skip to main content
10.1145/1982185.1982506acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Software security aspects of Java-based mobile phones

Published:21 March 2011Publication History

ABSTRACT

More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This not only applies to security-critical mobile applications such as m-banking or m-commerce applications. The end user's privacy may also be in danger or the operator may be the target of an attack. In this paper, we discuss security risks introduced by mobile phones considering the perspectives of the different parties involved in telecommunications systems. Specifically, we demonstrate those risks by means of a security hole discovered in a large number of mobile phones. The security hole can be exploited to obtain manufacturer or even operator permissions. In particular, we implemented a Java-based Trojan horse. This way, the compromised mobile phone can be used as an eavesdropping device by an attacker. All in all, this demonstrates that the risks are not only theoretical, but also real. We also sketch a methodology for the security analysis of mobile phone software.

References

  1. M. Bond and R. Anderson. API-level attacks on embedded systems. Computer, 34(10): 67--75, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Burdy, Y. Cheon, D. Cok, M. Ernst, J. Kiniry, G.-T. Leavens, K. Leino, and E. Poll. An overview of JML tools and applications. In Proc. 8th Int'l Workshop on Formal Methods for Industrial Critical Systems (FMICS 03), pages 73--89, 2003.Google ScholarGoogle Scholar
  3. B. Chess and J. West. Secure Programming with Static Analysis. Addison-Wesley, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. W. Enck, M. Ongtang, and P. McDaniel. Understanding Android Security. IEEE Security and Privacy, 7(1): 50--57, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Enea AB. OSE 5.0 Architecture, 2004. http://www.enea.com.Google ScholarGoogle Scholar
  6. Enea AB. Enea Wins New Wireless Deal Worth MSEK 30, 2008. http://www.enea.com/Templates/NewsPage___24486.aspx.Google ScholarGoogle Scholar
  7. S. Garfinkel and G. Spafford. Practical Unix and Internet Security. O'Reilly, 2nd edition, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Gemalto S. A. Developer Suite V 3.0, 2007.Google ScholarGoogle Scholar
  9. Google Inc. Android---An Open Handset Alliance Project, 2008. http://code.google.com/android/documentation.html.Google ScholarGoogle Scholar
  10. M. Hypponen. Malware Goes Mobile. Scientific American, 295(5): 46--53, 2006.Google ScholarGoogle Scholar
  11. Java Community Process. List of all JSRs, 2007. http://jcp.org/en/jsr/all.Google ScholarGoogle Scholar
  12. Java Community Process. Security and Trust API for J2ME, 2007. http://jcp.org/aboutJava/communityprocess/jsr177.Google ScholarGoogle Scholar
  13. JSR 118 Expert Group. Mobile Information Device Profile for the Java 2 Micro Edition Version 2.1, 2007.Google ScholarGoogle Scholar
  14. J. Kiniry. Personal communication, 2009.Google ScholarGoogle Scholar
  15. ARM Limited. ARM Security Technology Building a Secure System using TrustZone Technology. White Paper, 2009.Google ScholarGoogle Scholar
  16. G. McGraw. Software Security: Building Security In. Addison-Wesley, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. G. McGraw and E. W. Felten. Securing Java: Getting Down to Business with Mobile Code. Wiley, 2nd edition, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. B. Meyer. Object-Oriented Software Construction, 2nd Edition. Prentice-Hall, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Nokia. Malware CommWarrior, 2005.Google ScholarGoogle Scholar
  20. Open Mobile Alliance. DRM Content Format Approved Version 2.0, 2006.Google ScholarGoogle Scholar
  21. Open Source Cert Advisory. #2009-006---Android improper package verification when using shared UIDs, 2009. http://www.ocert.org/advisories/ocert-2009-006.html.Google ScholarGoogle Scholar
  22. E. Poll, J. van den Berg, and B. Jacobs. Specification of the Javacard API in JML. In Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, pages 135--154, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Raza, G. Vogel, and E. Plödereder. Bauhaus---A tool suite for program analysis and reverse engineering. In Ada-Europe, volume 4006 of LNCS, pages 71--82. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Research in Motion. BlackBerry Enterprise Solution -- Security Technical Overview, 2008. http://www.blackberry.net/products/software/-server/exchange/security.shtml.Google ScholarGoogle Scholar
  25. S. Shankland. Mobile Java Hit with Security Scare, October 2004. CNET News.Google ScholarGoogle Scholar
  26. Sun Microsystems. Connected Limited Device Configuration Specification Version 1.1, 2003.Google ScholarGoogle Scholar
  27. Sun Microsystems. Java Card 2.2.2 Platform, 2006. http://java.sun.com/products/javacard/specs.html.Google ScholarGoogle Scholar
  28. Symbian Ltd. Symbian Signed, 2006. https://www.symbiansigned.com.Google ScholarGoogle Scholar
  29. P. Traynor, P. McDaniel, and T. La Porta. On Attack Causality in Internet-Connected Cellular Networks. In Proceedings of the USENIX Security Symposium (Sec'07), August 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. P. Traynor, V. Rao, T. Jaeger, P. McDaniel, and T. La Porta. From mobile phones to responsible devices. Technical report, Pennsylvania State University, Network and Security Research Center, January 2007.Google ScholarGoogle Scholar
  31. trifinite.org group. Homepage, 2006. http://trifinite.org.Google ScholarGoogle Scholar

Index Terms

  1. Software security aspects of Java-based mobile phones

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SAC '11: Proceedings of the 2011 ACM Symposium on Applied Computing
        March 2011
        1868 pages
        ISBN:9781450301138
        DOI:10.1145/1982185

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 March 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,650of6,669submissions,25%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader