Top Banner
ZSOLT NEMET H @ ZSOLT _ NEMETH M OBILE A PPLICATION S ECURITY - STATE OF PLAY -
17

MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

Jul 28, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

ZSOLT NEMETH

@ZSOLT_NEMETH

MOBILE APPLICATION SECURITY

- STATE OF PLAY -

Page 2: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

MOBILE APPLICATION SECURITY 2

SUMMARY

- CONFLICT OF INTEREST BETWEEN PLAYERS

DEVELOPERSSECURITY

CONSULTANTSVS.

- THEY DO NOT KNOW EACH OTHERS’ PLAYBOOKS

Page 3: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

MOBILE APPLICATION SECURITY 3

ISSUES

SECURE CODINGMANUAL PENTESTS

ARE SLOW

LONG PATCHING

CYCLES

Page 4: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

MOBILE APPLICATION SECURITY 4

CONCERNS OVER MOBILE APPS

1 2 3SOURCE: SECURITY AWARENESS FORRESTER

REPORT, 2015

CONCERN OVER MOBILE AND CLOUD-BASED APPLICATIONSBOTH INCREASED FROM LESS THAN 10% IN 2014 TO

DOMINATE THE NEXT TOP SPOTS IN 2015.

2013 24%

2014 35%

2015 DEC 63%

Page 5: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

MOBILE APPLICATION SECURITY 5

TESTING METHODS

DASTDYNAMIC APPLICATION

SECURITY TESTING

SASTSTATIC APPLICATION

SECURITY TESTING

IASTINTERACTIVE

APPLICATION

SECURITY TESTING

FUZZING

FUZZING CODE

REVIEW

PENTEST

PENETRATION

TESTING

BOUNTY

BUG BOUNTY

PROGRAMMES

Page 6: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

MOBILE APPLICATION SECURITY 5

TESTING METHODS

DASTDYNAMIC APPLICATION

SECURITY TESTING

SASTSTATIC APPLICATION

SECURITY TESTING

IASTINTERACTIVE

APPLICATION

SECURITY TESTING

FUZZING

FUZZING CODE

REVIEW

PENTEST

PENETRATION

TESTING

BOUNTY

BUG BOUNTY

PROGRAMMES

Page 7: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

MOBILE APPLICATION SECURITY 6

SOURCE CODE AVAILABILITY

AVAILABLEPROPER CODE-AUDITING CAN BE DONE

HIGHER CHANCE TO SPOT AN ERROR

DEVELOPER CASES

ISSUE OF 3RD PARTY LIBRARIES

LESS PATCHING TIME

MISSINGREVERSE ENGINEERING NEEDED

APPROX. 65% OF TESTS CAN BE DONE

TELCO / RESELLER CASES

ISSUE OF 3RD PARTY DEVELOPERS

Page 8: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

MOBILE APPLICATION SECURITY 7

MOBILE APPLICATION SECURITY STANDARDS

OWASP TOP 10

ISO 27034

NIST 800-53/64

Page 9: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

MOBILE APPLICATION SECURITY 8

THE TOP 10 LIST1. ACTIVITY MONITORING AND DATA RETRIEVAL

2. UNAUTHORIZED DIALING, SMS AND PAYMENTS

3. UNAUTHORIZED NETWORK CONNECTIVITY (EXFILTRATION COMMAND & CONTROL)

4. UI IMPERSIONALIZATION

5. SYSTEM MODIFICATION (ROOTKIT, APN PROXY CONFIG)6. LOGIC OR TIME BOMB

7. SENSITIVE DATA LEAKAGE (INADVERTENT OR SIDE CHANNEL)8. UNSAFE SENSITIVE DATA STORAGE

9. UNSAFE SENSITIVE DATA TRANSMISSION

10. HARDCODED PASSWORD/KEYSSOURCE: HTTPS://WWW.OWASP.ORG/ IMAGES/9/94/MOBILETOPTEN.PDF

Page 10: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

MOBILE APPLICATION SECURITY 9

MAIN DRIVERS

COMPLIANCE

ECONOMIC IMPACT ON COMPANY

DIRECT RESPONSE FOR A SECURITY

INCIDENT

Page 11: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

MOBILE APPLICATION SECURITY 10

SOLUTIONS

PENETRATION TESTING

EXPENSIVE & SLOW

TIME CONSUMING

TRAINING – SAFE CODE ( W W W . SA FECO DE. O RG)

ONLY IF SOURCE CODE IS AVAILABLE

SOURCE CODE ANALYSIS

Page 12: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

MOBILE APPLICATION SECURITY 11

AUTOMATED SOLUTIONS

VERACODE APPTHORITY APP-RAY

(FULLY AUTOMATED)

Page 13: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

MOBILE APPLICATION SECURITY 12

HOW DOES IT WORK

Page 14: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

MOBILE APPLICATION SECURITY 12

HOW DOES IT WORK

APP-RAY

(FULLY AUTOMATED)

BENEFITS: PATCHING TIME LOW

SPOTTING SERIOUS ISSUES

IMMEDIATELY

TIME & COST EFFICIENT

NO NEED OF SOURCE CODE

INTEGRATION INTO BUSINESS PROCESSES

LESS EXPERT WORKFORCE CAN DO IT

Page 15: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

MOBILE APPLICATION SECURITY 12

HOW DOES IT WORK

APP-RAY

(FULLY AUTOMATED)

"26% OF DEFENDERS TOOK 2-7 DAYS TO DEPLOY PATCHES TO CRITICAL APPS

IN USE, WHILE ANOTHER 22% TOOK 8-30 DAYS, AND 14% NEEDED 31 DAYS

TO THREE MONTHS TO DEPLOY PATCHES SATISFACTORILY."

SOURCE: SECURITY AWARENESS REPORT, 2015

Page 16: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

THANK YOU FOR YOUR ATTENTION

ZSOLT NEMETH, FOUNDER OF APP-RAY GMBH

WWW.APP-RAY.CO

Page 17: MOBILE APPLICATION SECURITY - HEK.SI · mobile application security 8 the top 10 list 1. activity monitoring and data retrieval 2. unauthorized dialing, sms and payments 3. unauthorized

TYPICAL CUSTOMER TYPES FOR APP-RAY

1. TELECOM COMPANIES

2. ENTERPRISE APP STORES

a) FOR EMPLOYEES (CREDIT AGRICOLE)H T T P S : / / W W W . CR EDIT A GR ICO LEST O RE . F R/

a) FOR CUSTOMERS (DEUTSCHE BANK, ETC)H T T P S : / / W W W . AU T O BAH N . D B. CO M / M ICR OS IT E / DO CS/A_ N E W_ GEN ERAT IO N_ O F_ GTB_ S ERVICE S_ FO R_ C O RP O RA T ES_ -

_ E X P E R IE N CE_ T H E_ A U T O BAH N_ A P P_ M A R K ET_ %28B R O CH U RE_ E N GLIS H%29 . P D F

a) BANKING APP STORES FOR CUSTOMERS

H T T P : / / E C. E U R O P A . E U/ FIN A NCE / P AY M ENT S/ D O CS/ FR AM EWO RK / P S D_ CO N SUM ERS / P SD_ EN. P D F

H T T P S : / / W W W . P IA P P B AN K . CO M . AU /A P PG R ID / A P PC A T A LOG UE . HT M