL, code injection, XSS
• Input validation
8. Security Decision via
Unstructured Inputs
• Hidden fields and values or any hidden functionality to
distinguish higher level users from lower level users
• Weak implementation of such functionalities leads to
improper behavior
• Hooking functionality, IPC as an attack vector
• White-list of trusted applications, value validation
9. Improper Session Handling
• Occurs when the session token is unintentionally shared
with the adversary during the transaction
•Failure to Invalidate Sessions on the Backend
•Lack of Adequate Timeout
•Protection
•Failure to Properly Rotate
•Cookies
•Insecure Token Creation
• Adversary can impersonate the user
10. Lack of Binary Protection
• A lack of binary protections results in a mobile app that
can be analyzed, reverse-engineered, and modified by an
adversary in rapid fashion
• Jailbreak Detection Controls;
• Checksum Controls;
• Certificate Pinning Controls;
• Debugger Detection Controls.
• Protection only slows down the adversary
OWASP Seraphimdroid
• OWASP Seraphimdroid is an Android app
• Features:
• Privacy protection
• Anti-theft
• Dynamic malicious action protection
• Education and awareness
• Open source
OWASP Seraphimdroid
• Development started in 2013 as Lab project
• First version published after Google Summer of Code 2014
• Furquan Ahmed
•3 months full-time student coding
• Google sponsored with $5500
• Added 11 500+ lines of code
• Currently it is Incubator project
• OWASP review board gave it trumps up
OWASP Seraphimdroid
Conclusion
• You cannot be 100% safe, but you can make it hard –
Defense in Depth
• Avoid storing sensitive data on the device
• If you have to, encrypt with PBE master key encryption
• Use anti-debug and anti-reversing measures
• Clear memory after use
• Test on a Jailbroken or rooted device – see what the bad guys will see
• Know your data, know your platform, know your tools and
use that knowledge to protect your apps
Thank you
http://inspiratron.org
nikola.milosevic@owasp.org
@dreadknight011

More Related Content

PDF
PDF
Owasp Mobile Top 10 – 2014
PPTX
Owasp mobile top 10
PPTX
Addressing the OWASP Mobile Security Threats using Xamarin
PDF
Mobile Threats and Owasp Top 10 Risks
PDF
Owasp Mobile Top 10 - M7 & M8
PDF
OWASP Mobile Security: Top 10 Risks for 2017
PDF
State of OWASP 2015
Owasp Mobile Top 10 – 2014
Owasp mobile top 10
Addressing the OWASP Mobile Security Threats using Xamarin
Mobile Threats and Owasp Top 10 Risks
Owasp Mobile Top 10 - M7 & M8
OWASP Mobile Security: Top 10 Risks for 2017
State of OWASP 2015

What's hot (20)

PPTX
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
PDF
Owasp Top 10 (M-10 : Lack of Binary Protection) | Null Meet
PPTX
OWASP Mobile TOP 10 2014
PDF
OWASP Mobile Top 10 Deep-Dive
PDF
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
PDF
OWASP Top Ten in Practice
PDF
Mobile Application Security Code Reviews
PPTX
Career In Information security
PPTX
OWASP Top Ten 2017
PPTX
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
PDF
OWASP Top 10 A4 – Insecure Direct Object Reference
PDF
(ISC)2 Kamprianis - Mobile Security
PDF
OWASP Day - OWASP Day - Lets secure!
PPTX
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
PDF
Owasp advanced mobile-application-code-review-techniques-v0.2
PPTX
Cyber Resiliency
PPTX
Secure Coding 2013
PDF
[OPD 2019] Governance as a missing part of IT security architecture
PPTX
Security O365 Using AI-based Advanced Threat Protection
PDF
OWASP Thailand-Beyond the Penetration Testing
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Top 10 (M-10 : Lack of Binary Protection) | Null Meet
OWASP Mobile TOP 10 2014
OWASP Mobile Top 10 Deep-Dive
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top Ten in Practice
Mobile Application Security Code Reviews
Career In Information security
OWASP Top Ten 2017
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
OWASP Top 10 A4 – Insecure Direct Object Reference
(ISC)2 Kamprianis - Mobile Security
OWASP Day - OWASP Day - Lets secure!
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Owasp advanced mobile-application-code-review-techniques-v0.2
Cyber Resiliency
Secure Coding 2013
[OPD 2019] Governance as a missing part of IT security architecture
Security O365 Using AI-based Advanced Threat Protection
OWASP Thailand-Beyond the Penetration Testing
Ad

Similar to Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid (20)

