Android Obfuscation and Deobfuscation. Group 11

Size: px
Start display at page:

Download "Android Obfuscation and Deobfuscation. Group 11"

Transcription

1 Android Obfuscation and Deobfuscation Group 11

2 Password Diary App

3 Overview App - Raj Obfuscation Cam and Jack Deobfuscation Adi and Shon

4 Overview - Concept A password manager that lets you decide whether to encrypt your password or not Add login Encrypt/Decrypt your password Edit your login Delete your login

5 Add Login

6 Encrypt/Decrypt

7 Update and Delete

8 Obfuscation

9 Overview - - Obfuscated using various techniques String Splitting Variable/Class Renaming Control Flow Flattening Method Inlining Resulting source code is magnitudes larger, 100 line class can end up over 10,000 lines of obfuscated code Can be fed into itself multiple times to obfuscate further

10 Variable Renaming - Building mapping of identifiers to randomly generated strings Renaming of variables, methods and classes Different every time Automatic - Issues: Classes and methods defined in android interfaces and classes are not renamed

11 Control Flow Flattening - Splits all statements into individual cases in a switch/case block Can be run over itself multiple times Switches on strings, which means the case variables are generated dynamically with string splitting The case variables are then split into their own switch/case blocks when run over itself Order of statements randomised

12 Example of while loop

13 String Splitting - Strings split into individual characters Rebuilt into string character by character Used in conjunction with control flow flattening If a string is used more than once, it it split up for every occurrence Split all usages of string, except when declared as a property of a class

14 String Splitting

15 Method inling - Automatically replace method calls with method contents Each inlined method is different (variable renaming, control flow flattening) -> Each must be deobfuscated - Issues when method is not defined in same class, or inherited etc

16 Method inling

17 Performance Overhead

18 Storage Overhead No significant storage or performance overhead issues.

19 Deobfuscation

20 Group Obfuscation Techniques Deobfuscation 1 Renaming Control flow flattening String Encryption with AES/CBC Cipher and Base64 Encoding Proguard Unflatten switch cases --> if statements and while loops Base64 decoding + bitwise XOR operations to get key --> Decrypt strings 2 Renaming Prone to SQL injections 3 Renaming Control flow flattening with Dead Code Merging/Splitting classes Opaque predicates Proguard Dead code removal and unflatten switch cases --> simple if statements Opaque predicates are trivial 4 Renaming Opaque predicates Identified method names Removing duplicate if statements 5 Renaming Variable splitting Loop transformations + Dead Code Identified Activity class by familiar methods e.g. oncreate(), onresume() Retransform long do-while loops --> for loops 6 Renaming Encryption with Base64 Encoding Proguard Identified Activity class through oncreate() method and Activity/Intent packages.

21 Example of Control flow flattening deobfuscation

22 Group Obfuscation Techniques Deobfuscation 7 Dead Code Control flow flattening Removal of dead code for easier deobfuscation of switch case blocks. 8 Control flow flattening Dead Code Opaque predicates Simplification of switch statements Removal of dead code. 9 Renaming AES Encryption with Base64 Encoding Control flow flattening Proguard Base64 decoding followed by AES decryption. Replication of string manipulation function to unflatten control flow. 10 Control flow flattening Deobfuscation of switch case blocks through the simplification of a method determining which switch case block to execute. 12 Renaming Proguard 13 Renaming AES Encryption with Base64 Encoding Dead Code + Opaque predicates Proguard Removal of dead code to simplify opaque predicates. Base64 decoding followed by AES decryption.

