SlideShare a Scribd company logo
BY
DIVYA RAVAL
Security Models of Modern
Mobile Systems
What is Mobile Security?
Mobile security is the protection
of smart phones, tablets, laptops
and other portable computing
devices and the networks they
connect to, from threats and
vulnerabilities associated with
wireless computing. Mobile
security is also known as wireless
security.
Need of Mobile Security?
 As Smartphones are becoming storage units for personal
information through use of various social networking
applications, personal organizers and e-mail clients.
 So, smartphones are becoming primary target of attackers.
 Mobile threats are endangering safety of individuals, companies
and if measures are not taken, then the cybercrime can have
impact on the security of the whole society.
Smartphone OS Market Share
Nielsen Report Smartphone operating
system share
Security Challenges for Mobile Device
Users
 Insecure Data Storage.
 Physical Security.
 Mobile browsing.
 Multiple User Logging.
 Client side injection.
 Improper session handling.
 Weak Authentication and Brute Force Attack.
Mobile Threats and Vulnerabilities
Mobile Threats
1. Physical threats
- Bluetooth.
- Lost or Stolen Mobile Devices.
2. Application based Threats
-Spyware.
- Malware.
- Vulnerable Application.
- Privacy Threats.
3. Network based threats
-Denial of Service Attack (DoS).
- Network Exploits.
- Mobile Network Services.
- Wi-Fi Sniffing.
4. Web based threats
- Drive by downloads.
- Browser Exploits.
- Phishing Scams.
Mobile Vulnerabilities
• Trojan horse.
• Botnet.
• Worm.
• Rootkit.
ANDROID SECURITY MODEL
Introduction to Android
 It is a open source software platform and operating system for mobile devices.
 Based on Linux kernel.
 Developed by Google and later the Open Handset Alliance.
 Allows writing managed code in Java Language.
 Android has its own virtual machine i.e DVM(Dalvik Virtual Machine),which
is used for executing the android application.
 Google purchased the initial developer of the software, android incorporated in
2005.
Android Architecture
Android Security Model
Application Permission
 There are four permissions levels and they are as follows:
 Normal (not a dangerous one and considered as
an application-level permission).
 Dangerous (a more risky permission could access, without the asking
the user to confirm; a sensitive data or damaging functions).
 Signature (a permission can be granted only to other packages that are
signed with the same signature).
 Signature-or-system (a special type of signature permission
that's existing to manipulate with the legacy permissions).
Android Security Mechanism
1. Sandboxing Mechanism.
2. Application Permission Mechanism.
Improvements in the Existing Security
Model
Practically, there are a number of issues in such a model:-
1)The user must grant all of the required permissions in order to install
the application,
2) Once the permissions are granted; there is no method of restricting an
application to use the granted permissions,
3) There is no way of restricting access to the resources based on dynamic
constraints as the permission model is based on install-time check only,
4) Granted permissions can only be revoked by uninstalling the
application.
Proposed Framework for Android
Security
1. Kirin:-install-time certification mechanism – that allows the
mobile device to enforce a list of predefined security requirements
prior to installation process of an application.
2. SCanDroid: Android to perform information flow analysis on
applications in order to understand the flow of information from
one component to another component.
Android Malware
1. Android.Pjapps / Android.Geinimi (January/February, 2010)
2. AndroidOS.FakePlayer (August, 2010)
3. Android.Root Cager (February, 2011)
4. Android.Bg Serv (March, 2011)
5. Acnetdoor.
6. Kemoge Malware.
Example of Malicious Application
Malicious content delivery scenario for Android
Example of Malicious Application(cont’d)
Example malicious application of android
 First Version of Android.
 The focus of Android beta is testing incorporating usability.
 Android beta will generally have many more problems on speed and
performance.
 First full version of android.
 Released on September 23, 2008.
 Wi-Fi and Bluetooth support.
 Quite slow in operating.
 copy and paste feature in the web browser is not
present.
 Released on April 30, 2009.
