DIPLOMSKO DELO Varnost in Policijsko Delo Varnost Mobilnih Naprav Z Operacijskim Sistemom Android

Total Page:16

File Type:pdf, Size:1020Kb

DIPLOMSKO DELO Varnost in Policijsko Delo Varnost Mobilnih Naprav Z Operacijskim Sistemom Android DIPLOMSKO DELO Varnost in policijsko delo Varnost mobilnih naprav z operacijskim sistemom Android Februar, 2014 Avtor: Alen Korošec Mentor: doc. dr. Igor Bernik ZAHVALA Zahvaljujem se mentorju doc. dr. Igorju Berniku za organizacijo, strokovno pomoč in nasvete pri izdelavi diplomskega dela. Posebna zahvala gre mojim staršem, ki so mi omogočili študij in me ob tem ves čas nesebično podpirali, me razumeli in me spodbujali k dosegu cilja. Iskrena hvala prijatelju Domnu Zagoršeku za moralno podporo in za vztrajno spodbujanje k pisanju diplomskega dela. Hvala Petri Letonja za slovnični in slogovni pregled diplomskega dela ter za vso ostalo prijazno pomoč. Hvala vsem, ki ste sodelovali v raziskavi in tako pripomogli k dosegu legitimnih rezultatov. Hvala tudi vsem ostalim, ki ste mi kakorkoli pomagali v času študija in pri izdelavi diplomskega dela. Hvala! Kazalo 1 UVOD ........................................................................................ 10 1.1 NAMEN IN CILJI RAZISKOVANJA ........................................................... 11 1.2 OPREDELITEV PREDPOSTAVK .............................................................. 11 1.3 METODE DELA ............................................................................ 11 2 OPIS MOBILNEGA OPERACIJSKEGA SISTEMA ANDROID ................................. 12 2.1 PLATFORMA .............................................................................. 12 2.2 APLIKACIJE ............................................................................... 13 2.3 GOOGLE PLAY ........................................................................... 14 2.4 ZGODOVINA RAZVOJA IN RAZLIČICE ....................................................... 15 2.4.1 Zgodovina ........................................................................... 15 2.4.2 Različice ............................................................................ 15 3 GROŽNJE INFORMACIJSKI VARNOSTI IN RANLJIVOSTI OS ANDROID .................. 19 3.1 ZLONAMERNA PROGRAMSKA OPREMA ...................................................... 19 3.1.1 Razširjenost ........................................................................ 19 3.1.2 Trojanski konji ..................................................................... 21 3.1.3 Oglaševalni programi (Adware) .................................................. 24 3.1.4 Vohunski programi (Spyware) .................................................... 25 3.1.5 Okužene QR kode .................................................................. 29 3.2 VARNOSTNE RANLJIVOSTI ................................................................. 29 3.2.1 USSD ranljivost ..................................................................... 30 3.2.2 Master Key ranljivost .............................................................. 31 3.2.3 ChooseLockGeneric ranljivost .................................................... 32 3.3 NEPOOBLAŠČEN FIZIČNI DOSTOP OZ. ODTUJITEV NAPRAVE ................................ 32 4 VARNA RABA MOBILNIH NAPRAV Z OS ANDROID ........................................ 33 4.1 OSNOVNA ZAŠČITA ....................................................................... 33 4.1.1 Zavedanje groženj in pazljivost ................................................. 33 4.1.2 Zaklepanje kartice SIM ............................................................ 34 4.1.3 Zaščite za zaklep zaslona ......................................................... 35 4.1.4 Varnostne kopije ................................................................... 37 4.1.5 Šifriranje naprave ................................................................. 37 4.2 PROGRAMSKA OPREMA OZ. APLIKACIJE ZA ZAŠČITO ....................................... 38 4.2.1 Antivirusni programi ............................................................... 38 4.2.2 Zaščita proti kraji .................................................................. 45 3 4.3 NAMEŠČANJE APLIKACIJ IZ ZNANIH VIROV ................................................. 52 4.4 REDNO POSODABLJANJE .................................................................. 53 4.4.1 Posodabljanje aplikacij ........................................................... 53 4.4.2 Posodabljanje različice operacijskega sistema ................................ 54 4.5 DOVOLJENJA ............................................................................. 56 4.6 NEVARNOSTI PRIDOBIVANJA DOSTOPA DO KORENSKEGA IMENIKA ........................... 61 4.7 PAZLJIVOST PRI UPORABI ODPRTIH JAVNIH OMREŽIJ WI–FI ................................ 63 5 RAZISKAVA .................................................................................. 