22
Research on IF-MAP Ingo Bente (Trust@FHH) 15.04.2011, University of Frankfurt

Research on IF-MAP

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Research on IF-MAP

Research on IF-MAP Ingo Bente (Trust@FHH)

15.04.2011, University of Frankfurt

Page 2: Research on IF-MAP

Introduction

2011/04/15 ESUKOM 2

Page 3: Research on IF-MAP

Trust@FHH Research Group

• Team

– Chair: Prof Dr. Josef von Helden

– 3 research associates

– 4 student assistants

• Research Fields

– Trusted Computing

– Network & Mobile Security

• Selected Projects

– TNC@FHH

– IRON

– ESUKOM

• More Information

– trust.inform.fh-hannover.de

2011/04/15 ESUKOM 3

Page 4: Research on IF-MAP

The ESUKOM Project in a Nutshell

• Motivation

– Smartphones are used in business environments

– Impact of Smartphones in terms of IT-Security is unclear

– Idea: Address Smartphone Challenge by leveraging IF-MAP

• Project Goals

– Investigation of Smartphone platforms in terms of security

– Development of IF-MAP prototype infrastructure

• Duration

– 10/2010 – 09/2012 (2 years)

• Funding

– Funded by german BMBF

• Website

– www.esukom.de

2011/04/15 ESUKOM 4

Page 5: Research on IF-MAP

Project Consortium

• 3 SMEs & 2 Academic Institutions

– DECOIT GmbH

– mikado soft GmbH

– NCP Secure Communications

– Fraunhofer SIT

– Trust@FHH, FH Hannover

• Further Cooperations

– Infoblox, Juniper, Enterasys, Infineon

– PhD Programme with

Universität der Bundeswehr München

2011/04/15 ESUKOM 5

Page 6: Research on IF-MAP

Why using IF-MAP anyway?

2011/04/15 ESUKOM 6

Page 7: Research on IF-MAP

ESUKOM Problem Statement

• How to secure smartphones in business environments?

• What we knew in advance

– (Some) characteristics of smartphones

– Smartphones are not properly addressed today …

– … but existing security tools are deployed

– Our technological background (TC, TNC, IF-MAP)

• What we did not know

– How do smartphones change attack surface?

– What aspects of smartphones are important in terms of security?

– What (existing/new) means are appropriate to secure

smartphones?

2011/04/15 ESUKOM 7

Page 8: Research on IF-MAP

ESUKOM Idea

• Idea

– Leverage existing tools to secure smartphone usage

– Follow network oriented approach

– Correlate (smartphone) metadata from arbitrary sources

– No system security

• Why IF-MAP?

– General purpose, content based pub/sub protocol

– Integration of existing security solutions

– Good experiences from adoption (IRON project)

– Exciting new technology

2011/04/15 ESUKOM 8

Page 9: Research on IF-MAP

ESUKOM High Level Architecture

2011/01/12 ESUKOM 9

Page 10: Research on IF-MAP

The Field of Mobile Phone Security

2011/04/15 ESUKOM 10

Page 11: Research on IF-MAP

Mobile Phone Security Research

• Research questions

– Threats introduced by smartphones?

– Limitations and flaws of current platforms?

• Research field is gaining momentum

– Focus on Android and iOS

– Mostly exploits & system security approaches

– For example Taintdroid, Kirin & Saint (Enck et al. 2009 & 2010,

PSU)

2011/04/15 ESUKOM 11

Page 12: Research on IF-MAP

Smartphone Threat Analysis for ESUKOM

• Goal

– Threat model for smartphones used in corporate environments

– Smartphones == mobile consumer electronic devices

• Smartphone Characteristics

– Built-in Sensors

– Connectivity

– Internet-support

– Resource Paradox

– App-based Architectures

– Platform Diversity

2011/04/15 ESUKOM 12

Page 13: Research on IF-MAP

Smartphone Threat Analysis for ESUKOM

2011/04/15 ESUKOM 13

Page 14: Research on IF-MAP

ESUKOM Key Features

2011/04/15 ESUKOM 14

Page 15: Research on IF-MAP

ESUKOM Key Features

2011/04/15 ESUKOM 15

Page 16: Research on IF-MAP

Open (Research) Questions

• Effective correlation of large metadata graphs

– What are suitable correlation approaches?

– What part of metadata graph is relevant for what purpose?

• Smartphone specific metadata vocabularies

– Status of sensors

– Location

– Platform Details (installed apps, used permissions)

• Interdomain MAP

– MAP-Server to MAP-Server Communication

• Threats introduced by IF-MAP?

– Impact of rouge MAPCs

– Trustworthiness of metadata graph

2011/04/15 ESUKOM 16

Page 17: Research on IF-MAP

Thank You Questions ?

Page 18: Research on IF-MAP

Backup Slides

2011/04/15 ESUKOM 18

Page 19: Research on IF-MAP

ESUKOM Key Feature MalApp Detection

2011/04/15 ESUKOM 19

Page 20: Research on IF-MAP

Live Demo

2011/04/15 ESUKOM 20

Page 21: Research on IF-MAP

IF-MAP Demo

• MAP Server

– irond 0.2.1

• MAP Clients

– soapUI (triggers IF-MAP operations)

– irongui 0.1.0 (visualization)

• Software available at

– http://trust.inform.fh-hannover.de

– www.soapui.org

– Licenses: Apache License 2 & LGPL 2.1

2011/04/15 ESUKOM 21

Page 22: Research on IF-MAP

Copyright 2011

Das dem Projekt zugrunde liegende Vorhaben wurde mit Mitteln des Bundesministeriums für

Bildung und Forschung unter dem Förderkennzeichen „01BY1050“ gefördert. Die

Verantwortung für den Inhalt liegt bei den Autoren.

Die in dieser Publikation enthaltenen Informationen stehen im Eigentum der folgenden

Projektpartner des vom Bundesministerium für Bildung und Forschung (BMBF)

geförderten Projektes „ESUKOM“: DECOIT GmbH, Fachhochschule Hannover (FHH),

Fraunhofer-Institut für Sichere Informationstechnologie (SIT), NCP engineering GmbH

und der mikado soft GmbH. Für in diesem Dokument enthaltenen Information wird keine

Garantie oder Gewährleistung dafür übernommen, dass die Informationen für einen

bestimmten Zweck geeignet sind. Die genannten Projektpartner übernehmen keinerlei

Haftung für Schäden jedweder Art, dies beinhaltet, ist jedoch nicht begrenzt auf direkte,

indirekte, konkrete oder Folgeschäden, die aus dem Gebrauch dieser Materialien

entstehen können und soweit dies nach anwendbarem Recht möglich ist.

2011/01/12 ESUKOM 22