 Added auto-rotation option.
 Copy and Paste feature added in the web browser.
 Increased speed and performance but not upto
required level.
 Released on September 15, 2009.
 Voice search and Search box were added.
 Faster OS boot times and fast web browsing
experience.
 Typing is quite slower.
 Released on October 26, 2009.
 Bluetooth 2.1 support.
 Improved typing speed on virtual
keyboard, with smarter dictionary.
 no Adobe flash media support.
 Released on May 20, 2010.
 Support for Adobe Flash 10.1
 Improved Application launcher with better browser
 No internet calling.
 Released on December 6, 2010.
 Updated User Interface with high efficiency and speed
 Internet calling
 One touch word selection and copy/paste.
 New keyboard for faster word input.
 More successful version of Android than previous
versions.
 not supports multi-core processors.
 Released on February 22, 2011.
 Support for multi-core processors
 Ability to encrypt all user data.
 This version of android is only available for
tablets.
 Released on November 14, 2011.
 Virtual button in the UI.
 A new typeface family for the UI, Roboto.
 Ability to shut down apps that are using data in the
background.
 Released on June 27, 2012.
 Latest version of Android.
 Smoother user interface.
 Android Kitkat
 Released on April 14,2014
 Bug fixes.
 Security enhancements.
 Android Lollipop
 Released on December 2,2014.
 Speed improvement.
 Battery consumption improvement.
 Multiple SIM cards support.
 Quick settings shortcuts to join Wi-Fi networks or control Bluetooth devices.
 Android Marshmallow
 Fingerprint Authentication support.
 Better battery life with "deep sleep".
 Permissions dashboard.
 Android Pay.
 MIDI support.
 Google now improvements.
iOS SECURITY MODEL
Introduction to iOS
 iOS is the Operating System that run on Apple devices like
iPhone, iPod, iPad & Apple TV.
 Provides multi tasking.
 Only allows to run Apple signed applications.
 New features & Bug fixes with every release.
 Current version is iOS 9.
iOS Security Model
Two different views of iOS security model are presented.
The first model stands on four pillars that are mentioned in and are
as follows:
 Device Security.
 Data Security.
 Network Security.
 Application Security.
 Keychain Services.
 CFNetwork.
 The Certificate, Key, and Trust Services API.
 Randomization Services.
 The second perspective discuss the security as a set of different
techniques to ensure the security.
 ASLR.
 Code Signing.
 Sandboxing.
 Data Encryption.
iOS Malware
 Aurora Feint (July, 2008)
 Storm8 (November, 2009)
 IPhoneOS.Ikee Worm (November, 2009)
 iPhoneOS.Ikee.B (November, 2009)
 KeyRaider (August 2015)
 XcodeGhost (September 2015)
 Youmi Ad SDK (October 2015)
Security Comparison of iOS 8 and iOS 9
1) Stronger passcodes
2) Two factor Authentication
Windows Phone Security Model
Introduction to Windows:
 Microsoft’s new Mobile OS
-Successor to the Windows Phone.
 Based on Windows CE kernel.
 Released on November 8,2010.
 Supports 25 Languages.
 Offers a new User Interface with its “metro” login.
Windows Phone Security Model
Which is safest: Android, iOS or Windows
Phone?
 iOS is the safest out of the box
 Second place goes to Windows Phone: very robust and with
excellent backup options, but still needs some work.
 Android falls to third place, as it forces you to make more
decisions and has a less consistent security landscape, with
manufacturers adding their own security customizations.
Mobile security best practices
1. User Authentication.
2. Update Your Mobile OS with Security Patches.
3. Regularly Backup Your Mobile Device.
4. Utilize Encryption.
5. Enable Remote Data Wipe as an Option.
Mobile security best practices(cont’d)
6. Disable Wi-Fi and Bluetooth When Not Needed.
7. Don't Fall for Phishing Schemes.
8. Avoid All Jailbreaks.
9. Add a Mobile Security App.
10. Communicate Your Mobile Security Best Practices.
Conclusion
• Modern Operating Systems come with a strong security
background but there is nothing more important than the safety
of the user’s data.
• In these days there are a lot of known vulnerabilities in these
operating systems, applications, internet browsers and specific
teams and developers working on issues trying to fix known
problems.
• However, there is the weakest point at this security and that
point is always the user of the current device.
Thank You!!