66 5.1 METODOLOGIJA .......................................................................... 66 5.2 DEMOGRAFSKI PODATKI ................................................................... 66 5.3 MOBILNE NAPRAVE IN RAZLIČICE OS ...................................................... 67 5.4 NAJOSNOVNEJŠA ZAŠČITA ................................................................ 68 5.5 PROGRAMSKA OPREMA ZA ZAŠČITO ....................................................... 69 5.6 VARNOSTNE KOPIJE ...................................................................... 70 5.7 ŠIFRIRANJE ............................................................................... 70 5.8 NEZNANI VIRI ............................................................................. 71 5.9 DOVOLJENJA ............................................................................. 71 5.10 POSODABLJANJE ......................................................................... 72 5.11 NEZAŠČITENA BREZŽIČNA OMREŽJA ....................................................... 73 5.12 PRIDOBIVANJE KORENSKEGA DOSTOPA .................................................... 75 5.13 POZNAVANJE GROŽENJ ................................................................... 76 5.14 SAMOOCENA POZNAVANJA GROŽENJ ...................................................... 78 6 RAZPRAVA ................................................................................... 79 7 ZAKLJUČEK .................................................................................. 82 8 UPORABLJENI VIRI ......................................................................... 83 9 PRILOGA ..................................................................................... 93 4 Kazalo slik Slika 1: Android platforma (vir: Odroid Project, 2012) .................................... 13 Slika 2: Grafični pregled različic OS Android po letih (vir: Android Timeline, 2013) .. 18 Slika 3: Porast zlonamerne programske opreme (vir: Abendan, 2013) .................. 19 Slika 4: Vrste zlonamerne programske opreme (vir: TrendLabs, 2013: 6) .............. 20 Slika 5: Delež zlonamerne programske opreme po državah (vir: IT Threat Evolution …, 2013) .............................................................................................. 21 Slika 6: Prvi trojanski konj za Android (vir: How to remove …, 2010) ................... 21 Slika 7: Razširjenost različnih vrst trojanskih konjev (vir: Kaspersky Lab, 2013) ...... 22 Slika 8: Android Adware (vir: Arsene, 2013) ................................................ 25 Slika 9: SMS Tracker (vir: SMS Tracker, … 2013) ............................................ 27 Slika 10: Mobile Spy (vir: Mobile Spy, 2014) ................................................. 28 Slika 11: Mobistealth (vir: Android Monitoring Software, 2014) .......................... 28 Slika 12: USSD varnostna ranljivost (vir – desna stran slike: Blum, 2012) ............... 31 Slika 13: Zaščite za zaklep zaslona ........................................................... 36 Slika 14: 360 Security Antivirus ............................................................... 41 Slika 15: Avast Mobile Security & Antivirus .................................................. 42 Slika 16: AVG AntiVirus Security .............................................................. 42 Slika 17: Lookout Mobile Security ............................................................. 43 Slika 18: Norton Security Antivirus ........................................................... 44 Slika 19: Sophos Antivirus and Security ...................................................... 44 Slika 20: Skrbništvo naprave ................................................................... 45 Slika 21: Upravitelj naprav Google ........................................................... 47 Slika 22: Avast Anti-Theft ...................................................................... 48 Slika 23: Prey Anti-Theft ....................................................................... 49 Slika 24: Wheres My Droid ..................................................................... 49 Slika 25: Cerberus Anti-Theft .................................................................. 50 Slika 26 Plan B (vir: Plan B, 2013) ............................................................ 51 Slika 27: Nastavitve - Neznani viri ............................................................ 52 Slika 28: Posodabljanje aplikacij ............................................................. 54 Slika 29: Preverjanje za posodobitve OS ..................................................... 54 Slika 30: Zapleten Postopek nadgradnje OS (vir: HTC Software ..., 2013). ............ 56 Slika 31: Dovoljenja pri različnih aplikacijah ............................................... 57 Slika 32: Primerjava neokužene in okužene aplikacije (vir: Abendan, 2011)........... 58 Slika 33: Bitdefender
Recommended publications
  • 2018 Enabling Technology Leadership Award