23 Example of AES Decryption and Base64 Decoding

24 Questions?

Obfuscating Transformations. What is Obfuscator? Obfuscation Library. Obfuscation vs. Deobfuscation. Summary

Obfuscating Transformations. What is Obfuscator? Obfuscation Library. Obfuscation vs. Deobfuscation. Summary ? Obfuscating Outline? 1? 2 of Obfuscating 3 Motivation: Java Virtual Machine? difference between Java and others? Most programming languages: Java: Source Code Machine Code Predefined Architecture Java

More information

Automated static deobfuscation in the context of Reverse Engineering

Automated static deobfuscation in the context of Reverse Engineering Automated static deobfuscation in the context of Reverse Engineering Sebastian Porst (sebastian.porst@zynamics.com) Christian Ketterer (cketti@gmail.com) Sebastian zynamics GmbH Lead Developer BinNavi

More information

Formal verification of program obfuscations

Formal verification of program obfuscations Formal verification of program obfuscations Sandrine Blazy joint work with Roberto Giacobazzi and Alix Trieu IFIP WG 2.11, 2015-11-10 1 Background: verifying a compiler Compiler + proof that the compiler

More information

Lecture 07: Private-key Encryption. Private-key Encryption

Lecture 07: Private-key Encryption. Private-key Encryption Lecture 07: Three algorithms Key Generation: Generate the secret key sk Encryption: Given the secret key sk and a message m, it outputs the cipher-text c (Note that the encryption algorithm can be a randomized

More information

Industrial Approach: Obfuscating Transformations

Industrial Approach: Obfuscating Transformations Industrial Approach: Obfuscating Transformations Yury Lifshits Steklov Institute of Mathematics, St.Petersburg, Russia yura@logic.pdmi.ras.ru Tartu University 17/03/2006 Yury Lifshits (Steklov Inst. of

More information

8/3/17. Encryption and Decryption centralized Single point of contact First line of defense. Bishop

8/3/17. Encryption and Decryption centralized Single point of contact First line of defense. Bishop Bishop Encryption and Decryption centralized Single point of contact First line of defense If working with VPC Creation and management of security groups Provides additional networking and security options

More information

1. Type in your account and password. If you have Windows, Mac, iphone, or Android, you can download corresponding applications here

1. Type in your account and password. If you have Windows, Mac, iphone, or Android, you can download corresponding applications here SmartStor Cloud Web I. Login to SmartStor Cloud 1. Type in your account and password 2. Click If you have Windows, Mac, iphone, or Android, you can download corresponding applications here II. Document

More information

Configuring Password Encryption

Configuring Password Encryption This chapter describes how to configure password encryption on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About Password Encryption,

More information

Code Obfuscation 10**2+(2*a+3)%2. When 2018/11/29 Where JSecIn Who Gaetan Ferry Why For fun!

Code Obfuscation 10**2+(2*a+3)%2. When 2018/11/29 Where JSecIn Who Gaetan Ferry Why For fun! Code Obfuscation 10**2+(2*a+3)%2 When 2018/11/29 Where JSecIn Who Gaetan Ferry Why For fun! me@jsecin:/ $ whoami Gaetan Ferry @mabo^w Not on twitter Security expert @Synacktiv : Offensive security company

More information

Configuring Password Encryption

Configuring Password Encryption This chapter describes how to configure password encryption on Cisco NX-OS devices. This chapter includes the following sections: About AES Password Encryption and Master Encryption Keys, page 1 Licensing

More information

SQL Server DBA Online Training

SQL Server DBA Online Training SQL Server DBA Online Training Microsoft SQL Server is a relational database management system developed by Microsoft Inc.. As a database, it is a software product whose primary function is to store and

More information

LiveBox Manual IOS APPLICATION V (465)

LiveBox Manual IOS APPLICATION V (465) 2015 LiveBox Manual IOS APPLICATION V. 3.0.3 (465) http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantees about this documentation and its use and decline any expressed or

More information

BackupAssist v6 to v7 comparison

BackupAssist v6 to v7 comparison BackupAssist v6 to v7 comparison Contents 1. What s new in BackupAssist version 7... 2 2. Comparison Matrix... 3 3. New Operating System & Environment support... 4 4. New Centralized Management... 4 5.

More information

Digital Logic Lecture 4 Binary Codes

Digital Logic Lecture 4 Binary Codes Digital Logic Lecture 4 Binary Codes By Ghada Al-Mashaqbeh The Hashemite University Computer Engineering Department Outline Introduction. Character coding. Error detection codes. Gray code. Decimal coding.

