12
Attack analysis and Security concepts for MObile Network infrastructures supported by collaborative Information exchAnge Consortium Sascha Wessel Fraunhofer AISEC Integrity Protection for Mobile Devices 07.05.2013 Sascha Wessel, Fraunhofer AISEC / Version 1.0 / Copyright © 2013 ASMONIA Project. All rights reserved.

Integrity Protection for Mobile Devices - ASMONIA | … Integrity Protection for Mobile Devices Author Sascha Wessel Keywords ASMONIA Created Date 5/1/2013 10:30:44 AM

  • Upload
    lamthuy

  • View
    222

  • Download
    5

Embed Size (px)

Citation preview

Page 1: Integrity Protection for Mobile Devices - ASMONIA | … Integrity Protection for Mobile Devices Author Sascha Wessel Keywords ASMONIA Created Date 5/1/2013 10:30:44 AM

Attack analysis and Security concepts for

MObile Network infrastructures

supported by collaborative Information exchAnge

Consortium

Sascha Wessel

Fraunhofer AISEC

Integrity Protection for

Mobile Devices

07.0

5.2

013

Sascha Wessel, Fraunhofer AISEC / Version 1.0 / Copyright © 2013 ASMONIA Project. All rights reserved.

Page 2: Integrity Protection for Mobile Devices - ASMONIA | … Integrity Protection for Mobile Devices Author Sascha Wessel Keywords ASMONIA Created Date 5/1/2013 10:30:44 AM

Outline

Motivation

Mobile Device Architectures

Situation Today

Our Contribution

Attestation of Mobile Baseband Stacks [1]

SobTrA: A Software-based Trust Anchor for ARM Cortex Application Processors [2]

Improving Mobile Device Security with Operating System-level Virtualization [3]

Page-based Runtime Integrity Protection of User and Kernel Code [4]

Conclusion

07.05.2013 Sascha Wessel, Fraunhofer AISEC / Version 1.0 / Copyright © 2013 ASMONIA Project. All rights reserved. 2

Page 3: Integrity Protection for Mobile Devices - ASMONIA | … Integrity Protection for Mobile Devices Author Sascha Wessel Keywords ASMONIA Created Date 5/1/2013 10:30:44 AM

Motivation

What is to be achieved?

Guarantee that a piece of software runs untampered on the device

Detect and prevent malicious modifications on the device

Detect malicious modifications at connect or during a transaction in

the backend

And why?

Securing mobile banking and payment

Trusted Network Connect

General attack prevention

07.05.2013 Sascha Wessel, Fraunhofer AISEC / Version 1.0 / Copyright © 2013 ASMONIA Project. All rights reserved. 3

Pictures:

Wikipedia

Page 4: Integrity Protection for Mobile Devices - ASMONIA | … Integrity Protection for Mobile Devices Author Sascha Wessel Keywords ASMONIA Created Date 5/1/2013 10:30:44 AM

Mobile Device Architectures

07.05.2013 Sascha Wessel, Fraunhofer AISEC / Version 1.0 / Copyright © 2013 ASMONIA Project. All rights reserved. 4

Page 5: Integrity Protection for Mobile Devices - ASMONIA | … Integrity Protection for Mobile Devices Author Sascha Wessel Keywords ASMONIA Created Date 5/1/2013 10:30:44 AM

Situation Today

Baseband

No integrity protection

Bad code quality highly vulnerable

Application

On some devices secure boot based on Core Root of Trust for

Measurement (CRTM) using manufacturer controlled ROM

Application integrity protection at install time

Typically no runtime protection

Sometimes isolated parts using a Trusted Execution Environment

(TEE), e.g., running in ARM’s TrustZone

07.05.2013 Sascha Wessel, Fraunhofer AISEC / Version 1.0 / Copyright © 2013 ASMONIA Project. All rights reserved. 5

Page 6: Integrity Protection for Mobile Devices - ASMONIA | … Integrity Protection for Mobile Devices Author Sascha Wessel Keywords ASMONIA Created Date 5/1/2013 10:30:44 AM

Attestation of Mobile Baseband Stacks [1]

MTM-based

attestation

Attestation of

baseband at

network connect

No network

access if

attestation fails

Requires

modifications

of infrastructure

elements (MME)

