mobile app security techniques and traps - goto conference · mobile app security techniques and...

Post on 27-Jul-2020

2 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Mobile App Security Techniques and Traps

Graham Lee / @secboffinSmartphone Security Boffin, The Lab @O2

Tuesday, 22 May 12

No code

Tuesday, 22 May 12

No code

Tuesday, 22 May 12

State of the Union

Tuesday, 22 May 12

State of the Union

• 1875: UK patent application for telephone

Tuesday, 22 May 12

State of the Union

• 1875: UK patent application for telephone

• 2007: Phones got good enough to be useful

Tuesday, 22 May 12

State of the Union

• 1875: UK patent application for telephone

• 2007: Phones got good enough to be useful

• 2009ish: Cell networks got good enough to use phones on

Tuesday, 22 May 12

State of the Union

• 1875: UK patent application for telephone

• 2007: Phones got good enough to be useful

• 2009ish: Cell networks got good enough to use phones on

• Despite apparent novelty, most security problems already existed:

Tuesday, 22 May 12

The problems

Tuesday, 22 May 12

The problems

• Who gets to see/change my data?

Tuesday, 22 May 12

The problems

• Who gets to see/change my data?

• I like sharing things, but only on my terms.

Tuesday, 22 May 12

The problems

• Who gets to see/change my data?

• I like sharing things, but only on my terms.

• (these are the same problem stated twice)

Tuesday, 22 May 12

Tuesday, 22 May 12

What are my concerns?

Tuesday, 22 May 12

What are my concerns?To how much effort will I go?

Tuesday, 22 May 12

What are my concerns?To how much effort will I go?

Will no-one think of the children?

Tuesday, 22 May 12

What are my concerns?To how much effort will I go?

Will no-one think of the children?

Tuesday, 22 May 12

Tuesday, 22 May 12

Tuesday, 22 May 12

Tuesday, 22 May 12

Tuesday, 22 May 12

Tuesday, 22 May 12

Tuesday, 22 May 12

Top Tips

Tuesday, 22 May 12

Top Tips

• Express security issues as (testable) user stories

Tuesday, 22 May 12

Top Tips

• Express security issues as (testable) user stories

• Iterate

Tuesday, 22 May 12

Top Tips

• Express security issues as (testable) user stories

• Iterate

• Plan your response strategy (particularly release management)

Tuesday, 22 May 12

Top Tips

• Express security issues as (testable) user stories

• Iterate

• Plan your response strategy (particularly release management)

• Don’t leave it to the pen tester

Tuesday, 22 May 12

top related