SlideShare a Scribd company logo
0
Securing Your Mobile
Applications
Greg Patton
HP Fortify on Demand
1
Welcome to Houston TechFest
• Pleaseturn off allelectronicdevicesor set them to vibrate.
• If you must take a phone call,please do so in the lobbyso as
not to disturbothers.
• Thanks to our Diamond Sponsors:
Thank	
  you	
  for	
  being	
  a	
  part	
  of	
  the	
  
9th Annual	
  Houston	
  TechFest!
2
Agenda
• Introduction
• Why mobile security matters
• Common mobile vulnerabilities
• Takeaways
3
Introduction
Greg Patton
StaticApplicationSecurity TestingManager
HP Fortify onDemand
- Managestaticapplication security testingteam
- Previously managedgroup ofmobiletesters
- 10yearsof applicationsecurity testingexperience
- Based in Houston, TX
hacker@hpe.com
4
Why Mobile Security Matters
5
Considerations: Mobile traffic increases
• Global mobiledata traffic will increase 26-fold
between 2010 and 2015
• There willbe nearly onemobiledeviceper capita
by2015 (~7 billion)
• Mobilepayments willexceed 984 Billionin2014
Data from Smart Insights, Yankee Group
6
Considerations: Mobile ubiquity
• Mobileperformanceis becomingextraordinary
• Usinga non-mobilecomputerwillbecome
increasinglyrare
• “Homecomputer”willcome tomean better input
and displayoptionsfor yourmobilesystem
• Applereplacingdesktop withmobile?
7
Considerations: Mobile ubiquity
• 2014 is consideredthe year that mobileweb
traffic will surpass non-mobilewebtraffic
• Mobilecomputingwillsoonbe knownas
“computing”
• Computingsomewhereotherthanyour mobile
devicewillbe the activitythat requires a name
• Attackersfollowthe users
8
Considerations: Mobile insecurity
• Mobiledevelopmentisthe hottest type of
developmentrightnow. New surface area
equals dangeroussurface area
• If anyone’sgoingto putfeatures over security to
get the productout the door, it’slikely to be a
mobileteam
• Many enterprise mobiledevelopershaven’t had
the security trainingthat other types of
developershave had
• Many assume that because mobileback ends
aren’t visiteddirectlythey are more secure
(obscurityassumption)
9
Mobile security differences
Q: What’s the difference
between “regular” security
and mobile security?
10
Mobile security differences
Client ServerNetwork
Approachtothick-clienttesting
11
Mobile security differences
Client ServerNetwork
Approachtothick-clienttesting
• Credentialsinmemory
• Credentialsonfilesystem
• Datastoredonfilesystem
• Poorcert management
12
Mobile security differences
Client ServerNetwork
Approachtothick-clienttesting
• Credentialsinmemory
• Credentialsonfilesystem
• Datastoredonfilesystem
• Poorcert management
• Cleartextcredentials
• Cleartextdata
• Backdoor data
• Dataleakage
13
Mobile security differences
Client ServerNetwork
Approachtothick-clienttesting
• Credentialsinmemory
• Credentialsonfilesystem
• Datastoredonfilesystem
• Poorcert management
• Cleartextcredentials
• Cleartextdata
• Backdoor data
• Dataleakage
• Injectionflaws
• Authentication
• Sessionmanagement
• Accesscontrol
• Logicflaws
14
Mobile security differences
Q: What’s the difference
between this and mobile?
