Towards a Mobile Applications Security Approach Sofien BEJI (Contact Author) Nabil El Kadhi National School of Computer Science - Tunisia European Institute of Information Technology RIADI GDL Laboratory - Manouba L.E.R.I.A. Laboratory Paris [email protected] [email protected] Mobile : + 216 20 304 822 Mobile : + 33614418729 Fax : + 216 79 48 48 74 Abstract Mobile applications are software running inside mobile devices and over any wireless connection. We agree to classify mobile applications into four classes: web, messaging, thick client and synchronization. With the widespread of some critical mobile services such as mobile payment or mobile banking, several new threats are emerging. This paper aims to focus on security threats and the necessity of following a specific design methods to deal with such mobile applications security. Todo so, we will first survey samples of attacks dedicated to the mobile world. The attacks' analysis will also point out the main vulnerabilities. Secondly, and to satisfy security requirement in the case of mobile applications, we focus on a set of additional constraints that should be taken into account. Those points will lead us to introduce our main contribution through this work. In fact we propose a new approach for taking in account security at application first stages in the mobile context. Our methodology is based on the NFR framework to deal with additional and non functional constraints.

Keywords

: Security, mobile methodology, NFR framework

applications,

1. Introduction Mobility is defining the future of computing systems and mobile devices are pervading our society and lifestyles. According to a recent study from Juniper Research[1], the global m-commerce market will be a US$88 billion industry by 2009. Equipped with low resources and broadcasting sensitive data in an uncontrolled media, mobile applications are suspected

to be opened to new threats and attacks. Hence it is worthy to focus on security aspects for mobile applications. Dealing with security in such a context can be achieved through attacks analysis followed by a vulnerabilities classification. Making the appropriate design choices will actively prevent the hardness procedure of applications' updates. The target of this paper is to point out vulnerabilities in order to draw back the guidelines for secure mobile applications design. The first section will be an overview of the associated technologies, next we focus on attacks and vulnerabilities. Once the vulnerabilities pointed out, we will be interested in how to take in account and analyze the security requirements which is the first step of a complete specific methodology.

2. Overview technology

of

Mobile

applications

This section deals with the landscape of mobile applications technologies. Mobile applications are software programs running through a permanent or partial wireless connection within a mobile device. We are mainly interested in four categories of applications : thick client application, web application, synchronization and messaging. This classification relies on the use context and the associated technology.

2.1 Synchronization Synchronization is a computer to device data transfer that aims to keep both of components in a coherent state. A data synchronization software runs over a set of communication protocols such as IrDA [2] and Bluetooth [3]. Because of its high rate and

relatively remote distance connection, Bluetooth is becoming the “de-facto” standard.

2.2 Thick client-server application J2ME [4] and .Net Compact Framework [5] are the leading platforms that fits device capabilities. According to the global context of our case study which focus on the mobile applications in the telephony field, J2ME was the widely deployed platform. Because of application portability, J2ME was adopted by the world's leading cellular phone manufacturers (e.g. Nokia, SonyEricsson, Siemens and Samsung). Configurations were created, defining groups of products based on the available processor power and memory of each device. A configuration mainly outlines, the Java programming language supported and Application Programming Interfaces (APIs)[4]. There are two standard configurations for the J2ME at this time : Connected Device Configuration (CDC) [4]. Connected Limited Device Configuration (CLDC)[4]. The CLDC is targeted toward less powerful devices like mobile phones and PDAs[6].

2.3 Thin client-server application Thin clients applications are mainly web based ones. WAP 1.x and WAP 2.0 are the leading generations of mobile web. WAP 1.0 and WAP 1.2 were WAP Forum consortium initiatives[7]. The WAP forum[7] was basically a telecommunication consortium which has led the main initiatives to deal with network based languages like HDML[8] succeed by WML[9]. WAP 2.0 is a convergence specification to a best practice technologies mainly based on xHTML[12] and xHTML Mobile Profile[13] languages, which are W3C[12] standards more convenient to information technology developers.

