Upgrade to Pro — share decks privately, control downloads, hide ads and more …

How To Build Insecure Android Apps (feat. Sanit...

Emmanuel Muturia™
November 10, 2023
24

How To Build Insecure Android Apps (feat. Sanitizers)

Android Security is often underestimated, with most assuming it's just a playground for hackers and Cyber Security wizards. What if I told you that the villains of Android Security are much simpler than a bunch of lines of code on a Linux terminal? This talk seeks to show the audience how the common and underrated practices in Android App Development impact Security. It will also teach the audience how they could be mitigated, with one of them being through Testing (That's where Sanitizers come in). It is based on a recent study by Google (The Android Team) that showed how more than 60% of bugs found in the Google Play Store are caused by Memory Safety. After this whirlwind journey, my audience should walk away with a newfound appreciation for Android Security. It will be a testament to how the craftiest villains often hide in plain sight, thanks to seemingly ordinary practices...

Emmanuel Muturia™

November 10, 2023
Tweet

Transcript

  1. Disclaimer • FOR SARCASM USE ONLY… • DO NOT TRY

    THIS AT HOME, SCHOOL, WORK, YOU GET THE IDEA…
  2. 1. Ignore Proper Memory Management… • Memory Leaks… • Infinite

    Allocations… • Avoid Garbage Collection…
  3. 2. Bypass Language Safeguards… • Direct Memory Access… • Null

    Pointer Dereferences… • Unsafe Type Conversions…
  4. 4. Neglect Code Reviews… • Hide Memory Issues… • Ignore

    Feedback During Code Reviews… • Abscond Altogether…
  5. 8. The “No” Means “Yes” Principle… • Automated Consent… •

    “Smart” Permission Manager… • Reverse Psychology UI…
  6. 10. Always Hardcode Your Credentials… • Insecure Constants… • The

    Universal “12345” password… • Share the users’ credentials on Social Media…
  7. 11. Commit To Plaintext Storage… • Clear Text Passwords… •

    “Not-So-Secret Secrets”... • Public Diary Mode…
  8. 15. Always Blame The User… • Key In The Open…

    • Key Pile-Up… • Key Museum…