Chapter 3
Chapter 3
Pull attacks
Crash attack
3.Cryptographic Security for
Mobile Devices:
Cryptographically Generated Address (CGA)
CGA is IPv6: generated by hashing owner’s public-key
address
The address the owner uses is the corresponding private
key to assert address ownership and
To sign messages sent from the address without a Public-
Key Infrastructure(PKI)
CGA-based Authentication can be used to protect IP-Layer
signaling protocols
Also used in key –exchange and create an IPSec security
association for encryption and data authentication
Example: Palm OS5
Cryptographic Provider Manage(CPM) in Palm OS5 is
a system-wide suite of cryptographic services for
securing data and resources on a Palm- powered
device
4. LDAP security for hand held
mobile computing devices
LDAP is a software protocol for enabling anyone to
locate individuals, organizations and other resources
like files and devices on the network
LDAP is light weight version of Directory Access
Protocol(DAP) since it does not include security
features in its initial version.
It originated at the University of Michigan
Endorsed by atleast 40 companies
Centralized directories such as LDAP make revoking
permissions quick and easy.
LDAP directory Structure: simple
tree structure
Root directory
Countries
Organizations
Organizational units
individuals
5. RAS security for mobile devices
RAS is important for protecting business sensitive data that
ay reside on the employee’s mobile devices.
Vulnerable to unauthorized access : resulting in providing a
route into the systems with which they connect
By impersonating or masquerading to these systems, a
cracker is able to steal data or compromise corporate systems
in other ways.
Another threat is by port scanning: DNS server- locate IP
address- scan the port on this IP address that are
unprotected.
Precautions: a personal firewall
RAS system security for Mobile
device clients
The security of the RAS server
The security of the RAS client
The secure data transmission
6. Media Player Control Security
Potential security attacks on mobile devices through
the “music gateways”
Windows media player: MS warned about security
loop holes
Corrupt files posing as normal music and video files
May open a website from where the Javascript can be
operated.
Allow attacker to download and use the code on user’s
machine
Create buffer overrun errors.
7. Networking API security for
mobile computing applications
Development of various API’s to enable software and
hardware developers to write single applications to
target multiple security platforms
Attacks on Mobile/ cell phones
Mobile Phone Theft
Mobile Viruses
Mishing
Vishing
Smishing
Hacking bluetooth
Mobile phone theft
With mobiles or cell phones becoming fancier, more popular,
and more expensive, they are increasingly liable to theft.
The following factors contribute for outbreaks on mobile
devices:
1. Enough target terminals: first mobile virus in 2004 :-
Mosquito – this virus sent SMS text messages to the
organization(Ojam)
2. Enough functionality: office functionality, critical data
and applications protected insufficiently or not at all.
expanded functionality increases the probability of
malware
3. Enough connectivity: SMS, MMS, Synchronization,
bluetooth, infrared(IR) and WLAN connections
How to Protect a Mobile Phone
from Being Stolen
Keep details. Make a record of all your phone
information and keep this in a safe place. Include the
following elements in the information: Your phone
number
The make and model
Color and appearance details
The pin or security lock code
The IMEI number (on GSM phones)
International Mobile Equipment Identity
Add a security mark. Use an ultra violet pen to print
your post code and house number onto both your
mobile handset and battery. This makes it easily
identifiable as your property if lost or stolen. It would
also be good if you write your alternate contact
number or email id on your phone.
This would help the finder of your handset to contact
you if he or she intents to return it. The ultra-violet
pen marking will wear off every couple of months, so
reapply it when you feel necessary.
Use the security lock code, or PIN feature, to lock
your phone. This will make it less valuable to a thief
and deny them access to personal numbers stored on
your SIM card.
Register your phone with your network operator. If
your phone is stolen, report the loss to them immediately.
Using your IMEI number, they may be able to block your
hand set and account details.
Some wireless carriers are willing to do this, and some
aren't. If done, this will prevent anyone from using the
phone across any network, even if the SIM card is changed.
Keep in mind that once the phone is disabled, it may not be
able to be used again, even if you get it back.
Keep records of this call--the date, time, name of the
person you spoke to, what they said, and their extension.
Ask for confirmation in writing that your phone has been
disabled.[2] This is important in case the thief makes
fraudulent charges on your account.
Have your phone number disabled. In addition to
reporting your phone lost or stolen, you should also disable
your phone number (not account) so that no further
charges can be applied. This is in case the thief figures out
how to access your account through another hand set, or in
case the carrier is unwilling to block the handset.
Remember that, as mentioned earlier, many thieves stand
to benefit from using your service rather than selling your
phone, especially between the moment they steal it and the
moment you realize your phone is missing.[3] As in the
previous step, keep detailed records of when you requested
your account to be disabled.
Request an immediate, formal investigation from
your carrier. Sometimes this can prevent (or at least delay)
the carrier from launching a collections effort and tainting
your credit, if things get ugly. [4]
File a police report immediately. Time is money,
literally. A thief can add over US$10,000 to your cell phone
bill in just hours by making international calls, and you
might end up being asked to foot the bill. Some phone
companies may require proof that the phone was actually
stolen, versus it having been lost. A police report serves as
evidence, which will make your wireless provider more
cooperative, especially if insurance is involved.
Install anti phone theft software. There are
suppliers that provide modern anti theft software for
your phone. The software enables you to remotely
contact your mobile and stay in control. For example,
one of the recently published solutions for Symbian
and Android is Theft Aware; others provide Windows
Mobile or Blackberry support
Never let the phone get out of your sight. Unless
you are sleeping of course, always have your eyes on
the phone.
2. Mobile Viruses
40 virus families
300+ mobile viruses identified
First mobile virus : june 2004
Spread through dominant communication protocols
Bluetooth, MMS
How to protect from mobile
malware attacks
Download or accept progrms and content only from a
trusted source
Turn off bluetooth or set it to non-discoverable when
not in use
Receive IR beams only from trusted source
Install antivirus software
Mobile Phone Virus Hoax
Forwarded messages claim that a destructive virus will
infect your mobile (cell) phone if you receive a call that
displays "ACE" or "XALAN" on the screen.
Example
All mobile users pay attention!!!!!!!!!