15
Mobile security differences
Client ServerNetwork
Approachtomobiletesting
• Credentialsinmemory
• Credentialsonfilesystem
• Datastoredonfilesystem
• Poorcert management
• Cleartextcredentials
• Cleartextdata
• Backdoor data
• Dataleakage
• Injectionflaws
• Authentication
• Sessionmanagement
• Accesscontrol
• Logicflaws
16
TwoKeydifferences
Magnifiednetworkvulnerability
Magnifiedphysical vulnerability
Yournetwork traffic is more likely to
be visibleto others witha mobile
devicethan at work or home
As withmostother types of
computing,oncetheattacker has
physical access,it’s game over
Mobile security differences
17
Common Mobile Vulnerabilities
18
OWASP Mobile Top 10 Risks
M1: Weak Server Side Controls M6: Broken Cryptography
M2: InsecureData Storage M7: ClientSide Injection
M3: InsufficientTransport Layer
Protection
M8: SecurityDecisions Via
UntrustedInputs
M4: UnintendedData Leakage M9: ImproperSessionHandling
M5: PoorAuthorizationand
Authentication
M10: Lack of Binary Protections
19
Common vulnerabilities: OWASP
Open Web Application Security Project
• Thoughtleader in websecurity
• Runmany projectsdesignedto help industry
secure their applications
• OWASPTop10
• Risk RatingMethodology
• VulnerabilityPreventionCheatsheets http://www.owasp.org/
20
Logicflawsare due to faulty
developerassumptions,i.e.
not thinking like an attacker
• Changinganarbitrary user’s
password
• Bypassingmulti-step
authentication
• Free productbyskipping
payment step
• Product+refund bysubmitting
negativenumber
• Defeatinga businesslimit by
enteringa highnegativenumber
• Getting a bulk discountononly
one itemby modifyingthecart
manually afterwards
Logic flaws
21
Logicflawsare avoided by
performingexhaustive
vulnerabilityassessments
beforegoing to production
• Fullyunderstand the anticipated
flow of the application
• Assumethe mindof the attacker
• Identify places that developers
likely madeassumptions
• Attempttotake advantageof
those assumptions
• As a developer,think interms of
abuse vs. just regular use
Logic flaw defenses
22
Many mobileapps do not
properly securenetwork
traffic
Many mobileapps allow SSL
communicationwithany host
• Trustingany certificate it sees
• Allowsexpiredcertificates
• Allowstrivial MiTMattacks
• Canconnectto HTTPS once,and
then fall back
• Oncein the middle,attackers can
model yourapp’s functionality
enrouteto breakingit
Poor network implementations
23
TLS protectionhas multiple
levelsof security
• Ensure HTTPSisalwaysenabled
• Attempttomatch the name of
the remote certificate
• Certificatepinning*
• Recognizethatnothingisfool-
proof, andadjust accordingto
yourapp’s specificneeds
• Rememberthat pinningwasa
defense against compromised
CAs,not againstMiTM
Network recommendations
24
Perhaps the most abused
functionalityisclient-side
storage
• Storageof credentials inplist
files, SQLitedatabases
• Failure to use KeyChaintostore
credentials
• Storageof sensitiveapplication
data on filesystem
• Apps(e.g.: banks) storingtheir
imagesin the publicfolder rather
than in their sandbox
• Applicationsloggingtothe
system log,but sendingsensitive
app data along withit
Promiscuous client-side storage
25
Abusecase • Applicationprotectedbyvoice
password
• Passwordcheckedserver side
• File wasstored locally
• Retrievedthe file from the file
system
• Playedthe file back to itself
• Gainedaccess
Promiscuous client-side storage
26
Be cautious of anything you
save—anywhere—including
on the client-side
• Ensureyou’reusingthe
platform-recommendedsolution
to store credentials
• Ensureyou use the Data
ProtectionAPItostoreany
sensitivedata
• Ensureyou are storing
everythingfrom yourapp into
the app sandboxso it cannot be
read byother applications
• Checkall loggingfunctionality
and notewhat you’resending
• Observe yourlog files withinthe
XCodelogviewerandensure you
are not storinganything
sensitive
Client-side storage recommendations
27
There area number of binary
defenses that developers are
not implementing
• ASLRPIE (memory
randomization)
• Stack SmashingProtection
Enabled(Canary-based)
• AutomaticReferenceCounting
(memory resources)
• Binary debugnotdisabled– User
path informationdisclosure
• Developersare often
contractors, andhave customer
names inpaths
Failure to harden binaries
28
AbuseCase • Founddevelopername inpath
• Wasno longer withcompany
• CheckedGithub
• Had all source available for apps
• Mobileand backend
• Lead tocompletecompromiseof
server
Failure to harden binaries
29
Use alldefenses possibleto
harden your binaries before
release
• Ensurebinary protectionsare in
place
• Someare notsecurity-specific,
but improvetheoverall quality of
yourapplications
• Ensureno informationdisclosure
is present
Binary protections
30
Many applicationsviolate
privacy withoutdevelopers
being aware
• Doesthe applicationaccess
GeoLocationdata?
