SlideShare a Scribd company logo
More Apps More Problems
More Apps More Problems
More Apps More Problems
Risk - noun `risk
The possibility of loss or injury
•   •
•   •
•   •
•   •
•   •
•   •
•   •
    •
    •
    •
    •
    •
    •
    •
•   •
•   •
•   •
•   •
•   •
•   •
•
•
•
•
•
More Apps More Problems
More Apps More Problems
More Apps More Problems
•
•
•
•
•
•
•
•
•
•
    •
•
•
•
•
•
•
•
•
•
•
•
•
More Apps More Problems
More Apps More Problems
More Apps More Problems
•
    •

        •



                •
                    •



            •
•

•

•

•
•

    ‣
    ‣



•

    ‣
    ‣
•

    ‣




•
    ‣
    ‣
More Apps More Problems
More Apps More Problems
More Apps More Problems
More Apps More Problems
More Apps More Problems
•

    ‣
    ‣

•
More Apps More Problems
More Apps More Problems
More Apps More Problems
Crowd Sourced                  Current Solutions Inadequate
 Internal Teams                                                Developers
Dev Site A Dev Site B
                                                                                           Security Consultants
                                                                                       • Very expensive
                                                                                       • In short supply
                                                                       iPhone          • Time to results too long
       Dev Site C                                                       Apps
                                         Crowd
                          Internal      Sourcing                                                     Tools
                                                                                       •   Do not scale across sites
           Open                             3rd Party                                  •   Very high noise ratio
          Source         Open               Software          Software Vendors         •   Can not test 3rd party code
                        Source                                     SYMC         MSFT   •   Separation of duties issue

                                   Outsourced
                                                                                                 Developers
                                          Offshore                                     • Do not know how to write
                                                                          Oracle         secure code
                                          Provider
                                                                                       • Prioritize time-to-ship,
                                                                                         functionality over security

                                                                                                  Processes
                                                                                       • Difficult to implement
                         Eastern                 China                                 • Years to fine tune
                         Europe          India                                         • Low adoption (< 1% of US
                              Contractors                                                companies CMMI Level 5
                                                                                         certified)
                                                   Unknown
                                                    Skills
53,000 Applications Analyzed
 Android Market:        ~48,000
 3rd Party Markets:     ~5,000

Permissions Requested
 Average:            3
 Most Requested:     117

Top “Interesting” Permissions
 GPS information:      24%        (11,929)
 Read Contacts:        8%         (3,626)
 Send SMS:             4%         (1,693)
 Receive SMS:          3%         (1262)
 Record Audio:         2%         (1100)
 Read SMS:             2%         (832)
 Process Out Calls:    1%         (323)
 Use Credentials :     0.5%       (248)
More Apps More Problems
52,000 Applications Analyzed
• Android Market:
• 3rd Party Markets:

Third Party Libraries
• Total Third Party Libraries:
• Top Shared Libraries
   -
   -
   -
   -
   -
   -
   -
   -
More Apps More Problems
•

•

    ‣


•

•
•




•


•
Whitelisting

•   Conduct static analysis of candidate applications
•   Create a whitelist
•   Use an unbiased 3rd party
•   Enforcement via mobile policy
More Apps More Problems
More Apps More Problems

More Related Content

PDF
IT Hot Topics - Mobile Security Threats at Every Layer
PPT
Security Best Practices for Mobile Development @ Dreamforce 2013
PDF
CarolinaCon 2005 Web Application Hacking 101
PPTX
2011 celebration
PPTX
Defending Behind the Mobile Device
PDF
Owasp Ireland - The State of Software Security
PDF
Shmoocon 2010 - The Monkey Steals the Berries
PDF
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
IT Hot Topics - Mobile Security Threats at Every Layer
Security Best Practices for Mobile Development @ Dreamforce 2013
CarolinaCon 2005 Web Application Hacking 101
2011 celebration
Defending Behind the Mobile Device
Owasp Ireland - The State of Software Security
Shmoocon 2010 - The Monkey Steals the Berries
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...

Similar to More Apps More Problems (20)

PDF
Dirty Little Secret - Mobile Applications Invading Your Privacy
PDF
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE
PPTX
Fortify On Demand and ShadowLabs
PDF
Bug hunting through_reverse_engineering
PPT
Mazenet
PPT
Agile software development for startups
PDF
Sql injection to enterprise Owned - K.K. Mookhey
PPTX
Testing banking apps
PDF
LocWorld: Building an Internationalization Plan; October 2011
PDF
Senior Manager Engineer
PDF
Going Remote: User experiences at a distance
PPTX
What Does a Full Featured Security Strategy Look Like?
PDF
Application Assessment Techniques
PPTX
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
PDF
The New Mobile Landscape - OWASP Ireland
PPTX
Keeping Secrets on the Internet of Things - Mobile Web Application Security
PDF
Mobile Security
PPT
Mobile Apps Security
PDF
Vulnerability Management In An Application Security World
PPTX
Cloud connect - Delivering Enterprise Scale Applications on Cloud
Dirty Little Secret - Mobile Applications Invading Your Privacy
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE
Fortify On Demand and ShadowLabs
Bug hunting through_reverse_engineering
Mazenet
Agile software development for startups
Sql injection to enterprise Owned - K.K. Mookhey
Testing banking apps
LocWorld: Building an Internationalization Plan; October 2011
Senior Manager Engineer
Going Remote: User experiences at a distance
What Does a Full Featured Security Strategy Look Like?
Application Assessment Techniques
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
The New Mobile Landscape - OWASP Ireland
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Mobile Security
Mobile Apps Security
Vulnerability Management In An Application Security World
Cloud connect - Delivering Enterprise Scale Applications on Cloud
Ad