2.4 Messaging The messaging service includes both text and multimedia messages. Short Message Service[16] is one of the most popular services used in mobile communication. Since SMS is mainly used for personto-person communication, some mobile services like SMS banking has led this service to a professional use. SMS is a text messaging service available on the GSM network[17]. From the sender to the destination, the text message switches from a set of network nodes. The main components in the network messaging architecture can be divided in four parts: The mobile

station composed of the SIM card [17] and the mobile equipment. The Base station subsystem composed of a set of Base Transceiver Stations (BTS) [17] responsible of Over-The-Air transmission. The Short Message Service Center (SMSC) component [17] which stores and switches messages. The last part is the interface with other networks and services such as fixed telephony and Internet. Multimedia Messaging Service (MMS) [17] provides the capability to receive and process multimedia message types such as those used for sound and video (JPEG, GIF, MP3, MPEG-4, etc.)[19]. With the Synchronized Multimedia Integration Language(SMIL) [17], it is possible to create animated sequences. The MMS is deployed over the General Packet Radio System (GPRS)[18] network. Let's us rapidly describe MMS in terms of actions taken by the main network components : When the user transmits an MMS or an E-mail, the MMS Relay Server (R/S) transcodes the MMS message to either email or other MMS format depending on the provider. The message is sent to the SMTP[19] server or the destination MMS R/S. The MMS R/S sends a notification message as an SMS message or WAP push[21] depending of the destination settings. The notification message contains the location of the message, usually as a HTTP[22] address. Downloading the message can be manually performed by the user or automatically when defined in the device configuration.

3. Mobile applications security Several attacks have been reported according to our study of the mobile applications. Mainly we can draw two major classes of attacks, the first one is relative to the device and the second belongs to the environment. The device includes the physical resources, the SIM card [17] and the hosted applications. The environment is the wireless network that bears the link to the backend of the applications.

3.1 Device attacks Mobile phones are computing devices with limited resources. For components like processor or memory storage, performance are quite limited comparing to nowadays PCs. Input/output interfaces, which are especially crucial for securing applications represent an other aggravation feature. Neither the small display unit nor the limited keypad are appropriate for assuming easily-authentication service. Moreover, the

limited power energy in association with limited processing capabilities can be a source of threats. Here are samples of some device related attacks. 3.1.1 Draining batteries with Bluetooth attack A malicious Bluetooth device receiving data must send an acknowledging to the sender in order to confirm reception. Unless it is done, the sender will send data again and again which can result in a bandwidth consumption and a battery out of charge. 3.1.2 SIM card attack Particularly for GSM mobile phones, applications are deployed on shared networks through service providers. To get access to such a service, Subscriber Identity Module (SIM) cards are required, millions of these ships are distributed among the users. Any security flaw detected in these micro-controllers is difficult to be updated and requires years to be taking off from the market. A SIM card implements the COMP128 algorithm responsible of authentication and cipher key generation in the GSM network. COMP128-1 was cryptanalysed by Wagner and Goldberg[23]. Accordingly, a SIM card clone is possible and this malicious use can lead to the Denial of service for the legitimate user. 3.1.3 Bluetooth blacklist attack In the Blacklist DoS attack, devices failing to authenticate (and therefore to pair) are blacklisted. If an attacker constantly switches from a Bluetooth address to an other, he would blacklist all the other devices that the machine would talk to. An other form of DoS attack could involve filling up the blacklist memory (which can only hold a certain number of addresses) in order to produce a buffer overflow and subsequent device shutdown[30]. 3.1.4 User interface limitation The limitation of user interface for some mobile devices is not a kind of attack but it increases threats when combined with other vulnerabilities. Calling a network service without user knowledge is a big security flaw. By obscuring the device screen during validation, the user can confirm an SMS text sending without his knowledge. Once the screen is filled with other display, an other message like “Do you want to download our FREE client fidelity card” may be displayed. The user may

