Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Defensive Android Security

bolot
September 21, 2017

Defensive Android Security

Security vulnerabilities make great headlines. Attackers need to find only one weakness, you need to defend against them all. Fortunately, you are not alone. Learn about the security mechanisms in the Android platform and Google Play services. How to evaluate your own app's security using checklists like OWASP MASVS (Mobile Application Security Verification Standard).

bolot

September 21, 2017
Tweet

More Decks by bolot

Other Decks in Programming

Transcript

  1. Security Goals • Keep user data safe • Keep system

    integrity • Prevent unauthorized operations • Ensure communication integrity • Platform vs apps
  2. Security Goals • Planning • Cost / Benefit • Threat

    Modeling • Evaluation Value Attack Defense
  3. Attack Surface • Linux kernel, forked, older version • Communication,

    SMS, NFC, Bluetooth, USB • Device drivers, GPU, modem • Web view, Chrome • Android architecture, sandbox, permissions • Networking libraries, CA trust • Storage • Third party libraries • Other apps • Your own app
  4. Platform Security • Linux Security • Application Sandbox • Permissions

    • Software Updates • Application Signing • Secure IPC (Binder) • Keystore • Verified Boot • Google Play • Verify Apps • SafetyNet • ASLR, PIE, NX, SELinux
  5. Network Security • Modern TLS, Good Ciphers • PKI and

    Certificate Authority • Network Security Configuration • Use Good Libraries • Tomorrow: These and Other Rules
  6. App Security • Storage • Communication • Auth • Input

    Validation • IPC • WebView • Encryption • Keystore • Fingerprint • Auth
  7. What Can Developers Do? • Practice security as a user

    • Optimize for best security practices • Training • Checklists • Audits, Reviews
  8. Other Talks • DevNexus 2017 • Josh Skeen: Keeping Secrets

    Secure • What Android Developers Should Know About Security