Mobile Security Testing Approaches and Challenges: February 2015
Mobile Security Testing Approaches and Challenges: February 2015
Mobile Security Testing Approaches and Challenges: February 2015
net/publication/277132880
CITATIONS READS
10 1,797
2 authors, including:
Yazan Alshboul
Yarmouk University
10 PUBLICATIONS 24 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Yazan Alshboul on 09 January 2016.
Abstract—Mobile devices such as smartphones and tablets threat model for mobile security. We present four testing
are widely used for personal and business purposes. A mobile approaches for mobile security: mobile forensic, penetration
device may carry sensitive data and becomes an easy target for test, static analysis, and dynamic analysis. We further
cyber criminals. Mobile security is thus important. Mobile demonstrate a mobile security testing network to evaluate the
security testing targets to detect vulnerabilities and malicious effectiveness of the four testing approaches. Our testing results
apps on a mobile device. In this paper, we present four testing indicate that mobile security testing tools are still in their early
approaches for mobile security: mobile forensic, penetration test, development stages and many efforts are desired to improve
static analysis, and dynamic analysis. A mobile security testing these tools.
network is further demonstrated in the paper to evaluate the
effectiveness of the four testing approaches. Our testing results The paper is organized as follows: Section II discusses the
indicate that mobile security testing tools are still in their early related work. Section III summarizes mobile threats and
development stages and efforts are desired to improve these tools. attacks. Section IV presents four mobile security testing
We conclude the paper with a summary of mobile security testing approaches. Section V demonstrates a mobile security testing
challenges and future directions. network to evaluate the effectiveness of the testing approaches,
followed by a summary of mobile security challenges and
Keywords—Mobile security, testing approaches, challenges future directions in Section VI. Section VII summarizes the
paper and future works.
I. INTRODUCTION
Mobile devices, such as smartphones and tablets, have II. RELATED WORK
been widely used for personal and business purposes.
Malware is one of the greatest threats to mobile security
According to a recent report from KPBC, the number of
[2]. Mobile malware falls in three main categories: virus,
smartphone users worldwide has risen above 1.6 billion in
2013 [1]. A mobile device is a data centric device and it may Trojan, and spyware [3]. Trojan and spyware are the dominant
carry sensitive data, such as user name, password, contact list, malware on mobile devices. Mobile malware malicious
credit card account number, etc. [2]. Thus, mobile devices are infections arise through various techniques such as installing
easy targets for cyber criminals. repackaged legitimate apps with malware, updating current
apps that piggy back malicious variants, or even driven by a
Many threats and attacks have been reported on mobile download from an app store. The infections themselves will
devices. These threats and attacks include, but are not limited perform at least one or multiple of the following techniques,
to, virus, sniffing, spamming, spoofing, phishing, etc. [2]. The i.e., privilege escalation, remote control, financial charge, and
first mobile phone virus emerged as early as in 2004. Among information collection, etc. The previous stated techniques
all the threats and attacks, malware is one of the greatest threats
provide a malicious attacker with a variety of options to utilize
to mobile security [3]. Many efforts have been conducted to
a compromised mobile device. TrendLabs estimated that there
prevent malware on mobile devices. Security tools are
developed to prevent malicious apps. However, the testing were 718,000 malicious and high risk Android apps in the
results from the existing mobile security tools are not second quarter of 2013 [6].
encouraging [4]. Unlike a desktop computer and a laptop Mobile security is essential for mobile subscribers. In [4],
computer, a mobile device has many uniqueness features. A the authors examined four representative mobile anti-virus
mobile device is a multiple-entrance open system. It is software: AVG Antivirus Free v2.9, Lookout Security &
platform-oriented, uses central data management, and is Antivirus v6.9, Norton Mobile Security Lite v2.5.0.379, and
vulnerable to theft and lost. Due to this uniqueness, challenges TrendMicro Mobile Security Personal Edition v2.0.0.1294.
