<<

Mobile Security 14-829 – Fall 2012

Patrick Tague Class #2 – Components of a * System

*Smartphone can be replaced by “tablet” or a number of other words

©2012 Patrick Tague Agenda • Components of a smartphone system – What makes a smartphone smart?

– What components are involved in smartphone use?

– What are the of this “smartness”?

• Discussion of Audit • Discussion of Project components (if time)

©2012 Patrick Tague Smartphone “Smarts” Camera, Sensors Mobile video GPS applications Graphics co- Cellular telephony processors

Fast processors, Address book, multi-core calendar - “PDA” functions Multiple wireless connectivity “” via WiFi Mobile OS

SMS/MMS Data services over cellular

©2012 Patrick Tague So a Smartphone is...

©2012 Patrick Tague Smartphone Components Communication / networking

Computation / processing

Sensing / actuating / control

Entertainment / gaming

...

©2012 Patrick Tague System Interactions

©2012 Patrick Tague Mobile Operating Systems • In order to deal with the variety of systems, services, and applications, elaborate operating systems became necessary – Aliyun, Android, , BlackBerry, Boot2Gecko, Brew, GridOS, iOS, , , MeeGo, MXI, Palm, QNX, , Windows (Mobile / Phone / 8), webOS

– Each has different standards, services, styles, behaviors, foci, interactions, etc.

– Each operating system has different vulnerabilities...

©2012 Patrick Tague Mobile Applications • Mobile and web apps have emerged as the glue that binds all of the services and systems together to provide the mobile experience

• Apps have become a “service mash-up” with no limits in sight

©2012 Patrick Tague Risks and Realities • When the Internet was born, nobody envisioned the threats we would face in coming decades

• We like to say “We learn from our mistakes, and we won't make them again”...

• Not surprising... Nobody envisioned the threats we would face in the mobile domain

©2012 Patrick Tague As it turns out... • Mashing together all of these services on one device... – Yeah, maybe we should have thought that one through a bit more...

– Now, a single vulnerability in one app, protocol, or service could allow compromise of the entire device, cascading through any of the multiple connectivity points, spreading through social networks, bypassing standard web and barriers... – You get the point. – And, hopefully that's why you're in this class...

©2012 Patrick Tague Looking Forward • During the semester, we'll study various aspects of security and privacy in smartphone systems – There's no way we can talk about everything!

– This is where mobile app audits and course projects come into play: you have the freedom to expand on what I cover in whatever way you like

©2012 Patrick Tague Mobile Application Audit

©2012 Patrick Tague Mobile App Audit • Choose an app – Either something that exists or something new – Should be “feature-rich” (trust me, this is for your own benefit)

• Each day, we'll have a lecture or survey – After that, we'll have some active discussion about how the day's topic affects security and privacy of selected apps – Each day's discussion will provide insight into how the app could be modified/designed to be “more secure” – Eventually, each student will have a detailed audit

©2012 Patrick Tague What App to Choose? • Make sure the app you choose (or imagine) has a rich set of features that incorporate a variety of mobile services (i.e., a “service mash-up”) – Internet connectivity (xG, WiFi, …)? Location (GPS, AGPS, WiFi, …)? Payment? ? ZigBee? Data storage? Cloud services? ????

• Everyone should choose something at least slightly different – the audit should be individual – We'll discuss these almost every day in class, so everyone will benefit from the diversity

©2012 Patrick Tague Choose an App!

Take some time now to brainstorm, discuss, ask questions, think, and plan your audit.

©2012 Patrick Tague Course Projects • Project groups and topics need to be chosen relatively soon (proposal is September 17) • What topic to choose? – It can be something covered in class or not (as long as it's relevant...ask me) – Should relate to state-of-the-art, e.g., no , Bluetooth 1.0, Symbian, etc. – Can be vague for now, details will emerge later • How to form a group? – Talk to people, find common interests, use the discussion forum on BB

©2012 Patrick Tague Think about Projects!

Take some time now to talk to others about interests, think about topics, ask questions, come up to the lectern to make a pitch, etc.

No need to limit teams to one campus or the other, distributed teams work great!

©2012 Patrick Tague Next Time • Telecom Security from to – Some historical perspective on telecom security

– What security features are included in different telecom service classes?

– Vulnerabilities, threats, attacks?

– Telecom security issues on the horizon

©2012 Patrick Tague