• Doesthe applicationaccessthe
AddressBook?
• Doesthe applicationaccessyour
Photos?
• If so, what isyour app doingwith
this data?
• Doesyour applicationuse
analytics engines?
• If so, what doesit send there?
(UUID, appdata?)
Privacy violations
31
Go with an absoluteleast-
privilegeapproach
• Don’taccessany data that could
be consideredprivateif youdon’t
need it
• There are applications outthere
that can evaluate what a given
binary accesses(HP Fortify
MobileReputation)
Privacy violations
32
A massivenumber of
applicationswesee and
compromiseare compromised
due to backend vulnerabilities
• Promiscuouswebservices
• Full SQLstatements right inweb
service calls (saved money on
MSSQLServerManager)
• Blatant SQLi,XSS,CSRF,File
Includes, etc.
• Many developersassume “who’s
cominghere?”
• The data stores are oftenshared!
• Sharedhostingmeans
compromiseofmultiple
customers
Assumption of web obscurity
33
Harden your web backend as if
the mobileapp didn’t even
exist
• Rememberhow easy it is to MiTM
a mobileapp
• Assumeeveryone cansee your
traffic
• Thismeans they can see all the
paths and parameters for your
backend
• Assumeattackers willcome
knocking
• Considerthe risks of shared
hosting,as others mightnotbe
taking these steps—evenif you
did
Assumption of web obscurity
34
Takeaways
35
It is an interestingtimefor
mobilesecurity
• Everyone’sheadingtomobile,
and the attackers are following
• Mobileis on the leadingedgeof
development,so mobileprojects
are especially susceptibleto
security shortcuts
• Most applicationshave major
vulnerabilities that are easily
found
Takeaways
36
Adoptthe attacker mindset • Don’tbe afraid tolook at your
ownapps
• Thinklike an attackerand follow
some basicsteps to help you
evaluate yourownapplications
• Assumethe attacker has access
to the deviceand visibilityofall
traffic goingtoand from the
server, andcode accordingly
• Track your sensitivedata through
yourapp, fromuser to deviceto
network to server; where is it
vulnerable?
• Don’tstoresensitive data if you
don’thave to
Takeaways
37
Leverageavailableresources
• Industry best-practicesare
available
o https://www.owasp.org
• Use the tools youalready have
o HTTP proxies, debuggers, source
code analyzers,etc.
o HP Enterprise Security Products
• Connectlocally
o Local OWASP Chapter
o HoustonSecurity Conference
(HouSecCon)
Takeaways
Houston Security Conference
http://www.houstonseccon.com/v6/
39
HP Fortify on Demand
• Cloud-basedapplicationsecurity
testing
• Bothstatic and dynamictesting,
usingautomatedand manual
techniques
• Integrates withyourSDLC and
buildenvironmenttoprovide
critical security checkpoints
• Singleportal for codeuploads
and reviewingresults
• http://www.hp.com/go/fod
HP Fortify on Demand
40
Please Leave Feedback During Q&A
If you leave session
feedback and provide
contact information in
the survey,you will be
qualified for a prize
Scan the QR Code to
the right or go to
http://bit.ly/1K1Hvi5
41
Thanks to all our Sponsors!

More Related Content

PDF
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
PDF
Stopping zero day threats
PDF
Widepoint orc thales webinar 111313d - nov 2013
PPTX
Threat Modeling - Locking the Door to Vulnerabilities
PPTX
Lisa Guess - Embracing the Cloud
PDF
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
PPTX
Owasp mobile top 10
PPTX
The Internet of Everything is Here
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
Stopping zero day threats
Widepoint orc thales webinar 111313d - nov 2013
Threat Modeling - Locking the Door to Vulnerabilities
Lisa Guess - Embracing the Cloud
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Owasp mobile top 10
The Internet of Everything is Here

What's hot (20)

PDF
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
PPTX
Aligning Application Security to Compliance
PPTX
Bil Harmer - Myths of Cloud Security Debunked!