PDF
Unicom Conference - Mobile Application Security
PDF
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
PDF
OWASP Mobile Top 10
PPTX
Webdays blida mobile top 10 risks
PDF
The fundamentals of Android and iOS app security
PDF
Mobile Application Security Threats through the Eyes of the Attacker
PPTX
Appsecurity, win or loose
PPTX
Security as a top of mind issue for mobile application development
PDF
Mobile security chess board - attacks & defense
PDF
Securing Mobile Apps - Appfest Version
PPTX
Top 10 mobile security risks - Khổng Văn Cường
PPTX
Top 10 mobile security risks - Khổng Văn Cường
PPTX
Owasp top-10-mobile-risks-v-1-3 publish
PDF
Menofia UN -Mobile Security
PPTX
Fragments-Plug the vulnerabilities in your App
PDF
DataMindsConnect2018_SECDEVOPS
PDF
Securing Your Mobile Applications
PDF
OWASP Top 10 Mobile Risks
PDF
Mobile-threat-analysis-short-presentation_owasp.pdf
PDF
Android Application Security from consumer and developer perspectives
Unicom Conference - Mobile Application Security
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
OWASP Mobile Top 10
Webdays blida mobile top 10 risks
The fundamentals of Android and iOS app security
Mobile Application Security Threats through the Eyes of the Attacker
Appsecurity, win or loose
Security as a top of mind issue for mobile application development
Mobile security chess board - attacks & defense
Securing Mobile Apps - Appfest Version
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
Owasp top-10-mobile-risks-v-1-3 publish
Menofia UN -Mobile Security
Fragments-Plug the vulnerabilities in your App
DataMindsConnect2018_SECDEVOPS
Securing Your Mobile Applications
OWASP Top 10 Mobile Risks
Mobile-threat-analysis-short-presentation_owasp.pdf
Android Application Security from consumer and developer perspectives
Ad

More from Nikola Milosevic (20)

PPTX
Classifying intangible social innovation concepts using machine learning and ...
PPTX
Machine learning (ML) and natural language processing (NLP)
PPTX
Veštačka inteligencija
PPTX
AI an the future of society
PPTX
Machine learning prediction of stock markets
PPTX
Equity forecast: Predicting long term stock market prices using machine learning
PPTX
BelBi2016 presentation: Hybrid methodology for information extraction from ta...
PPTX
Extracting patient data from tables in clinical literature
PPTX
Supporting clinical trial data curation and integration with table mining
PPTX
PPTX
Table mining and data curation from biomedical literature
PDF
PDF
Sentiment analysis for Serbian language
PDF
Http and security
PDF
Android business models
ODP
Android(1)
PPT
Sigurnosne prijetnje i mjere zaštite IT infrastrukture
PPTX
Mašinska analiza sentimenta rečenica na srpskom jeziku
PPT
PDF
Software Freedom day Serbia - Owasp - informaciona bezbednost u Srbiji open s...
Classifying intangible social innovation concepts using machine learning and ...
Machine learning (ML) and natural language processing (NLP)
Veštačka inteligencija
AI an the future of society
Machine learning prediction of stock markets
Equity forecast: Predicting long term stock market prices using machine learning
BelBi2016 presentation: Hybrid methodology for information extraction from ta...
Extracting patient data from tables in clinical literature
Supporting clinical trial data curation and integration with table mining
Table mining and data curation from biomedical literature
Sentiment analysis for Serbian language
Http and security
Android business models
Android(1)
Sigurnosne prijetnje i mjere zaštite IT infrastrukture
Mašinska analiza sentimenta rečenica na srpskom jeziku
Software Freedom day Serbia - Owasp - informaciona bezbednost u Srbiji open s...

Recently uploaded (20)

PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPT
Introduction Database Management System for Course Database
PDF
Nekopoi APK 2025 free lastest update
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
AI in Product Development-omnex systems
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Digital Strategies for Manufacturing Companies
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
Introduction to Artificial Intelligence
PTS Company Brochure 2025 (1).pdf.......
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
ManageIQ - Sprint 268 Review - Slide Deck
How to Choose the Right IT Partner for Your Business in Malaysia
How Creative Agencies Leverage Project Management Software.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Introduction Database Management System for Course Database
Nekopoi APK 2025 free lastest update
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
2025 Textile ERP Trends: SAP, Odoo & Oracle
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
ISO 45001 Occupational Health and Safety Management System
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Navsoft: AI-Powered Business Solutions & Custom Software Development
AI in Product Development-omnex systems
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Digital Strategies for Manufacturing Companies
Design an Analysis of Algorithms II-SECS-1021-03
Introduction to Artificial Intelligence

Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid

  • 1. Mobile security and OWASP mobile Nikola Milošević nikola.milosevic@owasp.org @dreadknight011
  • 2. About OWASP • The Open Web Application Security Project (OWASP) is a worldwide not-for-profit organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. • Values: • OPEN – transparent finances, open source code • INNOVATION - encourages experimenting • GLOBAL - everyone can contribute • INTEGRITY - honest and truthful, vendor neutral, global community • Over 300 local chapters with at least quarterly meetings • Over 130 projects • OWASP chapter in Serbia since 2012
  • 3. About Me • My name is Nikola Milošević • OWASP Serbia local chapter founder • OWASP Manchester local chapter leader • OWASP Seraphimdroid project leader • 2014 Google Summer of Code mentor • OWASP anti-malware project contributor • Teaching assistant and PhD student at the University of Manchester • Research: Text mining, natural language processing, linked big data, semantic web (lot of buzzwords)
  • 6. Security perspective • Smart means vulnerable • Main motives: Money, processing power
  • 8. OWASP Mobile project • Composed of several smaller project: •Top 10 mobile risks •Mobile Tools •GoatDroid,iGoat •Seraphimdroid •Damn Vulnerable iOS Application •MobiSec •... •Mobile Security testing •Mobile Application Threat Model
  • 10. 1. Weak Server side controls • Everything that a mobile application can do badly that does not take place on the phone • Unvalidated input affecting API, web service, web application • Injections (SQL, XSS, XXE...), Authentication flaws, Session Management flaws, Access control vulnerabilities, Local and Remote File Includes • Secure coding and configuration practices must be used on server-side of the mobile application.
  • 11. 2. Insecure Data Storage • Assumption that users or malware will not access file system • Sensitive and personal information stored in sensitive format • Identity Theft, Fraud, Reputation Damage, External Policy Violation (PCI) or Material Loss • SQLite databases, Log Files, Plist Files, XML Data Stores or Manifest Files, Binary data stores, Cookie stores, SD Card, Cloud synced • Do not save data, cryptography
  • 12. 3. Insufficient Transport layer protection • Application may not use TLS for all client-server communication • Could be hard to exploit • Identity theft, reputation damage, fraud • Use TLS and SSL correctly, do not allow unsigned certificates, additional encryption, avoid mixed SSL sessions
  • 13. 4. Unintended data leakage • Unintended data leakage occurs when a developer places sensitive information or data in a location on the mobile device that is easily accessible by other apps on the device. • Privacy Violations, PCI Violations, Reputational Damage; or Fraud. • The way the OS, frameworks caches data, images, key-presses, logging, and buffers.
  • 14. 5. Poor Authorization and Authentication • Usually automated • Bypass application • Authorizes with back-end server • Poor or missing authentication schemes allow to execute functionality within the app or backend server used by the mobile app • Authentication failure exposes authorization • Re-enforce authentication on server-side • Local integrity checks (M10)
  • 15. 6. Broken Cryptography • Weak encryption algorithms or flaws within the encryption process • Unauthorized retrieval of sensitive information • The best algorithms don't matter if you mishandle your keys. •Always use modern algorithms that are accepted as strong by the security community
  • 16. 7. Client Side Injection • Results in the execution of malicious code on the mobile device via the mobile app. • Cross-Application Scripting Attacks • XML, SQL, code injection, XSS • Input validation
  • 17. 8. Security Decision via Unstructured Inputs • Hidden fields and values or any hidden functionality to distinguish higher level users from lower level users • Weak implementation of such functionalities leads to improper behavior • Hooking functionality, IPC as an attack vector • White-list of trusted applications, value validation
  • 18. 9. Improper Session Handling • Occurs when the session token is unintentionally shared with the adversary during the transaction •Failure to Invalidate Sessions on the Backend •Lack of Adequate Timeout •Protection •Failure to Properly Rotate •Cookies •Insecure Token Creation • Adversary can impersonate the user
  • 19. 10. Lack of Binary Protection • A lack of binary protections results in a mobile app that can be analyzed, reverse-engineered, and modified by an adversary in rapid fashion • Jailbreak Detection Controls; • Checksum Controls; • Certificate Pinning Controls; • Debugger Detection Controls. • Protection only slows down the adversary
  • 20. OWASP Seraphimdroid • OWASP Seraphimdroid is an Android app • Features: • Privacy protection • Anti-theft • Dynamic malicious action protection • Education and awareness • Open source
  • 21. OWASP Seraphimdroid • Development started in 2013 as Lab project • First version published after Google Summer of Code 2014 • Furquan Ahmed •3 months full-time student coding • Google sponsored with $5500 • Added 11 500+ lines of code • Currently it is Incubator project • OWASP review board gave it trumps up
  • 23. Conclusion • You cannot be 100% safe, but you can make it hard – Defense in Depth • Avoid storing sensitive data on the device • If you have to, encrypt with PBE master key encryption • Use anti-debug and anti-reversing measures • Clear memory after use • Test on a Jailbroken or rooted device – see what the bad guys will see • Know your data, know your platform, know your tools and use that knowledge to protect your apps