Slide 1

Slide 1 text

No content

Slide 2

Slide 2 text

Securing Mobile Devices Daiane Santos

Slide 3

Slide 3 text

Agenda Common Mobile Vulnerabilities OWASP Top 10 Mobile Securing Mobile Apps Obfuscation Secure Coding 01 02 03 04 05

Slide 4

Slide 4 text

$whoami Autist - AH/SD Mobile Security Engineer @ Nubank CTF Player and Captain @ RATF Neuroscience and Astronomy enthusiast

Slide 5

Slide 5 text

Common Mobile Vulnerabilities

Slide 6

Slide 6 text

OWASP Top 10 M1: Improper Platform Usage M2: Insecure Data Storage M3: Insecure Communication M4: Insecure Authentication M5: Insufficient Cryptography M6: Insecure Authorization M7: Client Code Quality M8: Code Tampering M9: Reverse Engineering M10: Extraneous Functionality

Slide 7

Slide 7 text

Unauthorized access and fraud; Intelectual property theft; Trust damaged; Negative end-user experiences; Negative, potentially permanent impact on the brand’s reputation; Ongoing financial losses; Privacy related and confidencial/sensitive data theft. Business Impact

Slide 8

Slide 8 text

How do I know if I'm vulnerable?

Slide 9

Slide 9 text

Can someone code-decrypt your app?

Slide 10

Slide 10 text

Can someone reverse engineer this app with automated tools?

Slide 11

Slide 11 text

How to Secure Mobile Devices

Slide 12

Slide 12 text

Source Code Encryption Penetration Tests Secure the Data-in-transit Database Encryption Cryptography 1. 2. 3. 4. 5.

Slide 13

Slide 13 text

6. High-level Authentication 7. Secure the Backend 8. Minimize Storage of Sensitive Data 9. Be careful with Third-Party Services

Slide 14

Slide 14 text

GENERAL REMOTE ATTESTATION INTEGRITY CHECKS ROOT DETECTION DEVICE BINDING SSL PINNING EMULATOR DETECTOR RESOURCES ENCRYPTION INTEGRITY CHECKS ANTI-TEMPERING APPLICATION CODE ENCRYPTION CODE OBFUSCATION ANTI-HOOK ANTI-TEMPERING CODE

Slide 15

Slide 15 text

Obfuscation

Slide 16

Slide 16 text

No content

Slide 17

Slide 17 text

No content

Slide 18

Slide 18 text

No content

Slide 19

Slide 19 text

No content

Slide 20

Slide 20 text

No content

Slide 21

Slide 21 text

Secure Coding Best practices according to each programming language Map security requirements at the beginning of the project Include SAST and DAST tools, and a Vulnerability Management process

Slide 22

Slide 22 text

References OWASP Mobile Top 10 Mobile Testing Guide Secure Coding Practices

Slide 23

Slide 23 text

Thank you! If you have any questions, please feel free to contact me!