Data Tells All

Data Tells All

The public has spoken. It is clear as day. Mobile is winning. People are increasingly using on-the-go applications in their everyday lives. Engaging with it. Relying on it. The data is also in, and it’s more than compelling. Back in 2014, CNN Money reported that, for the first time, mobile Internet usage had reached 55 percent, indicating that mobile Internet usage had finally surpassed desktop Internet usage.

Of the 55 percent using mobile, 47 percent of the traffic came from apps, with eight percent coming from mobile browsers. Google also recently made news when it confirmed that for the first time in the company’s history, it was seeing more overall searches conducted on mobile devices than on desktops. The Rise of Mobile and Consequent Security Issues As mobile usage continues its unprecedented rise, the same security concerns that required so much focus and attention during the PC-era are resurfacing. While some issues are common, such as data transmission and malware, others are relatively new to the mobile space, such as device considerations. Particularly interesting is, though initially brought to light on mobile, some advances around securing the mobile device have even made their way back to PCs and traditional desktops, such as sand boxing of applications and improvements in biometric technology.

The current state of mobile security is hard to detail completely, but there are certainly some common themes. System vulnerabilities continue to be a major cause of concern. In 2015, CVE Details, an online repository for reports of vulnerabilities, reported that 375 vulnerabilities were disclosed on iOS, and 130 on Android. The severity and proliferation of these vulnerabilities vary greatly, but the fact remains that even with mature mobile operating systems such as these, the potential for vulnerable code to make it into production is still high. Users also continue to contribute to the problem. There is still a market for users who want to jailbreak or root their devices, sometimes without knowing that doing so greatly increases their risk because they break the OS manufacturer’s built in security controls. Also, while these operating systems and apps appear to be updated by developers on a relatively frequent basis, users don’t seem to be as diligent about updating their operating systems and apps. In the Android space, OEMs and carriers are exacerbating the problem with slow adoption of new updates from Google.

Some users are bypassing instructions from Apple and Google to only download apps from the officially sanctioned Apple App Store and Google Play stores, and are instead downloading apps from third-party sources, thereby bypassing Apple and Google’s safeguards. In most cases, users who unknowingly infect their devices with malware are doing so by downloading seemingly legitimate apps from those third-party sources. Even within the relatively malware free Apple App Store, a series of apps were found to be infected recently with malware. While the apps were legitimate with the app developers unaware of the malware, it was those same app developers who created the problem, in this case by developing and building the apps submitted using an unauthorized copy of Apple’s XCode development toolset.

While the existence of malicious apps continues to remain a concern for many, potentially the most serious threat to mobile security is found within legitimate, in some cases popular and heavily downloaded, apps. Insecure coding practices of some app developers are unwittingly causing a serious condition in some apps. Known commonly as “leaking data,” these apps are allowing sensitive data into potentially dangerous hands. Sometimes apps are found to house data that is used internally within the app, and that data is not considered sensitive. This might include fonts and game state information. In other cases however, sensitive data, such as passwords, social security numbers and banking information is either stored insecurely in the device or transmitted insecurely.

Recently, NowSecure, a Chicago-based mobile application security firm, published the results of an investigation of its extensive internal database of app vulnerabilities. The firm’s focus was on the issue of apps “leaking” sensitive data. They found that 11 percent of the Android apps leaked sensitive information; 25 percent of Android apps tested had at least one high-risk vulnerability. They additionally found that 35 percent of mobile data tested appeared to be sent unencrypted.

Statistics such as these reveal the lack of standard secure coding practices within portions of the app development community. Security as part of the SDLC and frequent app vetting and testing are standards that should be adopted by any app developer, whether in one of the more traditional “high security” verticals, such as banking, or otherwise.

Biometrics: Security at Your Fingertips?

One of the newest areas of interest within the mobile security conversation is biometrics. Though some form of experimentation has existed for some time, Apple’s inclusion of TouchID in the iPhone 5s hardware platform effectively brought biometrics to the forefront of consumer adoption. By giving users a seamless and elegant way of securing their devices using data derived from their fingerprints, and storing that data within a Secure Element on the device, Apple proved that biometrics need not be as invasive and complicated as originally feared. Many apps made use of this functionality, allowing users to secure their apps with the TouchID element.

Since the TouchID element only indicates to an app that the user touching the sensor has a fingerprint registered on the device, it does not necessarily replace a more thorough authentication method for more security sensitive applications. For those applications, the TouchID authorization from the device should be used as a second or third factor of authentication, in addition to traditional methods such as user name and password, to ensure that the sensitive data is not ever required to be stored on a device.