    2018 Global In-Vehicle Infotainment Enabling Technology Leadership Award 2018 BEST PRACTICES RESEARCH Contents Background and Company Performance ........................................................................ 3 Industry Challenges .............................................................................................. 3 Technology Leverage and Customer Impact ............................................................. 4 Significance of Enabling Technology Leadership ............................................................. 8 Understanding Enabling Technology Leadership ............................................................. 8 Key Benchmarking Criteria .................................................................................... 9 Best Practices Award Analysis for Automotive Grade Linux .............................................. 9 Decision Support Scorecard ................................................................................... 9 Technology Leverage .......................................................................................... 10 Customer Impact ............................................................................................... 10 Decision Support Matrix ...................................................................................... 11 Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best Practices ................................................................................................................. 12 The Intersection
    [Show full text]
  • Android (Operating System) 1 Android (Operating System)
    Android (operating system) 1 Android (operating system) Android Home screen displayed by Samsung Nexus S with Google running Android 2.3 "Gingerbread" Company / developer Google Inc., Open Handset Alliance [1] Programmed in C (core), C++ (some third-party libraries), Java (UI) Working state Current [2] Source model Free and open source software (3.0 is currently in closed development) Initial release 21 October 2008 Latest stable release Tablets: [3] 3.0.1 (Honeycomb) Phones: [3] 2.3.3 (Gingerbread) / 24 February 2011 [4] Supported platforms ARM, MIPS, Power, x86 Kernel type Monolithic, modified Linux kernel Default user interface Graphical [5] License Apache 2.0, Linux kernel patches are under GPL v2 Official website [www.android.com www.android.com] Android is a software stack for mobile devices that includes an operating system, middleware and key applications.[6] [7] Google Inc. purchased the initial developer of the software, Android Inc., in 2005.[8] Android's mobile operating system is based on a modified version of the Linux kernel. Google and other members of the Open Handset Alliance collaborated on Android's development and release.[9] [10] The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Android.[11] The Android operating system is the world's best-selling Smartphone platform.[12] [13] Android has a large community of developers writing applications ("apps") that extend the functionality of the devices. There are currently over 150,000 apps available for Android.[14] [15] Android Market is the online app store run by Google, though apps can also be downloaded from third-party sites.
    [Show full text]
  • Android Before Ios in The
    Vol. 27, No. 1 u hansenreport.com u February 2014 Microsoft Windows Android before iOS in the Car As technology giants Google and Apple baked” and Apple’s approach to the indus- Not Part of Sync 3 focus on extending their reach into the car, try as arrogant. In contrast Google is said Google has made far more progress than its to be more accommodating, indicating it is rival. Both companies have efforts under- willing to adapt Android to make it more Ford Goes with Panasonic and QNX way to make devices based on their respec- useful to carmakers. The software devel- Sync 3, Ford’s third-generation Sync tive operating systems more compatible oped by the OAA is expected to debut in a infotainment system, will be based on with vehicle head units. Google has gone a production vehicle as early as the end of QNX from Blackberry, not Windows Em- step further by showing a willingness to 2014. Nobody is saying if and when iOS in bedded Automotive from Microsoft as adapt its Android operating system to run the Car will find production. with Sync 1 and Sync 2. According to Ford, the vehicle’s head unit, potentially replac- the QNX operating system makes more ing QNX, Linux or Windows. Open Automotive Alliance efficient use of memory and computing At the January 2014 Consumer Elec- Drivers would love to be able to safely power. When an infotainment design goes tronics Show, Google, along with Audi, and easily use smartphones in their cars, to production, carmakers like to have no GM, Honda, Hyundai and Nvidia, and carmakers are keen to offer cars that more than 60% utilization of microproces- announced the founding of the Open let them do that.