PDF
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
PDF
Secure Your Data with Fidelis Network® for DLP
PPTX
Red teaming in the cloud
PDF
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
PDF
The 1st Step to Zero Trust: Asset Management for Cybersecurity
PDF
Information Security Risk Management
PPTX
Login cat tekmonks - v3
PDF
Extending Your Network Cloud Security to AWS
PPTX
Red team Engagement
PDF
Web-of-Things and Services Security
PDF
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
PDF
GTB Technologies Datasheet 2014
PPTX
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
PPTX
What is zero trust model (ztm)
PDF
Forrester no more chewy centers- the zero trust model
PDF
IoT security fresh thinking 2017 sep 9
PDF
Micro segmentation and zero trust for security and compliance - Guardicore an...
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
Aligning Application Security to Compliance
Bil Harmer - Myths of Cloud Security Debunked!
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
Secure Your Data with Fidelis Network® for DLP
Red teaming in the cloud
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
The 1st Step to Zero Trust: Asset Management for Cybersecurity
Information Security Risk Management
Login cat tekmonks - v3
Extending Your Network Cloud Security to AWS
Red team Engagement
Web-of-Things and Services Security
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
GTB Technologies Datasheet 2014
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
What is zero trust model (ztm)
Forrester no more chewy centers- the zero trust model
IoT security fresh thinking 2017 sep 9
Micro segmentation and zero trust for security and compliance - Guardicore an...
Ad

Viewers also liked (14)

DOCX
Modulo de Young
PDF
gianluigi
PDF
Brochure back
PPT
Submission between men and women
PDF
ref ltr
PDF
Canterbury Benefits Intro Packet.advisor
PDF
Viene el Neuromarketing
DOCX
Media
PDF
Least Squares
PDF
Commerce Resources Corp. Achieves Key Milestones for the Ashram Rare Earth Pr...
PPSX
Deixa o céu descer aqui
PPT
Pseudocodigo
PDF
Silabuss
PPTX
Tecnicas de comunicación grupal
Modulo de Young
gianluigi
Brochure back
Submission between men and women
ref ltr
Canterbury Benefits Intro Packet.advisor
Viene el Neuromarketing
Media
Least Squares
Commerce Resources Corp. Achieves Key Milestones for the Ashram Rare Earth Pr...
Deixa o céu descer aqui
Pseudocodigo
Silabuss
Tecnicas de comunicación grupal
Ad

Similar to Securing Your Mobile Applications (20)

PDF
Mobile Security
PPTX
Securing Your Digital Files from Legal Threats
PDF
110307 cloud security requirements gourley
PPTX
The day when 3rd party security providers disappear into cloud bright talk se...
PPTX
Webdays blida mobile top 10 risks
PPT
ICRTITCS-2012 Conference Publication
PPTX
Cyber Security Overview for Small Businesses
PPTX
Cloud Security: A matter of trust?
PDF
Solvay secure application layer v2015 seba
PPTX
Lock it Down: Access Control for IBM i
PPTX
Data Governance and Management in Cloud pak nam
PDF
Microsegmentation from strategy to execution
PPTX
CSO CXO Series Breakfast
PPTX
OWASP Mobile TOP 10 2014
PDF
Re-Thinking BYOD Policy.pptx
PDF
Cyber_Security_CyberPact.pdf
PDF
Cyber_Security_CyberPact.pdf
PPTX
MYTHBUSTERS: Can You Secure Payments in the Cloud?
PDF
Lecture27 cc-security2
PPTX
Myths of validation
Mobile Security
Securing Your Digital Files from Legal Threats
110307 cloud security requirements gourley
The day when 3rd party security providers disappear into cloud bright talk se...
Webdays blida mobile top 10 risks
ICRTITCS-2012 Conference Publication
Cyber Security Overview for Small Businesses
Cloud Security: A matter of trust?