More information

External Encodings Do not Prevent Transient Fault Analysis

External Encodings Do not Prevent Transient Fault Analysis External Encodings Do not Prevent Transient Fault Analysis Christophe Clavier Gemalto, Security Labs CHES 2007 Vienna - September 12, 2007 Christophe Clavier CHES 2007 Vienna September 12, 2007 1 / 20

More information

Analysing ios apps: road from AppStore to security analysis report

Analysing ios apps: road from AppStore to security analysis report Analysing ios apps: road from AppStore to security analysis report Egor Fominykh, Lenar Safin, Yaroslav Alexandrov SmartDec REcon, Brussels, 2017 What we do at SmartDec Decompilation, deobfuscation x86/x64

More information

Hiding Information in Software

Hiding Information in Software Hiding Information in Software With Respect to a White-box Security Model Master of Science Thesis in Computer Science ERICA LÖFSTRÖM ANDRÉ MALM Chalmers University of Technology University of Gothenburg

More information

The attacker appears to use an exploit that is derived from the Metasploit FreeBSD Telnet Service Encryption Key ID Buffer Overflow?

The attacker appears to use an exploit that is derived from the Metasploit FreeBSD Telnet Service Encryption Key ID Buffer Overflow? Atlassian Home Documentation Support Blog Forums Explore Dashboard Repositories Carl Pulley owner/repo carlpulley / Challenge11 http://honeynet.org/node/829 Submission for Honeynet Challenge 11 - Dive

More information

On-Line Self-Test of AES Hardware Implementations

On-Line Self-Test of AES Hardware Implementations On-Line Self-Test of AES Hardware Implementations G. Di Natale, M. L. Flottes, B. Rouzeyre Laboratoire d Informatique, de Robotique et de Microélectronique de Montpellier Université Montpellier II / CNRS

More information

Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture *

Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture * Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture * Seongje Cho 1, Hyeyoung Chang 1, and Yookun Cho 2 1 Dept. of Computer Science & Engineering, Dankook

More information

Software Protection via Obfuscation

Software Protection via Obfuscation Software Protection via Obfuscation Ciprian Lucaci InfoSec Meetup #1 1 About me Software Protection via Obfuscation - Ciprian LUCACI 2 About me 2008-2012 # Bachelor Computer Science @ Politehnica Univerity

More information

Network Security Technology Project

Network Security Technology Project Network Security Technology Project Shanghai Jiao Tong University Presented by Wei Zhang zhang-wei@sjtu.edu.cn!1 Part I Implement the textbook RSA algorithm. The textbook RSA is essentially RSA without

More information

Assignment 6. This lab should be performed under the Oracle Linux VM provided in the course.

Assignment 6. This lab should be performed under the Oracle Linux VM provided in the course. Assignment 6 This assignment includes hands-on exercises in the Oracle VM. It has two Parts. Part 1 is SQL Injection Lab and Part 2 is Encryption Lab. Deliverables You will be submitting evidence that

More information

Oracle B2B 11g Technical Note. Technical Note: 11g_006 Security. Table of Contents

Oracle B2B 11g Technical Note. Technical Note: 11g_006 Security. Table of Contents Oracle B2B 11g Technical Note Technical Note: 11g_006 Security This technical note lists the security options available in Oracle B2B Table of Contents Users... 2 Roles... 2 Step 1: Create the user in

More information

Block Cipher Modes of Operation

Block Cipher Modes of Operation Block Cipher Modes of Operation Luke Anderson luke@lukeanderson.com.au 23 rd March 2018 University Of Sydney Overview 1. Crypto-Bulletin 2. Modes Of Operation 2.1 Evaluating Modes 2.2 Electronic Code Book

More information

Server Manager User and Permissions Setup

Server Manager User and Permissions Setup Login and Security Once you successfully create your company databases, the next step is to define the groups and users that can access the TRAVERSE data and the functionality they will have within the

More information

Server-based code obfuscation scheme for APK tamper detection

Server-based code obfuscation scheme for APK tamper detection SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9:457 467 Published online 10 March 2014 in Wiley Online Library (wileyonlinelibrary.com)..936 SPECIAL ISSUE PAPER Server-based code obfuscation