    [Show full text]
  • Blackberry Word Template Arial
    Android Workbook Page 2 of 54 Table of Contents Session - Set Up the BlackBerry Dynamics Development Environment ..................................... 6 Overview ................................................................................................................................ 6 Compatibility ....................................................................................................................... 6 Prepare for Application Development ..................................................................................... 7 Application Developer Portal ............................................................................................... 7 Download & Install the BlackBerry Dynamics SDK using the Android SDK Manager .......... 7 Manually Download & Install the BlackBerry Dynamics SDK for Android ...........................12 Run a Sample Application from the BlackBerry Dynamics SDK for Android ..........................14 Import a Sample Application into Android Studio................................................................14 Run an Application in Enterprise Mode ..............................................................................18 Run the Application ............................................................................................................18 Session - Secure First BlackBerry Dynamics App .....................................................................20 Preparation ............................................................................................................................20
    [Show full text]
  • Author Guidelines for 8
    Proceedings of the 52nd Hawaii International Conference on System Sciences | 2019 A New Approach to the Evolution of Collaboration Platforms: The Case of South Korea’s Convergence Alliances Heeyoung Jang Minsun Kim Sungmin Cho Korea Institute of Industrial Technology Korea Institute of Industrial Technology Korea Institute of Industrial Technology [email protected] [email protected] [email protected] Jongho Lee Hongbum Kim* Korea Institute of Industrial Technology Korea Institute of Industrial Technology [email protected] [email protected] * Corresponding author Abstract since 2000, there have been no new industries that can generate economy leverage in Korea. While organizations and alliances for collaboration Many studies have demonstrated that among the have been promoted by governments for many years, various factors affecting Korea’s rapid economic their performance has not been very meaningful in growth in the twentieth century, government-led terms of activation or outcome, particularly in South industrial policies were the main cause of the economic Korea. Thus, as a tool for creating new industries and development (e.g., [1]). However, in the current growth engines, a new form of collaboration complex economic environment, arguments for platform—convergence alliances—is being promoted maintaining government-led industrial policies are now in South Korea. In order to explore the distinct not appropriate and this is why a new type of economic characteristics and advantages of convergence growth paradigm is necessary. alliances, this research compares this new type of The government, media, scholars, and practitioners platform with existing collaboration platforms. By now emphasize that new strategies for economic using a case analysis framework with in-depth growth must be developed that will help Korea adapt to interviews, this research suggests several implications the era of the Fourth Industrial Revolution.
    [Show full text]
  • Automotive Data Sharing
    Automotive Data Sharing 16.10.2020 Executive summary Data sharing in the automotive industry Data initiatives from National Road Authorities The usage of data in the global automotive industry has been increasingly important National Road Authorities (NRAs) are looking to utilize vehicle generated data. They the last couple of years. Even though Original Equipment Manufacturers (OEMs) are, under the ITS Delegated Act 2010/40/EU, required to share data through have been collecting data from their connected vehicles for several years, they have National Access Points. Some have chosen to comply only with the regulations, just recently started to investigate opportunities for sharing the data. OEMs have while others have taken a more proactive approach to improve road operations and traditionally been reluctant to this, because of the uncertain value potential of their traffic safety in their country. Later this year (2020), the EU Member States will data. However, during 2019 and 2020, the OEMs have gradually been accelerating provide a new update on their progress with the National Access Points. We have sharing of vehicle generated data with third parties and penning deals with both data seen a number of data initiatives from the NRAs, and some are even starting to pilot aggregators and data marketplaces. These deals are creating new revenue streams Vehicle to Infrastructure (V2I) use cases. Some notable mentions of V2I applications for the OEMs. are: - Ingolstadt in Germany – also known as Audi City – are working with TTS and Safety Related Traffic Information Audi to enable traffic lights to communicate with Audi vehicles. Throughout our interviews, utilizing Safety Related Traffic Information (SRTI) have - Barcelona in Spain are collaborating with SEAT, DGT, Barcelona City Council been a persistent topic.
    [Show full text]
  • Devices, the Weak Link in Achieving an Open Internet
    Smartphones, tablets, voice assistants... DEVICES, THE WEAK LINK IN ACHIEVING AN OPEN INTERNET Report on their limitations and proposals for corrective measures French République February 2018 Devices, the weak link in achieving an open internet Content 1 Introduction ..................................................................................................................................... 5 2 End-user devices’ possible or probable evolution .......................................................................... 7 2.1 Different development models for the main internet access devices .................................... 7 2.1.1 Increasingly mobile internet access in France, and in Europe, controlled by two main players 7 2.1.2 In China, mobile internet access from the onset, with a larger selection of smartphones .................................................................................................................................. 12 2.2 Features that could prove decisive in users’ choice of an internet access device ................ 14 2.2.1 Artificial intelligence, an additional level of intelligence in devices .............................. 14 2.2.2 Voice assistance, a feature designed to simplify commands ........................................ 15 2.2.3 Mobile payment: an indispensable feature for smartphones? ..................................... 15 2.2.4 Virtual reality and augmented reality, mere goodies or future must-haves for devices? 17 2.2.5 Advent of thin client devices: giving the cloud a bigger role?
    [Show full text]
  • Ios 11 Download Android Ios 11 Download Android
    ios 11 download android Ios 11 download android. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 67ac34852cf78474 • Your IP : 188.246.226.140 • Performance & security by Cloudflare. iOS 15 vs. Android 12 preview: Which OS looks more impressive? Following their respective developer conferences, Google and Apple have shown us what's coming with the updated versions of their phone software this year. Both Android 12 and iOS 15 are major updates to not only the look and feel of each operating system, but also to how you'll interact with your smartphone. From Android 12's new Material You design language to iOS 15's modified notifications and new Focus mode, rest assured that whichever device you use, you can expect great things later this year. The absolute best phones that you can buy Amazon Prime Day deals 2021 — date and what to expect Just in: Apple Beats Studio Buds price and launch date tipped.
    [Show full text]
  • Android Programming Introduction
    Android Programming Introduction Riya Jacob K Dept of BCA 2020 - 21 Modules 5 Modules 1 Module: Introduction & installation of Android(12 T+3L) 2 Module : Understanding Android Resources(12 T + 3L) 3 Module : UI development in Android (12 T + 3L) 4 Module : Android Menus (12 T+ 3L) 5Module : Data storing &file saving concept (12 T + 3 L) Module 1 History of Android Android software stack Developing end user application using android SDK Android java packages, Setting up the development environment, Installing android development tools (ADT) Fundamental components Android virtual devices, Running on real device Structure of android application Application life cycle. Introduction Android is an open source and Linux- based Operating System for mobile devices such as smartphones and tablet computers. Android was developed by the Open Handset Alliance, led by Google, and other companies. Android offers a unified approach to application development for mobile devices which means developers need only develop for Android, and their applications should be able to run on different devices powered by Android. Intro. The first beta version of the Android Software Development Kit (SDK) was released by Google in 2007 where as the first commercial version, Android 1.0, was released in September 2008. On June 27, 2012, at the Google I/O conference, Google announced the next Android version, 4.1 Jelly Bean. Jelly Bean is an incremental update, with the primary aim of improving the user interface, both in terms of functionality and performance. The source code for Android is available under free and open source software licenses. Google publishes most of the code under the Apache License version 2.0 and the rest, Linux kernel changes, under the GNU General Public License version 2.