Solvay secure application layer v2015 seba
Lock it Down: Access Control for IBM i
Data Governance and Management in Cloud pak nam
Microsegmentation from strategy to execution
CSO CXO Series Breakfast
OWASP Mobile TOP 10 2014
Re-Thinking BYOD Policy.pptx
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Lecture27 cc-security2
Myths of validation

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
KodekX | Application Modernization Development
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
cuic standard and advanced reporting.pdf
Spectroscopy.pptx food analysis technology
Advanced methodologies resolving dimensionality complications for autism neur...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
MIND Revenue Release Quarter 2 2025 Press Release
Reach Out and Touch Someone: Haptics and Empathic Computing
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Programs and apps: productivity, graphics, security and other tools
20250228 LYD VKU AI Blended-Learning.pptx
KodekX | Application Modernization Development
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The AUB Centre for AI in Media Proposal.docx
Machine learning based COVID-19 study performance prediction
Spectral efficient network and resource selection model in 5G networks
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Electronic commerce courselecture one. Pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Securing Your Mobile Applications

  • 1. 0 Securing Your Mobile Applications Greg Patton HP Fortify on Demand
  • 2. 1 Welcome to Houston TechFest • Pleaseturn off allelectronicdevicesor set them to vibrate. • If you must take a phone call,please do so in the lobbyso as not to disturbothers. • Thanks to our Diamond Sponsors: Thank  you  for  being  a  part  of  the   9th Annual  Houston  TechFest!
  • 3. 2 Agenda • Introduction • Why mobile security matters • Common mobile vulnerabilities • Takeaways
  • 4. 3 Introduction Greg Patton StaticApplicationSecurity TestingManager HP Fortify onDemand - Managestaticapplication security testingteam - Previously managedgroup ofmobiletesters - 10yearsof applicationsecurity testingexperience - Based in Houston, TX hacker@hpe.com
  • 6. 5 Considerations: Mobile traffic increases • Global mobiledata traffic will increase 26-fold between 2010 and 2015 • There willbe nearly onemobiledeviceper capita by2015 (~7 billion) • Mobilepayments willexceed 984 Billionin2014 Data from Smart Insights, Yankee Group
  • 7. 6 Considerations: Mobile ubiquity • Mobileperformanceis becomingextraordinary • Usinga non-mobilecomputerwillbecome increasinglyrare • “Homecomputer”willcome tomean better input and displayoptionsfor yourmobilesystem • Applereplacingdesktop withmobile?
  • 8. 7 Considerations: Mobile ubiquity • 2014 is consideredthe year that mobileweb traffic will surpass non-mobilewebtraffic • Mobilecomputingwillsoonbe knownas “computing” • Computingsomewhereotherthanyour mobile devicewillbe the activitythat requires a name • Attackersfollowthe users
  • 9. 8 Considerations: Mobile insecurity • Mobiledevelopmentisthe hottest type of developmentrightnow. New surface area equals dangeroussurface area • If anyone’sgoingto putfeatures over security to get the productout the door, it’slikely to be a mobileteam • Many enterprise mobiledevelopershaven’t had the security trainingthat other types of developershave had • Many assume that because mobileback ends aren’t visiteddirectlythey are more secure (obscurityassumption)
  • 10. 9 Mobile security differences Q: What’s the difference between “regular” security and mobile security?
  • 11. 10 Mobile security differences Client ServerNetwork Approachtothick-clienttesting
  • 12. 11 Mobile security differences Client ServerNetwork Approachtothick-clienttesting • Credentialsinmemory • Credentialsonfilesystem • Datastoredonfilesystem • Poorcert management
  • 13. 12 Mobile security differences Client ServerNetwork Approachtothick-clienttesting • Credentialsinmemory • Credentialsonfilesystem • Datastoredonfilesystem • Poorcert management • Cleartextcredentials • Cleartextdata • Backdoor data • Dataleakage
  • 14. 13 Mobile security differences Client ServerNetwork Approachtothick-clienttesting • Credentialsinmemory • Credentialsonfilesystem • Datastoredonfilesystem • Poorcert management • Cleartextcredentials • Cleartextdata • Backdoor data • Dataleakage • Injectionflaws • Authentication • Sessionmanagement • Accesscontrol • Logicflaws
  • 15. 14 Mobile security differences Q: What’s the difference between this and mobile?