07.05.2013 Sascha Wessel, Fraunhofer AISEC / Version 1.0 / Copyright © 2013 ASMONIA Project. All rights reserved. 6

Page 7: Integrity Protection for Mobile Devices - ASMONIA | … Integrity Protection for Mobile Devices Author Sascha Wessel Keywords ASMONIA Created Date 5/1/2013 10:30:44 AM

SobTrA: A Software-based Trust Anchor for

ARM Cortex Application Processors [2]

Secure boot without

hardware-based trust

anchor in ROM

Locally connected verifier

device, .e.g., microSD card

using SPI or SDIO

Implementation based on

self-checksumming code

07.05.2013 Sascha Wessel, Fraunhofer AISEC / Version 1.0 / Copyright © 2013 ASMONIA Project. All rights reserved. 7

Page 8: Integrity Protection for Mobile Devices - ASMONIA | … Integrity Protection for Mobile Devices Author Sascha Wessel Keywords ASMONIA Created Date 5/1/2013 10:30:44 AM

Improving Mobile Device Security with

Operating System-level Virtualization [3]

07.05.2013 Sascha Wessel, Fraunhofer AISEC / Version 1.0 / Copyright © 2013 ASMONIA Project. All rights reserved. 8

Multiple Android userland

instances on one device

Isolation based on Linux

namespaces and cgroups

Integrity protection based on

Linux Security Modules (LSM)

Page 9: Integrity Protection for Mobile Devices - ASMONIA | … Integrity Protection for Mobile Devices Author Sascha Wessel Keywords ASMONIA Created Date 5/1/2013 10:30:44 AM

Implemented in Virtual

Machine Monitor (VMM)

Protection based on

memory mappings for

guest operating system

(executable xor writable)

Page-based Runtime Integrity Protection of

User and Kernel Code [4]

07.05.2013 Sascha Wessel, Fraunhofer AISEC / Version 1.0 / Copyright © 2013 ASMONIA Project. All rights reserved. 9

Page 10: Integrity Protection for Mobile Devices - ASMONIA | … Integrity Protection for Mobile Devices Author Sascha Wessel Keywords ASMONIA Created Date 5/1/2013 10:30:44 AM

Conclusion

Integrity protection for mobile devices has several aspects

Our focus was on secure boot and runtime protection

Most of the presented mechanisms work independently without

network connection on a device (using local whitelists)

These mechanisms are the base for remote verification or

attestation, e.g., Trusted Network Connect (TNC)

Potential sensor for information sharing

We implemented several prototypes

07.05.2013 Sascha Wessel, Fraunhofer AISEC / Version 1.0 / Copyright © 2013 ASMONIA Project. All rights reserved. 10

Pictures:

Wikipedia

Page 11: Integrity Protection for Mobile Devices - ASMONIA | … Integrity Protection for Mobile Devices Author Sascha Wessel Keywords ASMONIA Created Date 5/1/2013 10:30:44 AM

Thank you for your Attention

Sascha Wessel, Fraunhofer AISEC

[email protected]

07.05.2013 Sascha Wessel, Fraunhofer AISEC / Version 1.0 / Copyright © 2013 ASMONIA Project. All rights reserved. 11

Page 12: Integrity Protection for Mobile Devices - ASMONIA | … Integrity Protection for Mobile Devices Author Sascha Wessel Keywords ASMONIA Created Date 5/1/2013 10:30:44 AM

References

[1] Steffen Wagner, Sascha Wessel and Frederic Stumpf, Attestation of

Mobile Baseband Stacks, 6th International Conference on Network and

System Security, 2012.

[2] Julian Horsch, Sascha Wessel, Frederic Stumpf and Claudia Eckert,

SobTrA: A Software-based Trust Anchor for ARM Cortex Application

Processors, currently under review.

[3] Sascha Wessel, Frederic Stumpf, Ilja Herdt and Claudia Eckert, Improving

Mobile Device Security with Operating System-level Virtualization, 28th IFIP

TC-11 SEC 2013 International Information Security and Privacy Conference,

2013.

[4] Sascha Wessel and Frederic Stumpf, Page-based Runtime Integrity

Protection of User and Kernel Code, 5th European Workshop on System

Security, 2012.

07.05.2013 Sascha Wessel, Fraunhofer AISEC / Version 1.0 / Copyright © 2013 ASMONIA Project. All rights reserved. 12