Other forms of biometric advances being implemented today involve voice and eye recognition. In both cases, several vendors have created apps and SDKs for inclusion in other apps that make use of the microphone and camera on the device to, much like TouchID, create a data representation of the user’s voice or, in the case of EyeVerify’s eye print technology, the blood vessel architecture of the user’s eyes. This technology uses pattern matching algorithms to determine whether or not the sensed user is the registered user for that particular application.

Exploring Behavioral Analytics

One of the most exciting new areas of interest within the broader biometric conversation is what is commonly being referred to as “behavioral analytics.” Common in the anti-fraud space for years, behavioral analysis techniques are now being systematized and applied to real-time analysis within mobile apps, using primarily the device’s extensive sensor information for the raw usage data.

Security firms such as BehavioSec and Crysp are reporting between 75 percent and 95 percent accuracy rates in establishing a user’s identity based solely on the usage of a particular app with their sensing technology embedded. Though there are several analysis techniques, a typical one involves an extensive analysis of the user’s typing cadence when entering data within a text field. There are a surprising number of characteristics that can be derived from simple character entry within a data field.

Behavioral analysis indicates a much more interesting future for security and analysis. Because of the ubiquity of mobile, a much better determination of an end user’s behavior can be established by the device being with the user at all times. Though privacy concerns will remain an issue, the information collected and analyzed does not contain personally identifiable information.

Here’s an example of how a user’s identity can potentially be derived from behavioral factors. The user name and password fields are tagged for inclusion in the analysis. As the user types his or her username, several factors based on touch are logged, such as the “flight time,” the milliseconds recorded between touches. Key pressure is also logged, which tracks exactly how much pressure the user is applying to the screen for each touch. Additionally, key press time can be logged, which tracks how long a user touches a particular screen element. These three factors alone, taken in aggregate, over a relatively short period, can be used to add to what is commonly referred to as a user’s “context.” In this case, the context contains a wealth of knowledge already, based only on the key presses that a user has conducted.

In addition to the user’s context are factors that come from the device, but may not be derived simply from text input. For example, the gyroscopes on the device are used to determine the most common angle the user holds their device when interacting with the app. The GPS sensor is used to establish common locations where the app is launched. What is especially interesting around location is that because of the mobile nature of the device, it is unlikely that a user would always interact with an app in any one setting.

Additionally, if a wearable device is registered and using the same mobile app, then another set of data points can be added and compared to the mobile device’s usage, such as the phone. Is the watch app’s usage pattern consistent with the phones? Did the most recent balance transfer, for example, initiated on the mobile phone take place in a location that is dramatically different from the watch’s location? A proper behavioral analysis of the user’s location data would determine, over time, that several key locations are being used more regularly, and the newer locations can then be added as “safe zones” to the user’s context. For example, if the mobile banking app’s debit card on/off feature consistently shows that a card is enabled and disabled at the same several key locations, such as a Big Box store, when the app detects a new location, but also a Big Box store in the general area, then the addition of this zone to the user’s context could require less overall analysis because of the likelihood of the situation.

An Updated System

Other factors are added to the context that can come from the device’s configuration. For example, after months of usage logged, suddenly the device is showing a jail-broken status. Or has the operating system been updated? Because the data is collected, aggregated and analyzed with trends in mind, no single factor will immediately skew the results. In the operating system scenario above, it is very likely that an iOS user would update their operating system at least once a year when a new version is released. In that case, as in all of the analysis cases, a follow up authentication step can be used to further authenticate the user. The behavioral analysis can be used to inform the session, but does not have to be the only factor used to determine identity.

All the other factors remain, but the behavioral piece can be used to augment the factors used. Additionally, behavioral analysis does not require enrollment. This is a vital point, because, unlike voice and facial recognition, which require some element of user enablement to “register” the factors, behavioral techniques rely on usage, which is obviously already happening without the user needing to establish anything at all.

As the security landscape continues to evolve, the app development community continues to evolve concurrently. The threats certainly remain and will continue to exist going forward. The usage of mobile devices will continue to grow, as will their natural extension into wearables, which ultimately are similar if not identical to mobile devices in terms of threat vectors.

What is unique about the wearables and mobile devices is that they also afford users and app developers more information that is more uniquely relevant to the end user, which cannot easily be replicated. Apps that learn about their users, and offer those users unique experiences, are already present and growing. Some of those same techniques can and will be used to help users protect themselves, as well as their data.

This article originally appeared in the April 2016 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3