  • 16. 15 Mobile security differences Client ServerNetwork Approachtomobiletesting • Credentialsinmemory • Credentialsonfilesystem • Datastoredonfilesystem • Poorcert management • Cleartextcredentials • Cleartextdata • Backdoor data • Dataleakage • Injectionflaws • Authentication • Sessionmanagement • Accesscontrol • Logicflaws
  • 17. 16 TwoKeydifferences Magnifiednetworkvulnerability Magnifiedphysical vulnerability Yournetwork traffic is more likely to be visibleto others witha mobile devicethan at work or home As withmostother types of computing,oncetheattacker has physical access,it’s game over Mobile security differences
  • 19. 18 OWASP Mobile Top 10 Risks M1: Weak Server Side Controls M6: Broken Cryptography M2: InsecureData Storage M7: ClientSide Injection M3: InsufficientTransport Layer Protection M8: SecurityDecisions Via UntrustedInputs M4: UnintendedData Leakage M9: ImproperSessionHandling M5: PoorAuthorizationand Authentication M10: Lack of Binary Protections
  • 20. 19 Common vulnerabilities: OWASP Open Web Application Security Project • Thoughtleader in websecurity • Runmany projectsdesignedto help industry secure their applications • OWASPTop10 • Risk RatingMethodology • VulnerabilityPreventionCheatsheets http://www.owasp.org/
  • 21. 20 Logicflawsare due to faulty developerassumptions,i.e. not thinking like an attacker • Changinganarbitrary user’s password • Bypassingmulti-step authentication • Free productbyskipping payment step • Product+refund bysubmitting negativenumber • Defeatinga businesslimit by enteringa highnegativenumber • Getting a bulk discountononly one itemby modifyingthecart manually afterwards Logic flaws
  • 22. 21 Logicflawsare avoided by performingexhaustive vulnerabilityassessments beforegoing to production • Fullyunderstand the anticipated flow of the application • Assumethe mindof the attacker • Identify places that developers likely madeassumptions • Attempttotake advantageof those assumptions • As a developer,think interms of abuse vs. just regular use Logic flaw defenses
  • 23. 22 Many mobileapps do not properly securenetwork traffic Many mobileapps allow SSL communicationwithany host • Trustingany certificate it sees • Allowsexpiredcertificates • Allowstrivial MiTMattacks • Canconnectto HTTPS once,and then fall back • Oncein the middle,attackers can model yourapp’s functionality enrouteto breakingit Poor network implementations
  • 24. 23 TLS protectionhas multiple levelsof security • Ensure HTTPSisalwaysenabled • Attempttomatch the name of the remote certificate • Certificatepinning* • Recognizethatnothingisfool- proof, andadjust accordingto yourapp’s specificneeds • Rememberthat pinningwasa defense against compromised CAs,not againstMiTM Network recommendations
  • 25. 24 Perhaps the most abused functionalityisclient-side storage • Storageof credentials inplist files, SQLitedatabases • Failure to use KeyChaintostore credentials • Storageof sensitiveapplication data on filesystem • Apps(e.g.: banks) storingtheir imagesin the publicfolder rather than in their sandbox • Applicationsloggingtothe system log,but sendingsensitive app data along withit Promiscuous client-side storage
  • 26. 25 Abusecase • Applicationprotectedbyvoice password • Passwordcheckedserver side • File wasstored locally • Retrievedthe file from the file system • Playedthe file back to itself • Gainedaccess Promiscuous client-side storage
  • 27. 26 Be cautious of anything you save—anywhere—including on the client-side • Ensureyou’reusingthe platform-recommendedsolution to store credentials • Ensureyou use the Data ProtectionAPItostoreany sensitivedata • Ensureyou are storing everythingfrom yourapp into the app sandboxso it cannot be read byother applications • Checkall loggingfunctionality and notewhat you’resending • Observe yourlog files withinthe XCodelogviewerandensure you are not storinganything sensitive Client-side storage recommendations