More Related Content

PPT
Mobile application development
PPTX
Mobile application development ppt
PPTX
Mobile operating system..
PPTX
Day: 1 Introduction to Mobile Application Development (in Android)
PDF
Wireless Networking Security
PPTX
Wireless Networking
PPTX
Mobile operating system (os)
PPTX
Data enrichment
Mobile application development
Mobile application development ppt
Mobile operating system..
Day: 1 Introduction to Mobile Application Development (in Android)
Wireless Networking Security
Wireless Networking
Mobile operating system (os)
Data enrichment

What's hot (20)

PPTX
Introduction To Mobile Computing
PPTX
Cloud and Virtualization Security
PPTX
Sources of IoT (JNTUK - UNIT 1)
PPTX
Introduction To Mobile Application Development
PPTX
PPTX
Communication technologies
PPTX
Overview of IoT (JNTUK - UNIT 1)
PPTX
Impact to it security of incorrect configuration of firewall policies and thi...
PPTX
Routers.ppt
PPTX
The future of mobile computing
PPT
Basics Of Networking (Overview)
PPTX
Presentation on android
PPT
Email Client Server System
PPTX
Wormhole attack
PPTX
Wireless application protocol ppt
PDF
FIREWALL
PPTX
Mobile operating system ppt
PPT
Android Architecture
PPTX
Wi Fi Security
Introduction To Mobile Computing
Cloud and Virtualization Security
Sources of IoT (JNTUK - UNIT 1)
Introduction To Mobile Application Development
Communication technologies
Overview of IoT (JNTUK - UNIT 1)
Impact to it security of incorrect configuration of firewall policies and thi...
Routers.ppt
The future of mobile computing
Basics Of Networking (Overview)
Presentation on android
Email Client Server System
Wormhole attack
Wireless application protocol ppt
FIREWALL
Mobile operating system ppt
Android Architecture
Wi Fi Security
Ad

Viewers also liked (20)

PDF
Inside NetQin Mobile Inc. (NYSE: NQ) - By iChinaStock
PPT
Personal Data Privacy and Information Security
PDF
andrew milroy - top security trends and takeaways for 2013
PPTX
The effects of Social Networking upon society
PPTX
Teaching methods
PPT
Android Security
PPTX
Lo teaching techniques
PPT
Implementing Effective Online Teaching And Learning
PPTX
Modern approach in teaching
PPTX
Online teaching techniques
DOCX
1 system security
PDF
It strategie-security-first
PDF
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
ODP
Introduction to Selinux
PDF
Rahmenbedingungen mobile security
PPTX
Impact Of IT on Society.
ZIP
Tradition vs. Innovation
PDF
Bootkits: past, present & future
PPT
Security models
Inside NetQin Mobile Inc. (NYSE: NQ) - By iChinaStock
Personal Data Privacy and Information Security
andrew milroy - top security trends and takeaways for 2013
The effects of Social Networking upon society
Teaching methods
Android Security
Lo teaching techniques
Implementing Effective Online Teaching And Learning
Modern approach in teaching
Online teaching techniques
1 system security
It strategie-security-first
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
Introduction to Selinux
Rahmenbedingungen mobile security
Impact Of IT on Society.
Tradition vs. Innovation
Bootkits: past, present & future
Security models
Ad

Similar to Security models of modern mobile systems (20)

PDF
Penetration Testing for Android Smartphones
PDF
Android open-source operating System for mobile devices
DOCX
Write a scholarly review on the following topic. This assignment i
PDF
Implementing security on android application
DOC
Android
PPTX
Mobile Application Development Handout by Tariku
PPTX
Android and its applications
PPTX
Android security
PDF
Android report
PPTX
Android os ark 2 (2) copy
PDF
Mobile Application Development with Android
PPTX
Introduction to Android
PPTX
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
PDF
A017360104
PDF
Comparative Study on Intrusion Detection Systems for Smartphones
DOCX
Mobile testing
PDF
Mobile Security for Smartphones and Tablets
PDF
Android Vs Iphone
PDF
OS-Project-Report-Team-8
PPTX
Android vs iOS security
Penetration Testing for Android Smartphones
Android open-source operating System for mobile devices
Write a scholarly review on the following topic. This assignment i
Implementing security on android application
Android
Mobile Application Development Handout by Tariku
Android and its applications
Android security
Android report
Android os ark 2 (2) copy
Mobile Application Development with Android
Introduction to Android
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
A017360104
Comparative Study on Intrusion Detection Systems for Smartphones
Mobile testing
Mobile Security for Smartphones and Tablets
Android Vs Iphone
OS-Project-Report-Team-8
Android vs iOS security

