Ty
pe
Attack Permission
Smart
phone
Tablet
PC
(incl.
tools)
Media +
metadata
(smartphone)
/
+ (tablet)
+ +
shared
folders
only
Docs + +
DB/other
+
rarely
+
often
MITM (interception / spoofing)
Messages
SMS + + - - MMS + + - -
Email + + - -
PIN2PIN + + - -
BBM + + - -
GUI intercept + + - +
Fake window/
clickjacking
+ + - +
XII. C ONCLUSION
Mobile vendor vision about user privacy has no deal with
real privacy completely favors mobile application to upload
user personal data without his knowledge. Once user
downloads an application, he decides if grant access relies on
poor explains what permissions will be utilized by application,
These permissions have never been being similar with
application’s actions; what’s more it is out of touch with data
that will be accessed. Issue when only few people look them
before installing it faces with security but it should not be taken
because this application never says what is actually will use
for. It difficult to understand why GPS tracker wants access to
the email function and impossible to be sure whether no one
email will be touched that does not belong to the application
operations results. Moreover, there are enough sensitive objects
that a malware could access without any permissions, just be
signed by vendors keys. Sometimes metadata embedded in
files easy reveal GEO data or date by involving shared file
access only. When applications are downloading, no one has a
time to discuss with developer why they want to access one or
another permission. Forensics techniques is no more provide
with information through the logs, because OS vendors let
developers store in application logs only debug information.
Only ten percent API calls have strong privileges on
BlackBerry, especially if it is BES BlackBerry device. The rest
provides cross-application interception that usually need to
manage own modules but as it mentioned above no one of OS
divide calling functions to the friend of foe. It does not need
modify system files or else to block internet connection;
sometimes it is just effective to build a silent extension for
native browser that filters desirable URLs, send POST/GET
requests to steal data or receive bot-net commands. Any mobile
OS boasts about of a “sandbox” like about user data privacy
but protect only application data in reality while user data keep
wide opened.
RIM had a great security featured BES that allows to
manipulate with mask to filter any potential unsafe connections
neither network connection or local. Despite of that, it fails
with security too. A newer BlackBerry Server named as
BlackBerry Mobile Fusion manages with BlackBerry
PlayBook, old BES and other mobile devices faced with
problem leveraging of permissions groups in twice to keep
similar permission right among all mobile devices that a huge
fail. As opposite to that, AWS (Amazon Web Services) provide
a restriction by each API call if it is directory listing even. That
is a quite useful solution but does not solve what data accessed
and for. It seems OS vendors are unable to implement logging
system to show user what actions were actually used, what data
for, when action was and else. This kind of solution fill the
gaps not only with analyze malware but also helps to forensics
handle an investigation to be sure no one application harm data
or ruins management with forensics tools.
R
EFERENCES
[1] Y. Chemerkin, “A Security System That Changed The World”, Hakin9
Magazine, Software Press Sp. z o.o. Sp. Komandytowa 02-682
Warszawa, vol. 6 №2 Issue 02/2011 (38) ISSN 1733-7186, pp. 10-13,
February 2011
[2] Y. Chemerkin, “Is Data Secure on the Password Protected Blackberry
Device?”, Hakin9 Magazine, Software Press Sp. z o.o. Sp.
Komandytowa 02-682 Warszawa, vol. 6 №2 Issue 02/2011 (38) ISSN
1733-7186, pp. 22-29, February 2011
[3] Y. Chemerkin, “The Backroom Message That’s Stolen Your Deal”,
Hakin9 Magazine, Software Press Sp. z o.o. Sp. Komandytowa 02-682
Warszawa, vol. 6 №4 Issue 04/2011 (40) ISSN 1733-7186, pp. 22-27,
April 2011
[4] Y. Chemerkin, “Why is password protection a Fallacy Point of View”,
Hakin9 Magazine, Software Press Sp. z o.o. Sp. Komandytowa 02-682
Warszawa, vol. 1 №1 Issue 01/2011 (01) ISSN 1733-7186, pp. 36-53,
June 2011
[5] Y. Chemerkin, “Does your BlackBerry smartphone have ears?”, Hakin9
Magazine, Software Press Sp. z o.o. Sp. Komandytowa 02-682
Warszawa, vol. 6 №7 Issue 07/2011 (43) ISSN 1733-7186, pp. 26-40,
July 2011
[6] Y. Chemerkin, “To get round to the heart of fortress,” Hakin9 Extra
Magazine, Software Press Sp. z o.o. Sp. Komandytowa 02-682
Warszawa, vol. 1 №3 Issue 03/2011 (03) ISSN 1733-7186, pp. 20–37,
August 2011
[7] Y. Chemerkin, “When Developer's API Simplify User-Mode Rootkits
Developing,” Hakin9 Mobile Magazine, Software Press Sp. z o.o. Sp.
Komandytowa 02-682 Warszawa, vol. 2 №2 Issue 02/2012 (3) ISSN
1733-7186, pp. 16–21, February 2012
[8] Y. Chemerkin “Insecurity of blackberry solutions: Vulnerability on the
edge of the technologies,” vol. 6, pp. 20-21, December 2011 [Annual
InfoSecurity Russia Conf., 2011]
[9] Y. Chemerkin, “When Developers API Simplify User-Mode Rootkits
Development – Part II,” Hakin9 OnDemand Magazine, Software Press
Sp. z o.o. Sp. Komandytowa 02-682 Warszawa, vol. 1 №4 Issue
04/2012 (4) ISSN 1733-7186, pp. 56–81, July 2012
[10] Y. Chemerkin, “Comparison of Android and BlackBerry Forensic
Techniques,” Hakin9 Extra Magazine, Software Press Sp. z o.o. Sp.
Komandytowa 02-682 Warszawa, vol. 11 №4 Issue 04/2012 (11) ISSN
1733-7186, pp. 28–36, April 2012
[11] Y. Chemerkin, “BlackBerry Playbook – New Challenges” Hakin9 E-
Book Magazine, Software Press Sp. z o.o. Sp. Komandytowa 02-682
Warszawa, vol. 1 №3 Issue 03/2012 (3) ISSN 1733-7186, pp. 1–34,
September 2012
[12] V. Mohan, K. Hamlen, “Frankenstein: Stitching Malware from Benign
Binaries”, 6th USENIX Workshop on Offensive Technologies (WOOT)
August 2012 [Annual WOOT Conf., 2012]
Copyright ? 2012 ICITST-2012 Technical Co-Sponsored by IEEE UK/RI Computer Chapter 487