More information

An Introduction to JavaScript & Bootstrap Basic concept used in responsive website development Form Validation Creating templates

An Introduction to JavaScript & Bootstrap Basic concept used in responsive website development Form Validation Creating templates PHP Course Contents An Introduction to HTML & CSS Basic Html concept used in website development Creating templates An Introduction to JavaScript & Bootstrap Basic concept used in responsive website development

More information

obfuscator Documentation

obfuscator Documentation obfuscator Documentation Release 1.1.5 Timothy McFadden July 17, 2015 Contents 1 Introduction 3 2 Install 5 3 Usage 7 4 Auto Generated API Documentation 9 4.1 obfuscator.file..............................................

More information

Performance improvements to peer-to-peer file transfers using network coding

Performance improvements to peer-to-peer file transfers using network coding Performance improvements to peer-to-peer file transfers using network coding Aaron Kelley April 29, 2009 Mentor: Dr. David Sturgill Outline Introduction Network Coding Background Contributions Precomputation

More information

Free Download Dev. Virto Workflow Activities Kit for SP2010 computer software free download ]

Free Download Dev. Virto Workflow Activities Kit for SP2010 computer software free download ] Free Download Dev. Virto Workflow Activities Kit for SP2010 computer software free download ] Description: Although customized working processes are included in Microsoft Office SharePoint 2007, 2010 and

More information

Encrypting Critical Data In Databases. An Overview of the Database Integration Process

Encrypting Critical Data In Databases. An Overview of the Database Integration Process Encrypting Critical Data In Databases An Overview of the Database Integration Process Overview As the incidence and severity of security breaches continues to grow, it is increasingly incumbent upon organizations

More information

How To Send Invites. Send invites from the Cinando website

How To Send Invites. Send invites from the Cinando website How To Send Invites General instructions Send invites from the Cinando website Step 1: Access your Send Invites page Step 2: Add Screeners to your invite Step 3: Choose settings Step 4: Send Invite Step

More information

DELL EMC DATA DOMAIN ENCRYPTION

DELL EMC DATA DOMAIN ENCRYPTION WHITEPAPER DELL EMC DATA DOMAIN ENCRYPTION A Detailed Review ABSTRACT The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers

More information

Cpr E 281 FINAL PROJECT ELECTRICAL AND COMPUTER ENGINEERING IOWA STATE UNIVERSITY. FINAL Project. Objectives. Project Selection

Cpr E 281 FINAL PROJECT ELECTRICAL AND COMPUTER ENGINEERING IOWA STATE UNIVERSITY. FINAL Project. Objectives. Project Selection Objectives The main objective of the final project is to teach you how to put together all of the class material that you have learned so far in order to program the Altera DE2 board to carry out an independent

More information

ODDS (Olympus Dictation Delivery Service) Setup

ODDS (Olympus Dictation Delivery Service) Setup ODDS (Olympus Dictation Delivery Service) Setup This quick and easy How-To Guide will help you set up your new ODDS account and enable you to start using the Olympus Dictation App on your Smartphone. 1.

More information

MobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents

MobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents MobilePASS SOFTWARE AUTHENTICATION SOLUTIONS Security Features Contents Introduction... 2 Technical Features... 2 Security Features... 3 PIN Protection... 3 Seed Protection... 3 Security Mechanisms per

More information

like a boss Automatically Extracting Obfuscated Strings from Malware

like a boss Automatically Extracting Obfuscated Strings from Malware like a boss Automatically Extracting Obfuscated Strings from Malware d41d8cd98f00b204e9800998ecf8427e a5ca7e7281d8b8a570a529895106b1fa PE file format Imports Exports Section metadata strings.exe PE

More information

Lamassu: Storage-Efficient Host-Side Encryption

Lamassu: Storage-Efficient Host-Side Encryption Lamassu: Storage-Efficient Host-Side Encryption Peter Shah, Won So Advanced Technology Group 9 July, 2015 1 2015 NetApp, Inc. All rights reserved. Agenda 1) Overview 2) Security 3) Solution Architecture