click on the fake validation button that actually refers to an SMS sending or even his contact book transfer. Keypad input plays also a major role for password entry. For one hand, setting a password which is easy to type like manufacturers’ defaults would leave the device in a non protected state. On the other hand, typing a complex password periodically with a 10 keys device is hard and can lead the user to give up the application. 3.1.5 Physical attacks A mobile phone can be theft, more easily, only the memory stick can be discreetly unplugged from the device. This is quite crucial because of sensitive information stored in the device and the use of default access parameters by the users. Contacts book or other client data applications like mobile banking access parameters for example can be disclosed. In fact, for J2ME platform, application data is stored in the Record Management Store (RMS)[4]. The RMS is not protected (No Encryption), the whole storage system can be accessed from a file browsing application like FExplorer software[25]. 3.1.6 Denial of service (DOS) through malformed content By sending improperly formatted Web pages or SMS to the device, a denial-of-service attack can take place. This attack can be conducted by either downloading the malicious content from the server or by an XSS injection. After receiving a header broken SMS, some SMS applications users has been victim of DOS. DOS attack was seen on Nokia 6210, 3310, 3330 [26]. A successful exploit of this issue allows attackers to consume excessive system resources in the device, resulting in the application crashing, denying service to legitimate users. Mulliner [27] has discovered an MMS user agent Buffer overflow. The attack has been proven on the IPAQ 6315 and i-mate PDA2k models. This attack results in a crash when MMS is fed with fuzzy values. One of the flaws experimentation discovered was in the subject field of the M.Notification.inf MMS message[27]. 3.1.7 Spamming Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Spamming has also penetrated the mobile world as

m-spam through SMS and MMS. Spam costs the sender very little to send, but it is disturbing for the recipient to periodically delete and sort a huge set of ads messages. Since text based spam is detectable and can be stopped by a set of tools, a new generation of spams has been released: it’s a spam based image. This adds up to five billion image-based spam messages being sent everyday, 78 per cent of which are not detected by traditional spam filters. The SIP invite message attack [54] is an additional spoofing vulnerability that has been reported in some phone adapters. The Vonage VT 2142-VD phone from MOTOROLA receives SIP INVITE message without authentication. Hence the phone sets up a call and could establish a communication with a spam source. This attack was reported in several mobile devices like Motorolla [52] BlackBerry [53].

3.2 Environment attacks Mainly, environment vulnerabilities are due to the nature of connections and networks. Mobile applications are based on wireless connections which suffer from eavesdropping. With a wireless connection, a man-in-the-middle attack [22] remains possible because of the open wireless medium. Man-in-the middle attacks are especially difficult to detect in a not connected context. Next will be presented some scenarios of attacks related to mobile applications environment. 3.2.1 Bluetooth attacks A well knowing attack is Bluesnarf [28], it allows the hacker to connect to the OBEX push profile[28] which has been specified for easy exchange of business cards and other objects. In most of the cases, this service does not require authentication. Missing authentication is not a problem for OBEX Push, as long as everything is implemented correctly. Once connected to the target, the BlueSnarf attack performs an OBEX GET request for known filenames such as 'telecom/pb.vcf' for the devices phone book or 'telecom/cal.vcs' for the devices calendar file. In case of improper implementation of the device firmware, an attacker is able to retrieve all files where the name is either known or guessed correctly. 3.2.2 The GSM network attack After authentication, a GSM mobile phone has to establish an encrypted wireless connection to the BTS. The device implements the A5 algorithm which

encrypts the over-the-air communication with the BTS. There are at least three different versions of the A5 algorithm, the A5/1 is the strongest one. According to [29] the cryptanalysis of the A5/1 algorithm is feasible. Once the A5 algorithm cracked and the ciphering key discovered, a hacker can originated calls and messages. It is worthy of mention that this is an example of an additional flow due to cryptographic features. Our approach won't focus on the analysis and solving of cryptographic attacks, whereas we will be interested in logical and combined reasons attack as an aggravation feature. [34] 3.2.3 Localization threats Several mobile devices (example Nokia 6110) are equipped with Global Positioning System (GPS) for geographical localization. GPS tracking systems are becoming more and more popular for all types of applications either for personal use or for commercial movement reporting. One of the famous GPS devices for personal navigation is TomTom[31]. According to TomTom web site announcement, the GO 910 model was infected by a malware during the last quarter of 2006. Such a malware on a mobile device equipped with GPS can disclose all user movements. Breaking such privacy can lead to commercial strategy disclosure or even to terrorist attacks. 3.2.4 The WAP GAP As mentioned in the mobile web applications section, a gateway is always placed between the device and the content server. To insure secrecy service, encryption is used for securing communications, the device-gateway supports encryption with WTLS [32] and the gateway-server connection is encrypted with SSL[33]. Inside the gateway, data is converted from a format to an other, in fact during this conversion phase, data is in a clear format and this is what we call the “WAP Gap”[13].