are also encountered when developing security solutions for
These security software products use different approaches in
mobile devices. These challenges include, but are not limited
to, inefficient security solutions, limitations of signature-based their design and implementations. However, the testing results
mobile malware detection, lax control of third party app stores, are not encouraging. Out of all 1260 malware samples from 49
and uneducated or careless users, etc. [5]. malware families, Lookout detected 1003 malware samples in
39 families; TrendMicro detected 966 in 42 families; AVG
Mobile security testing targets to detect vulnerabilities and detected 689 samples in 32 families; and Norton detected the
malicious apps on a mobile device. In this paper, we focus on least samples 254 in 36 families [4]. It is apparently that more
mobile security testing approaches and challenges. We efforts need to be conducted on mobile security.
summarize threats and attacks on mobile devices and present a
Mobile security solutions can be divided into two malicious sites. This technique is great for the apps that are
categories: client-side solutions and server-side solutions. downloaded through the Google Play Store, but is
Signature-based malware detection is one of the current main disadvantageous for the users who use third party app stores.
malware detection techniques used on client-side. By
A cloud-based mobile malware detection framework is
analyzing known malware results, this approach prevents
proposed in [10]. The benefit of having a cloud-based
installation of known malicious apps on a mobile device. The
detection approach will place all of the work outside of the
issue with signature-based detection is that apps could change
mobile device. It will prevent mobile device from scanning the
through updated code or modified just enough to throw off the
apps on the client side and instead push the scanning onto
signature for the anti-malware application to detect. This
more powerful and efficient systems. The framework utilizes
approach catches known malware, but fails to stop new or
both static analysis and dynamic analysis to detect malware.
unknown variants in the wild.
Samsung released a security system known as Samsung
KNOX for Samsung Android mobile devices [7]. KNOX III. MOBILE THREATS AND ATTACKS
addresses platform security with a comprehensive three- A mobile device usually includes the following elements:
pronged strategy to secure the system: Customizable Secure x It comes with a pre-installed modern mobile
Boot, ARM TrustZone-based Integrity Measurement operating system such as iOS, Android, or Windows
Architecture, and a kernel with built-in security enhancements Mobile.
for Android. In addition, KNOX also includes an application x It supports a carrier’s networks (2G/3G/4G), Wi-Fi
known as Samsung KNOX container. These security networks and Bluetooth networks.
enhancements help to protect data on a mobile device. x It may be also a NFC device and can talk to another
However, KNOX does not provide malware detection. The NFC device.
approach is also device specific and does not help to protect x It is able to access the Internet. Internet accessibility
mobile devices from other vendors. is provided through either a carrier’s networks or a
In [8], the authors propose TaintDroid to track the flow of local Wi-Fi network.
sensitive data on a mobile device. TaintDroid provides real x It is capable of running third party applications
time analysis by introducing tracking information in downloaded from mobile app stores through the
Android’s virtualized execution environment. Using Internet.
TaintDroid, it is able to identify malicious apps which misuse x It supports MMS messages and has embedded
sensitive data on a mobile device. D2Taint also uses sensors inside.
information flow tracking to identify apps which may cause
A. Threats and Attacks
data leakage on a mobile device [9]. Both TaintDroid and
D2Taint are client-side solutions. They require customized Mobile devices are vulnerable to various threats and
images to be loaded on a mobile device. attacks. These threats and attacks are summarized in Table 1.
Mobile threats and attacks are usually carried out by malware
Google has introduced a method of detecting malicious that disguises itself as normal mobile apps such as games, a
apps before they hit the Google Play Store. Bouncer is a security patch, or other desirable applications and is then
server-side solution which is able to scan mobile apps and downloaded to a mobile device.
detect new mobile malware before they hit the app market [9].
Bouncer has the approach to take newly developed B. Threat Model
applications and determine if they attempt to send SMS out to A mobile device threat model can be divided into three