More from Tyler Shields (20)

PDF
Avoiding the Pandora Pitfall
PPTX
Social and Mobile and Cloud - OH MY!
PPTX
Social Media Basics: Security Loopholes with Twitter & Other Social Media
PDF
Survey of Rootkit Technologies and Their Impact on Digital Forensics
PDF
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
PDF
Source Boston 2010 - The Monkey Steals the Berries Part Deux
PDF
Software Developers Forum 2010 - The Monkey Steals the Berries
PDF
Raleigh ISSA 2010 - The Monkey Steals the Berries
PDF
Static Detection of Application Backdoors
PDF
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
PDF
Anti-Debugging - A Developers View
PDF
Praetorian Veracode Webinar - Mobile Privacy
PDF
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
PDF
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
PPTX
IQT 2010 - The App Does That!?
PDF
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
PDF
GovCert.NL - The Monkey Steals The Berries
PPTX
Intelligence on the Intractable Problem of Software Security
PDF
The Coming Wave of Smartphone Attacks - Texas DIR
PPTX
CarolinaCon 2009 Anti-Debugging
Avoiding the Pandora Pitfall
Social and Mobile and Cloud - OH MY!
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Software Developers Forum 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the Berries
Static Detection of Application Backdoors
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Anti-Debugging - A Developers View
Praetorian Veracode Webinar - Mobile Privacy
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
IQT 2010 - The App Does That!?
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
GovCert.NL - The Monkey Steals The Berries
Intelligence on the Intractable Problem of Software Security
The Coming Wave of Smartphone Attacks - Texas DIR
CarolinaCon 2009 Anti-Debugging
Ad

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Machine learning based COVID-19 study performance prediction
PPTX
A Presentation on Artificial Intelligence
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Cloud computing and distributed systems.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Spectroscopy.pptx food analysis technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
A comparative analysis of optical character recognition models for extracting...
MIND Revenue Release Quarter 2 2025 Press Release
Building Integrated photovoltaic BIPV_UPV.pdf
Network Security Unit 5.pdf for BCA BBA.
Machine learning based COVID-19 study performance prediction
A Presentation on Artificial Intelligence
Spectral efficient network and resource selection model in 5G networks
Cloud computing and distributed systems.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Per capita expenditure prediction using model stacking based on satellite ima...
Spectroscopy.pptx food analysis technology
Dropbox Q2 2025 Financial Results & Investor Presentation
Advanced methodologies resolving dimensionality complications for autism neur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25-Week II
Agricultural_Statistics_at_a_Glance_2022_0.pdf

More Apps More Problems

  • 4. Risk - noun `risk The possibility of loss or injury
  • 5. • • • • • • • • • • • • • • • • • • • •
  • 6. • • • • • • • • • • • • • • • •
  • 17. • • • • •
  • 19. ‣ ‣ • ‣ ‣
  • 20. ‣ • ‣ ‣
  • 26. ‣ ‣ •
  • 30. Crowd Sourced Current Solutions Inadequate Internal Teams Developers Dev Site A Dev Site B Security Consultants • Very expensive • In short supply iPhone • Time to results too long Dev Site C Apps Crowd Internal Sourcing Tools • Do not scale across sites Open 3rd Party • Very high noise ratio Source Open Software Software Vendors • Can not test 3rd party code Source SYMC MSFT • Separation of duties issue Outsourced Developers Offshore • Do not know how to write Oracle secure code Provider • Prioritize time-to-ship, functionality over security Processes • Difficult to implement Eastern China • Years to fine tune Europe India • Low adoption (< 1% of US Contractors companies CMMI Level 5 certified) Unknown Skills
  • 31. 53,000 Applications Analyzed  Android Market: ~48,000  3rd Party Markets: ~5,000 Permissions Requested  Average: 3  Most Requested: 117 Top “Interesting” Permissions  GPS information: 24% (11,929)  Read Contacts: 8% (3,626)  Send SMS: 4% (1,693)  Receive SMS: 3% (1262)  Record Audio: 2% (1100)  Read SMS: 2% (832)  Process Out Calls: 1% (323)  Use Credentials : 0.5% (248)
  • 33. 52,000 Applications Analyzed • Android Market: • 3rd Party Markets: Third Party Libraries • Total Third Party Libraries: • Top Shared Libraries - - - - - - - -
  • 35. • • ‣ • •
  • 37. Whitelisting • Conduct static analysis of candidate applications • Create a whitelist • Use an unbiased 3rd party • Enforcement via mobile policy