More information

KeePass Keep your passwords SAFE. John Steele. August 2015 Copyright John Steele

KeePass Keep your passwords SAFE. John Steele. August 2015 Copyright John Steele KeePass Keep your passwords SAFE John Steele August 2015 Copyright John Steele 2015 1 What we will cover What is the problem with passwords How complex do they need to be How can they be stored safely

More information

Technology Overview. Gallery SIENNA London, England T

Technology Overview. Gallery SIENNA London, England T Technology Overview Gallery SIENNA London, England T +44 208 340 5677 sales@sienna.tv www.sienna.tv http://ndi.newtek.com SIENNA Cloud for NDI An IP Video Protocol which works today NDI Protocol The NDI

More information

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication Cryptography Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication Introduction Cryptography in the Real World Cryptography is the process of writing or reading secret

More information

WinAutomation Version 8 Release Notes

WinAutomation Version 8 Release Notes WinAutomation Version 8 Release Notes Last Updated: 2018-06-05 1 Table of Contents Introduction... 3 Naming Conventions... 4 WinAutomation Console... 5 Robust Robot and control... 5 Enhanced central options

More information

A Reliable Architecture for Substitution Boxes in Integrated Cryptographic Devices

A Reliable Architecture for Substitution Boxes in Integrated Cryptographic Devices Author manuscript, published in "DCIS'08: Conference on Design of Circuits and Integrated Systems, (2008)" A Reliable Architecture for Substitution Boxes in Integrated Cryptographic Devices G. Di Natale,

More information

Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning

Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning Fakultät für Informatik Technische Universität München 26th USENIX Security Symposium Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning Sebastian Banescu

More information

70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced. Chapter 7: Advanced File System Management

70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced. Chapter 7: Advanced File System Management 70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management Objectives Understand and configure file and folder attributes Understand

More information

LO! LLVM Obfuscator FRANCISCO BLAS IZQUIERDO RIERA. An LLVM obfuscator for binary patch generation. Master of Science Thesis

LO! LLVM Obfuscator FRANCISCO BLAS IZQUIERDO RIERA. An LLVM obfuscator for binary patch generation. Master of Science Thesis LO! LLVM Obfuscator An LLVM obfuscator for binary patch generation Master of Science Thesis FRANCISCO BLAS IZQUIERDO RIERA Chalmers University of Technology University of Gothenburg Department of Computer

More information

Block Cipher Modes of Operation

Block Cipher Modes of Operation Block Cipher Modes of Operation Luke Anderson luke@lukeanderson.com.au 24th March 2016 University Of Sydney Overview 1. Crypto-Bulletin 2. Modes Of Operation 2.1 Evaluating Modes 2.2 Electronic Code Book

More information

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages. Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets

More information

Secret-in.me. A pentester design of password secret manager

Secret-in.me. A pentester design of password secret manager Secret-in.me A pentester design of password secret manager Who am I? Security engineer Working at SCRT France! Password manager Password A string Secret Information shared by very few people You have to

More information

1. INTRODUCTION to Object Storage

1. INTRODUCTION to Object Storage 1. INTRODUCTION to Object Storage Welcome to AURO Enterprise Cloud! This document will be help you get started using our Object Storage service. Object Storage is a storage system where objects are stored

More information

EC500. Design of Secure and Reliable Hardware. Lecture 1 & 2

EC500. Design of Secure and Reliable Hardware. Lecture 1 & 2 EC500 Design of Secure and Reliable Hardware Lecture 1 & 2 Mark Karpovsky January 17 th, 2013 1 Security Errors injected by the attacker (active attacks) Reliability Errors injected by random sources e.g.