    [Show full text]
  • ADA+-+Iot+Automotive FINAL.Pdf
    The market for automobiles enhanced with IoT "When Henry Ford made cheap, reliable cars is staggering. A 2013 forecast by GSMA, a global people said, 'Nah, what's wrong with a horse?' association of wireless carriers, found every car That was a huge bet he made, and it worked." will have some type of connection by 2025. The ~ Elon Musk, inventor, entrepreneur and CEO market for technology to connect cars and the of Tesla Motors Internet was an estimated $18 billion in 2012 and is expected to increase three times that number in the next four years. EXECUTIVE SUMMARY “Not only that, but this remarkable technology Since Henry Ford helped automate their can seamlessly sync a wireless smartphone or manufacture, cars have become central to our tablet to a vehicle’s audio and display system lives. This makes the automobile a central hub for communication with pedestrians, other for not only transportation, but as a vehicles and even road infrastructure,” communications center: The ideal ecosystem according to Rajiv Kapur of Broadcom India. for the Internet of Things (IoT). In 2014, the Application Developers Alliance The connected vehicle is truly a microcosm of and its Emerging Technology Working Group IoT. Not only can a networked car, truck or bus began identifying five areas influenced by IoT so include internal sensors that determine such that developers have insight into creating a things as speed, location and temperature of robust IoT ecosystem. This whitepaper serves as the vehicle, but it also may interact with an exploration of IoT by looking at its current surrounding roads, buildings and other vehicles state in automotive; best practices for creating to provide up-to-the-minute information to apps; and new opportunities to explore.
    [Show full text]
  • Assessment of the Technical Feasibility of ICT and Charging Solutions
    Assessment of the technical feasibility of ICT and charging solutions Deliverable No. D4.2.1 Workpackage No. WP4.2 Workpackage Title Technical feasibility of ICT and charging solutions Authors ENIDE, ICCS, CEA, CIRCE, CRF, TECNO, UNIGE, VEDE Status (Final; Draft) Final Dissemination level (Public; Public Restricted; Confidential) Project start date and duration 01 January 2014, 48 Months Revision date 2014 – 10 – 31 Submission date 2014 – 10 – 31 This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no 605405 Copyright FABRIC <D4.2.1> Public Contract N. 605405 TABLE OF CONTENTS EXECUTIVE SUMMARY ............................................................................................................................ 12 1. INTRODUCTION ............................................................................................................................... 17 1.1 GENERAL .................................................................................................................................... 17 1.2 CONTRIBUTION TO FABRIC OBJECTIVES ...................................................................................... 17 1.3 DELIVERABLE STRUCTURE ........................................................................................................... 17 2. METHODOLOGY .............................................................................................................................. 19 2.1 GENERAL
    [Show full text]
  • Citrix Workspaceapp Forandroid
    Citrix Workspace app for Android Citrix Product Documentation | docs.citrix.com September 29, 2021 Citrix Workspace app for Android Contents About this release 3 Prerequisites for installing 25 Install, Upgrade 30 Get started 32 Configure 36 Authenticate 58 SDK and API 59 © 1999–2021 Citrix Systems, Inc. All rights reserved. 2 Citrix Workspace app for Android About this release September 28, 2021 What’s new in 21.9.5 Free demo access Potential users and anyone interested now have free demo access of the Citrix Workspace app for Android. Service continuity We now support Service continuity. Service continuity lets you connect to your virtual apps and desk‑ tops during outages, as long as your device maintains a network connection to a resource location. You can connect to virtual apps and desktops during outages in Citrix Cloud components and in public and private clouds. Notes (Android 12 Beta 4 and HTTPS) • Citrix Workspace app for Android 21.9.5 supports Android 12 Beta 4. • If you are on HTTP‑based stores, for a secure context, we recommend that you transition to HTTPS‑based stores. For more information, see HTTPS. What’s new in 21.9.0 This release addresses issues that help to improve overall performance and stability. Note: • Citrix Workspace app 21.9.0 for Android supports Android 12 Beta 4. • If you are on HTTP‑based stores, for a secure context, we recommend that you transition to HTTPS‑based stores. For more information, see HTTPS. What’s new in 21.8.5 We now support Android 12 Beta 4 in Citrix Workspace app for Android.
    [Show full text]