  • 28. 27 There area number of binary defenses that developers are not implementing • ASLRPIE (memory randomization) • Stack SmashingProtection Enabled(Canary-based) • AutomaticReferenceCounting (memory resources) • Binary debugnotdisabled– User path informationdisclosure • Developersare often contractors, andhave customer names inpaths Failure to harden binaries
  • 29. 28 AbuseCase • Founddevelopername inpath • Wasno longer withcompany • CheckedGithub • Had all source available for apps • Mobileand backend • Lead tocompletecompromiseof server Failure to harden binaries
  • 30. 29 Use alldefenses possibleto harden your binaries before release • Ensurebinary protectionsare in place • Someare notsecurity-specific, but improvetheoverall quality of yourapplications • Ensureno informationdisclosure is present Binary protections
  • 31. 30 Many applicationsviolate privacy withoutdevelopers being aware • Doesthe applicationaccess GeoLocationdata? • Doesthe applicationaccessthe AddressBook? • Doesthe applicationaccessyour Photos? • If so, what isyour app doingwith this data? • Doesyour applicationuse analytics engines? • If so, what doesit send there? (UUID, appdata?) Privacy violations
  • 32. 31 Go with an absoluteleast- privilegeapproach • Don’taccessany data that could be consideredprivateif youdon’t need it • There are applications outthere that can evaluate what a given binary accesses(HP Fortify MobileReputation) Privacy violations
  • 33. 32 A massivenumber of applicationswesee and compromiseare compromised due to backend vulnerabilities • Promiscuouswebservices • Full SQLstatements right inweb service calls (saved money on MSSQLServerManager) • Blatant SQLi,XSS,CSRF,File Includes, etc. • Many developersassume “who’s cominghere?” • The data stores are oftenshared! • Sharedhostingmeans compromiseofmultiple customers Assumption of web obscurity
  • 34. 33 Harden your web backend as if the mobileapp didn’t even exist • Rememberhow easy it is to MiTM a mobileapp • Assumeeveryone cansee your traffic • Thismeans they can see all the paths and parameters for your backend • Assumeattackers willcome knocking • Considerthe risks of shared hosting,as others mightnotbe taking these steps—evenif you did Assumption of web obscurity
  • 36. 35 It is an interestingtimefor mobilesecurity • Everyone’sheadingtomobile, and the attackers are following • Mobileis on the leadingedgeof development,so mobileprojects are especially susceptibleto security shortcuts • Most applicationshave major vulnerabilities that are easily found Takeaways
  • 37. 36 Adoptthe attacker mindset • Don’tbe afraid tolook at your ownapps • Thinklike an attackerand follow some basicsteps to help you evaluate yourownapplications • Assumethe attacker has access to the deviceand visibilityofall traffic goingtoand from the server, andcode accordingly • Track your sensitivedata through yourapp, fromuser to deviceto network to server; where is it vulnerable? • Don’tstoresensitive data if you don’thave to Takeaways
  • 38. 37 Leverageavailableresources • Industry best-practicesare available o https://www.owasp.org • Use the tools youalready have o HTTP proxies, debuggers, source code analyzers,etc. o HP Enterprise Security Products • Connectlocally o Local OWASP Chapter o HoustonSecurity Conference (HouSecCon) Takeaways
  • 40. 39 HP Fortify on Demand • Cloud-basedapplicationsecurity testing • Bothstatic and dynamictesting, usingautomatedand manual techniques • Integrates withyourSDLC and buildenvironmenttoprovide critical security checkpoints • Singleportal for codeuploads and reviewingresults • http://www.hp.com/go/fod HP Fortify on Demand
  • 41. 40 Please Leave Feedback During Q&A If you leave session feedback and provide contact information in the survey,you will be qualified for a prize Scan the QR Code to the right or go to http://bit.ly/1K1Hvi5
  • 42. 41 Thanks to all our Sponsors!