3.4 Multi-session attacks A multi sessions attack is a second level attack that is based on combined and generally distributed atomic vulnerabilities and threats. These types of attacks are harder to be detected because of their distribution in place and time. The attack described here is based on some GPRS[18] network vulnerabilities as a first step and on the device battery limitation as a final target. Since MMS notification are sent in clear text and with no

authentication, it will be possible to originate MMS notifications with malicious web server. In fact, according to [26], a fake MMS R/S was set up and MMS notification that points to a hacked URL were sent to devices. In order to draw up the mobile target numbers, it is possible either to generate them according to areas numbers or to check providers' web sites for numbers existence. In addition to this, sending MMS notifications can be done freely with some SMS or MMS web site services. Once the user receives the notification and connects to the hacked web server through the HTTP[22] link, the hacker can already built his hit-list of mobile devices profiles and IPs. This was the first step attack through which the hacker has a list of mobile numbers with the associated IPs. The second part of the attack is to set up a draining battery attack to this large set of mobile targets. The key idea of the attack is to originate periodically UDP[36] packets in order to keep the mobile device in a READY state. Knowing that a mobile phone transceiver is supposed to be most of the time in a STANDBY state, the attack experimentation has shown that a Nokia device has drained its battery in an average of 7 hours instead of 156 hours. The experimentation was quite the same with a Sony Ericsson Device, both tests were done with Bluetooth switched off.

3.5 Attacks summary and analysis As described in the previous section, there are several target's attacks depending on the type of application and the kind of environment. Basically it could be possible to focus on WAP or messaging attacks only, but this is a non realistic approach. The security service shows that for the major part of attacks, even for the trivial ones, all the main security services are required. Hence, security in mobility must be handled as a whole because of the attacks interrelation and the emergence of multi-session attacks. To point out vulnerabilities of mobile applications in comparison to standard applications, we will make an analysis according to the STRIDE[51] threat model. STRIDE is a Microsoft threat model that describes a six categories threats. STRIDE is the acronym of (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service and Elevation of privilege). Table I – Mobile vulnerabilities analysis according to the STRIDE Model STRIDE Vulnerability or Comment Threat attack in the mobile

context Spoofing

Limited display

screen Aggravation feature

Tampering

Phone theft, Memory Due to physical stick unplug, no aspect and authentication depends of the user vigilance

Repudiation SIP Invite message

Depends of the phone adapter

Information Man-in-middle Critical disclosure attack, over-the air specific transmission wireless

and to

Denial service

and to

of Mainly Limited Critical battery and some specific injections wireless

Elevation of Nothing reported privilege

Mostly only oneuser applications on device.

Dealing with security from one side is not enough in the mobility field and a global design methodology is needed. Later in this section, additional mobility features such as popularity, diversity of stakeholders and others will enforce the need of a wide scope analysis and design approach. The popularity of mobile devices such as phones has a critical impact on its security. According to the GSM association, the number of devices is more than 2.6 Billions of unit during the first quarter of 2008. Assuming security of services with such a huge number is a big challenge. In fact, the more devices are deployed, the more potential entry points are available to attackers. Also, with the enlargement of mobile devices' use, mobile services holding critical information are becoming also widespread. Mobile commerce or mobile banking are examples of applications that hold sensitive data. Mobility means having access to such applications through a mobile device from any location, no geographical boundaries can be set up in this case of use. Assuming security in this mobile context requires additional measures and procedures. Securing the service holder mobile network is not enough when mobile customers are accessing their service from anywhere at any time. Mobile applications are dealing with several actors: End user, Service developer, Content provider, Network provider; this profiles’ diversity enhances threats and attacks by emerging complex roles.