More information

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT

More information

User Manual. UniMag II Magnetic Stripe Reader For Mobile Devices

User Manual. UniMag II Magnetic Stripe Reader For Mobile Devices User Manual UniMag II Magnetic Stripe Reader For Mobile Devices 80110509-001-53 10/21/2011 Copyright 2010-2011, International Technologies & Systems Corporation. All rights reserved. Revision History Revision

More information

BreakingVault SAP DataVault Security Storage vulnerabilities

BreakingVault SAP DataVault Security Storage vulnerabilities BreakingVault SAP DataVault Security Storage vulnerabilities Technical details Author: Fernando Russ (fruss@onapsis.com) Sr. Researcher Abstract: This document describes a series of vulnerabilities found

More information

Block cipher modes. Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 75

Block cipher modes. Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 75 Block cipher modes Lecturers: Mark D. Ryan and David Galindo. Cryptography 2017. Slide: 75 Lecturers: Mark D. Ryan and David Galindo. Cryptography 2017. Slide: 76 Block cipher modes Block ciphers (like

More information

msis Security Policy and Protocol

msis Security Policy and Protocol msis Security Policy and Protocol Introduction This Policy details the secure use of msis as a tool for the capture and reporting of internet intelligence and investigations (i3). msis is a powerful i3

More information

ENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel

ENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel (a) Introduction - recall symmetric key cipher: III. BLOCK CIPHERS k Symmetric Key Cryptography k x e k y yʹ d k xʹ insecure channel Symmetric Key Ciphers same key used for encryption and decryption two

More information

Lecture 2B. RTL Design Methodology. Transition from Pseudocode & Interface to a Corresponding Block Diagram

Lecture 2B. RTL Design Methodology. Transition from Pseudocode & Interface to a Corresponding Block Diagram Lecture 2B RTL Design Methodology Transition from Pseudocode & Interface to a Corresponding Block Diagram Structure of a Typical Digital Data Inputs Datapath (Execution Unit) Data Outputs System Control

More information

Attacks on Advanced Encryption Standard: Results and Perspectives

Attacks on Advanced Encryption Standard: Results and Perspectives Attacks on Advanced Encryption Standard: Results and Perspectives Dmitry Microsoft Research 29 February 2012 Design Cryptanalysis history Advanced Encryption Standard Design Cryptanalysis history AES 2

More information

Microsoft - Querying Microsoft SQL Server 2014 (M20461) (M20461)

Microsoft - Querying Microsoft SQL Server 2014 (M20461) (M20461) Microsoft - Querying Microsoft SQL Server 2014 (M20461) (M20461) Code: 6552 Lengt h: URL: 5 days View Online In this course, you will learn the technical skills required to write basic Transact-SQL (T-SQL)

More information

Sql Server Syllabus. Overview

Sql Server Syllabus. Overview Sql Server Syllabus Overview This SQL Server training teaches developers all the Transact-SQL skills they need to create database objects like Tables, Views, Stored procedures & Functions and triggers

More information

The Android security jungle: pitfalls, threats and survival tips. Scott

The Android security jungle: pitfalls, threats and survival tips. Scott The Android security jungle: pitfalls, threats and survival tips Scott Alexander-Bown @scottyab The Jungle Ecosystem Google s protection Threats Risks Survival Network Data protection (encryption) App/device

More information

ISSISP 2014 Code Obfuscation Verona, Italy

ISSISP 2014 Code Obfuscation Verona, Italy ISSISP 2014 Code Obfuscation Verona, Italy Christian Collberg University of Arizona www.cs.arizona.edu/ collberg c July 27, 2014 Christian Collberg Overview 3 / 109 Code obfuscation what is it? Informally,

More information

Progressive Authentication in ios

Progressive Authentication in ios Progressive Authentication in ios Genghis Chau, Denis Plotnikov, Edwin Zhang December 12 th, 2014 1 Overview In today s increasingly mobile-centric world, more people are beginning to use their smartphones

More information

Homework 2. Out: 09/23/16 Due: 09/30/16 11:59pm UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING

Homework 2. Out: 09/23/16 Due: 09/30/16 11:59pm UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING ENEE 457 Computer Systems Security Instructor: Charalampos Papamanthou Homework 2 Out: 09/23/16 Due: 09/30/16 11:59pm Instructions

More information

6 Cryptographic Operations API

6 Cryptographic Operations API 118/202 TEE Internal API Specification Public Release v1.0 6 Cryptographic Operations API This part of the Cryptographic API defines how to actually perform cryptographic operations: Cryptographic operations