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
KodekX | Application Modernization Development
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Empathic Computing: Creating Shared Understanding
KodekX | Application Modernization Development
Reach Out and Touch Someone: Haptics and Empathic Computing
Unlocking AI with Model Context Protocol (MCP)
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Programs and apps: productivity, graphics, security and other tools
The Rise and Fall of 3GPP – Time for a Sabbatical?
The AUB Centre for AI in Media Proposal.docx
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Electronic commerce courselecture one. Pdf
Machine learning based COVID-19 study performance prediction
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Mobile App Security Testing_ A Comprehensive Guide.pdf

Security models of modern mobile systems

  • 1. BY DIVYA RAVAL Security Models of Modern Mobile Systems
  • 2. What is Mobile Security? Mobile security is the protection of smart phones, tablets, laptops and other portable computing devices and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security.
  • 3. Need of Mobile Security?  As Smartphones are becoming storage units for personal information through use of various social networking applications, personal organizers and e-mail clients.  So, smartphones are becoming primary target of attackers.  Mobile threats are endangering safety of individuals, companies and if measures are not taken, then the cybercrime can have impact on the security of the whole society.
  • 5. Nielsen Report Smartphone operating system share
  • 6. Security Challenges for Mobile Device Users  Insecure Data Storage.  Physical Security.  Mobile browsing.  Multiple User Logging.  Client side injection.  Improper session handling.  Weak Authentication and Brute Force Attack.
  • 7. Mobile Threats and Vulnerabilities Mobile Threats 1. Physical threats - Bluetooth. - Lost or Stolen Mobile Devices.
  • 8. 2. Application based Threats -Spyware. - Malware. - Vulnerable Application. - Privacy Threats.
  • 9. 3. Network based threats -Denial of Service Attack (DoS). - Network Exploits. - Mobile Network Services. - Wi-Fi Sniffing.
  • 10. 4. Web based threats - Drive by downloads. - Browser Exploits. - Phishing Scams.
  • 11. Mobile Vulnerabilities • Trojan horse. • Botnet. • Worm. • Rootkit.
  • 13. Introduction to Android  It is a open source software platform and operating system for mobile devices.  Based on Linux kernel.  Developed by Google and later the Open Handset Alliance.  Allows writing managed code in Java Language.  Android has its own virtual machine i.e DVM(Dalvik Virtual Machine),which is used for executing the android application.  Google purchased the initial developer of the software, android incorporated in 2005.
  • 16. Application Permission  There are four permissions levels and they are as follows:  Normal (not a dangerous one and considered as an application-level permission).  Dangerous (a more risky permission could access, without the asking the user to confirm; a sensitive data or damaging functions).  Signature (a permission can be granted only to other packages that are signed with the same signature).  Signature-or-system (a special type of signature permission that's existing to manipulate with the legacy permissions).
  • 17. Android Security Mechanism 1. Sandboxing Mechanism. 2. Application Permission Mechanism.
  • 18. Improvements in the Existing Security Model Practically, there are a number of issues in such a model:- 1)The user must grant all of the required permissions in order to install the application, 2) Once the permissions are granted; there is no method of restricting an application to use the granted permissions, 3) There is no way of restricting access to the resources based on dynamic constraints as the permission model is based on install-time check only, 4) Granted permissions can only be revoked by uninstalling the application.
  • 19. Proposed Framework for Android Security 1. Kirin:-install-time certification mechanism – that allows the mobile device to enforce a list of predefined security requirements prior to installation process of an application. 2. SCanDroid: Android to perform information flow analysis on applications in order to understand the flow of information from one component to another component.
  • 20. Android Malware 1. Android.Pjapps / Android.Geinimi (January/February, 2010) 2. AndroidOS.FakePlayer (August, 2010) 3. Android.Root Cager (February, 2011) 4. Android.Bg Serv (March, 2011) 5. Acnetdoor. 6. Kemoge Malware.
  • 21. Example of Malicious Application Malicious content delivery scenario for Android
  • 22. Example of Malicious Application(cont’d) Example malicious application of android
