[email protected] pre-sales & …€¦ ·  · 2017-12-18•perform dynamic...

24
The global reference in mobile application protection Mobile application threats [email protected] Pre-sales & services engineer

Upload: hatram

Post on 18-May-2018

226 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

The global reference inmobile application protection

Mobile application threats

[email protected] & services engineer

Page 2: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

Janus vulnerability: allows hackers to modify apps without affecting their signatures

Page 3: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

Mobile threats

Page 4: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

• Easily, freely available• Easily accessible• Relied upon for everyday tasks – banking, commuting, entertainment etc.

However, this also means:• Wealth of sensitive info exchanged over app• Lures hackers• Just as easily accessible to hackers• Vulnerability for apps

Mobile apps are ubiquitous

Page 5: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

Off-line: static attacks

Hackers transform the code into human readable format to find and exploit vulnerabilities

Page 6: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

Offline: static analysis

• Analyze the application source code• Disassemblers: dexdump, baksmali• Decompilers: dex2jar + jad, JD-GUI, JEB, Procyon, CFR etc.• Resources: aapt, apktool, etc.

Page 7: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

On-device: dynamic attacks

Hackers gather knowledge of the application’s behaviour and modify it at runtime

Page 8: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

• Perform dynamic binary instrumentation to learn about the application’s runtime behavior

• Using debuggers such as adb, Ida Pro etc.• Subverted runtime: Xposed, Substrate, Frida• Cracking tools: Lucky Patcher

On-device: dynamic analysis

Page 9: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

Piracy

API key extractionFinancial fraud

Cloning & IP theft Malware insertion

Credential harvesting

Mobile threats

Page 10: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

The global reference in mobile application protection

Revenue loss Reputational damage

Fines & retributions Incident handling cost

Consequences of a hacked application

Page 11: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

Mobile application attacks

Page 12: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

DDOS attacks

Page 13: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

Intellectual property theft

Page 14: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

Reputational damage

Page 15: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

Stealing API keys

Page 16: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

Mobile applicationprotection

Page 17: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

• Secure design and architecture• Proper use of the platform• Secure data storage• Secure communication• Cryptography• Authentication and session management• Code quality

• Pentesting• Secure code guiding tools• Logging code removal• ...

Secure coding practices

Good reference!OWASP Mobile Security Testing Guide: https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide#tab=Main

Page 18: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

• Name obfuscation• String encryption• Class encryption• Asset encryption• Native library encryption• Control flow obfuscation• Arithmetic obfuscation• etc.

Protecting against code reverse engineering

Page 19: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

• Tamper detection• Hook detection• Root detection• Debugger detection• Emulator detection• SSL pinning

Protecting against dynamic analysis attacks

Page 20: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

Open sourceJava and Android

Part of Android SDK

CommercialSpecialized for iOSStatic protection

ProGuard DexGuard iXGuard

CommercialSpecialized for Android

Static & dynamic protection

GuardSquare, advanced mobile app protection

Page 21: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

Obfuscation example

ORIGINAL CODE

Page 22: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

DexGuard: obfuscation example

DECOMPILED UNPROTECTED CODE

Page 23: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

DexGuard: obfuscation example

DECOMPILED OBFUSCATED CODE

Page 24: irasara.senarathne@guardsquare.com Pre-sales & …€¦ ·  · 2017-12-18•Perform dynamic binary instrumentation to learn ... Protectingagainstcode reverse engineering ... •Emulator

Thank you