More information

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322

More information

Course 834 EC-Council Certified Secure Programmer Java (ECSP)

Course 834 EC-Council Certified Secure Programmer Java (ECSP) Course 834 EC-Council Certified Secure Programmer Java (ECSP) Duration: 3 days You Will Learn How To Apply Java security principles and secure coding practices Java Security Platform, Sandbox, JVM, Class

More information

Holistic Database Security

Holistic Database Security Holistic Database Security 1 Important Terms Exploit: Take advantage of a flaw or feature Attack Surface: Any node on the network that can be attacked. That can be the UI, People, anything that touches

More information

Design and development of a distributed, secure and resilient vault management system

Design and development of a distributed, secure and resilient vault management system Design and development of a distributed, secure and resilient vault management system Mathonet G. University of Liège, Belgium June 2017 Mathonet G. (University of Liège, Belgium) Design and development

More information

A nice outline of the RSA algorithm and implementation can be found at:

A nice outline of the RSA algorithm and implementation can be found at: Cryptography Lab: RSA Encryption and Decryption Lab Objectives: After this lab, the students should be able to Explain the simple concepts of encryption and decryption to protect information in transmission.

More information

Computer and Data Security. Lecture 3 Block cipher and DES

Computer and Data Security. Lecture 3 Block cipher and DES Computer and Data Security Lecture 3 Block cipher and DES Stream Ciphers l Encrypts a digital data stream one bit or one byte at a time l One time pad is example; but practical limitations l Typical approach

More information

Dynamically-typed Languages. David Miller

Dynamically-typed Languages. David Miller Dynamically-typed Languages David Miller Dynamically-typed Language Everything is a value No type declarations Examples of dynamically-typed languages APL, Io, JavaScript, Lisp, Lua, Objective-C, Perl,

More information

Tale of a mobile application ruining the security of global solution because of a broken API design. SIGS Geneva 21/09/2016 Jérémy MATOS

Tale of a mobile application ruining the security of global solution because of a broken API design. SIGS Geneva 21/09/2016 Jérémy MATOS Tale of a mobile application ruining the security of global solution because of a broken API design SIGS Geneva 21/09/2016 Jérémy MATOS whois securingapps Developer background Spent last 10 years working

More information

SP xdrive Explorer. User Manual

SP xdrive Explorer. User Manual SP xdrive Explorer User Manual Table of Contents 1. Intellectual & Copyright Disclaimer....3 2. Introduction..4 3. System Requirements...4 4. Illustration of Application functions.4 4.1 Installation.4

More information

PASS SQL DBA Virtual Chapter

PASS SQL DBA Virtual Chapter PASS SQL DBA Virtual Chapter Wed, 7:00 PM - 8:00 PM GMT Lecture By Ronen Ariely Implementing new Security Features in SQL Server 2016, Part 2 SQL Server 2016 provides several new data security features

More information

GT.M Database Encryption

GT.M Database Encryption GT.M Database Encryption Protecting Data At Rest (DAR) [ 1 ] April 30, 2009 What it is Protects data at rest (DAR) Data records in database & journal files are encrypted [ 2 ] What it is not Data not at

More information

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry,, David Wagner Presented by Paul Ruggieri 1 Introduction What is TinySec? Link-layer security architecture

More information

Overview of Activities

Overview of Activities d.schmidt@vanderbilt.edu www.dre.vanderbilt.edu/~schmidt Institute for Software Integrated Systems Vanderbilt University Nashville, Tennessee, USA CS 282 Principles of Operating Systems II Systems Programming

More information

Solution Challenge. Old Memories

Solution Challenge. Old Memories Solution Challenge Old Memories Steps 9 Steps 5 «ordinosaures» 4 «technical» steps Ordinosaure steps separated by technical tasks Step 1 - Frenchy Thomson MO5 (RAM cartridge helps) Step 2 Before the web

More information

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Transpositional Ciphers-A Review Decryption 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Encryption 1 2 3 4 5 6 7 8 A G O O D F R I E N D I S A T R E