  • 23.  First Version of Android.  The focus of Android beta is testing incorporating usability.  Android beta will generally have many more problems on speed and performance.  First full version of android.  Released on September 23, 2008.  Wi-Fi and Bluetooth support.  Quite slow in operating.  copy and paste feature in the web browser is not present.
  • 24.  Released on April 30, 2009.  Added auto-rotation option.  Copy and Paste feature added in the web browser.  Increased speed and performance but not upto required level.  Released on September 15, 2009.  Voice search and Search box were added.  Faster OS boot times and fast web browsing experience.  Typing is quite slower.  Released on October 26, 2009.  Bluetooth 2.1 support.  Improved typing speed on virtual keyboard, with smarter dictionary.  no Adobe flash media support.
  • 25.  Released on May 20, 2010.  Support for Adobe Flash 10.1  Improved Application launcher with better browser  No internet calling.  Released on December 6, 2010.  Updated User Interface with high efficiency and speed  Internet calling  One touch word selection and copy/paste.  New keyboard for faster word input.  More successful version of Android than previous versions.  not supports multi-core processors.  Released on February 22, 2011.  Support for multi-core processors  Ability to encrypt all user data.  This version of android is only available for tablets.
  • 26.  Released on November 14, 2011.  Virtual button in the UI.  A new typeface family for the UI, Roboto.  Ability to shut down apps that are using data in the background.  Released on June 27, 2012.  Latest version of Android.  Smoother user interface.
  • 27.  Android Kitkat  Released on April 14,2014  Bug fixes.  Security enhancements.  Android Lollipop  Released on December 2,2014.  Speed improvement.  Battery consumption improvement.  Multiple SIM cards support.  Quick settings shortcuts to join Wi-Fi networks or control Bluetooth devices.
  • 28.  Android Marshmallow  Fingerprint Authentication support.  Better battery life with "deep sleep".  Permissions dashboard.  Android Pay.  MIDI support.  Google now improvements.
  • 30. Introduction to iOS  iOS is the Operating System that run on Apple devices like iPhone, iPod, iPad & Apple TV.  Provides multi tasking.  Only allows to run Apple signed applications.  New features & Bug fixes with every release.  Current version is iOS 9.
  • 31. iOS Security Model Two different views of iOS security model are presented. The first model stands on four pillars that are mentioned in and are as follows:  Device Security.  Data Security.  Network Security.  Application Security.
  • 32.  Keychain Services.  CFNetwork.  The Certificate, Key, and Trust Services API.  Randomization Services.
  • 33.  The second perspective discuss the security as a set of different techniques to ensure the security.  ASLR.  Code Signing.  Sandboxing.  Data Encryption.
  • 34. iOS Malware  Aurora Feint (July, 2008)  Storm8 (November, 2009)  IPhoneOS.Ikee Worm (November, 2009)  iPhoneOS.Ikee.B (November, 2009)  KeyRaider (August 2015)  XcodeGhost (September 2015)  Youmi Ad SDK (October 2015)
  • 35. Security Comparison of iOS 8 and iOS 9 1) Stronger passcodes 2) Two factor Authentication
  • 37. Introduction to Windows:  Microsoft’s new Mobile OS -Successor to the Windows Phone.  Based on Windows CE kernel.  Released on November 8,2010.  Supports 25 Languages.  Offers a new User Interface with its “metro” login.
  • 39. Which is safest: Android, iOS or Windows Phone?  iOS is the safest out of the box  Second place goes to Windows Phone: very robust and with excellent backup options, but still needs some work.  Android falls to third place, as it forces you to make more decisions and has a less consistent security landscape, with manufacturers adding their own security customizations.
  • 40. Mobile security best practices 1. User Authentication. 2. Update Your Mobile OS with Security Patches. 3. Regularly Backup Your Mobile Device. 4. Utilize Encryption. 5. Enable Remote Data Wipe as an Option.
  • 41. Mobile security best practices(cont’d) 6. Disable Wi-Fi and Bluetooth When Not Needed. 7. Don't Fall for Phishing Schemes. 8. Avoid All Jailbreaks. 9. Add a Mobile Security App. 10. Communicate Your Mobile Security Best Practices.
  • 42. Conclusion • Modern Operating Systems come with a strong security background but there is nothing more important than the safety of the user’s data. • In these days there are a lot of known vulnerabilities in these operating systems, applications, internet browsers and specific teams and developers working on issues trying to fix known problems. • However, there is the weakest point at this security and that point is always the user of the current device.