More information

Creating Trust in a Highly Mobile World

Creating Trust in a Highly Mobile World Creating Trust in a Highly Mobile World Technical White Paper Oct, 2014 MobileCrypt with Hardware Strength Security MobileCrypt s solution leverages an Android based mobile application and a Hardware Security

More information

Duo Enrollment for DA Employees

Duo Enrollment for DA Employees Duo Enrollment for DA Employees Duo s Multi-Factor Authentication will be used to authenticate DA employees when using DA Portal, DA s Outlook Web Access (OWA), and DA s O365. It is RECOMMENDED to have

More information

Tackling runtime-based obfuscation in Android with TIRO

Tackling runtime-based obfuscation in Android with TIRO Tackling runtime-based obfuscation in Android with Michelle Wong and David Lie University of Toronto Usenix Security 2018 Android malware and analysis Mobile devices are a valuable target for malware developers

More information

Content of this part

Content of this part UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 5 More About Block Ciphers Israel Koren ECE597/697 Koren Part.5.1 Content of this

More information

Authentication CHAPTER 17

Authentication CHAPTER 17 Authentication CHAPTER 17 Authentication Authentication is the process by which you decide that someone is who they say they are and therefore permitted to access the requested resources. getting entrance

More information

Demystifying ISIM s Encryption

Demystifying ISIM s Encryption Demystifying ISIM s Encryption Version 1.1, 2017-12-21 Abstract Almost everything you ever wanted to know about the IBM Security Identity Manager encryption. We are sure many of the information below can

More information

True Potential Client Site

True Potential Client Site True Potential Client Site New Login Process Including the iphone & ipad app process 1 P a g e Account Activation & New Login Process We re changing the way you log into your account on the True Potential

More information

Crypto: Symmetric-Key Cryptography

Crypto: Symmetric-Key Cryptography Computer Security Course. Song Crypto: Symmetric-Key Cryptography Slides credit: Dan Boneh, David Wagner, Doug Tygar Overview Cryptography: secure communication over insecure communication channels Three

More information

Advanced WiFi Attacks Using Commodity Hardware

Advanced WiFi Attacks Using Commodity Hardware Advanced WiFi Attacks Using Commodity Hardware Mathy Vanhoef and Frank Piessens (KU Leuven) ACSAC 2014 Background WiFi assumes each station acts fairly With special hardware this isn t the case Continuous

More information

Data Modeling and Database Design

Data Modeling and Database Design INF1343, Winter 2012 Data Modeling and Database Design Yuri Takhteyev Faculty of Information University of Toronto This presentation is licensed under Creative Commons Attribution License, v. 3.0. To view

More information

Lab 1: Getting Started With Android Programming

Lab 1: Getting Started With Android Programming Islamic University of Gaza Faculty of Engineering Computer Engineering Dept. Eng. Jehad Aldahdooh Mobile Computing Android Lab Lab 1: Getting Started With Android Programming To create a new Android Project

More information

Breaking State-of-the-Art Binary Code Obfuscation

Breaking State-of-the-Art Binary Code Obfuscation Breaking State-of-the-Art Binary Code Obfuscation A Program Synthesis-based Approach REcon Brussels February 2, 2018 Tim Blazytko, @mr_phrazer http://synthesis.to Moritz Contag, @dwuid https://dwuid.com

More information

Password Based Cryptography

Password Based Cryptography Written By: Adam Berent Document Revision 1.1 Password Based Cryptography Outline 1.0 Preface 1. Preface 2. Summary 3. Message Format 3.1. XML Schema 4. Padding 5. Salt Generation 6. Deriving the Iteration

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Secret Key Cryptography Block cipher DES 3DES

More information

Cisco Desktop Collaboration Experience DX650 Security Overview

Cisco Desktop Collaboration Experience DX650 Security Overview White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)

More information

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM)

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...

More information

Xamarin for C# Developers

Xamarin for C# Developers Telephone: 0208 942 5724 Email: info@aspecttraining.co.uk YOUR COURSE, YOUR WAY - MORE EFFECTIVE IT TRAINING Xamarin for C# Developers Duration: 5 days Overview: C# is one of the most popular development

More information

Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis

Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel,

More information