Managing the access control rights becomes a hard task because of mobile actors integration. Several inputs in a mobile device like GSM/GPRS, Bluetooth, IrDA, RFID are distinct communication means that can be invoked by applications and unfortunately by hackers. Unless they are correctly configured with the associated roles, rights and profiles, functions handling these services can be vulnerable to illegal calls by hackers. Moreover, the later services are also handling billing systems, gaining unauthorized access to these services can lead to financial lost. Generally one of the success keys of popular services is their ease of use. Acceptance of mobile applications like m-payment or m-commerce is deeply affected by their response time and the number of keypad touches. Shneiderman[20] argues that for those developing systems, usability must go beyond “userfriendliness” to include an understanding of the diverse needs of users and what they are trying to accomplish. Usability problems with PC based applications can be further exacerbated when applications are developed for mobile devices. Making a parking payment must be instantly achieved with a minimum user communication. Taking in account security requirement as a first goal should cope with usability and efficiency in order to target feasible secure mobile applications. Obviously there are additional non functional requirements but in the mobile context usability and efficiency worth to be focused rather than others. Our target through the listing of attacks is to find out vulnerabilities. Identifying vulnerabilities is the first step to deal with counter-measures at the design phase.

4. An analysis and design approach Based on the previous presentation, and considering from one side the diversity of attacks and from the other the specificity of mobile applications like user friendliness, instant use and large deployment, it seems quite hard to straitly map counter-measures to prevent attacks. From the designer/developer part of view, several threaten sources are observable with additional non functional requirements (NFR). Additional NFR like usability, efficiency or instant use could also be in some cases a source of threats (Section 4.2.1 Bluetooth OBEX connection). Hence our contribution through the proposal of a security approach would target the guidelines for mobile applications builders. Focusing on security in mobile applications with heterogeneous environment and multi-session attacks is our main goal but coping with

additional NFR is a must in order to target feasible and commercial solutions.

4.1 Existing approaches Several approaches for analyzing attacks and vulnerabilities has been proposed, these approaches can be classified into two major classes. The former group such as misuse case, abuse case[37] or attack trees[38] are approaches centered on the adversary behavior. The target of these approaches is known attacks with associated signatures. The latter class of approaches focus on the protection of assets, they are goal-oriented [40] and suitable for unknowing attacks. Goal-oriented approaches require a good specification of the correct system behavior. Both of the alternatives have advantages and disadvantages. The first one is suitable for controlled environment and known attacks whereas the second comes up with a high rate of false positives. It is also crucial during the requirements elicitation phase to get a free of conflicts specification, especially, in the case of large scale projects like in the mobile context. Several stakeholders are taking part in the definition of security goals with conflicting security and other quality constraints. Accordingly, it is important to distinguish between the stakeholders requirements and the system requirements as defined in [41]. The requirement phase is the starting point to deal with security. Among the approaches presented above, it was possible to deal with the design of misuse cases and abuse cases if we adopt the first strategy which is based on the adversary behavior. Nevertheless, we have based our methodology on the second approach because of the heterogeneous environment of mobile applications, the lack of standards and the huge number of users. Driving by the requirements, our strategy should deal with measures to satisfy these requirements and update the application design according to these new needs. As mentioned earlier, the scope deals also with additional non functional requirements that must be fulfilled in order to release an appropriate and usable solution. Building secure applications requires crossdisciplinary expertise, especially in the new and evolving field of mobile applications. Beyond the design and development skills of the application builder, cryptographic solutions, tamper resistant devices, access controls models and many other mechanisms should be known. Our first contribution is to present coherent guidelines through a feasible methodology targeting to assist developers for assuring security requirements in mobile applications field.

Due to quality assurance of some services, neglecting or decreasing some security features is of common use otherwise the service would not be accepted by the users. We argue that security or any other non functional requirement couldn't be absolutely reached without its integration in the whole context of the application. This is an additional feature that should be held by our approach and which leads to the holding of mobile security according to a dynamic manner. Among the solutions analyzed, we mention the existence of the NFR framework which is centered on the requirements, deals with interactions, and is userfriendly which is appropriate to what we have mentioned in the previous sections of the study. Moreover, there are several studies [43][56] on how to incorporate NFR framework to UML models. Our focus is given to the NFR framework which satisfy our needs as a starting point for our methodology.

are working on a security services ontology. In fact, assisted by ontological objects and their relationships, it could be possible to retrieve several needs in an automated way. Integrity, authentication and privacy are for example security services that are mostly required. At the moment this paper was written, we have started the design of our secure mobile applications ontology. The ontology will include security services and their properties, relationships between them and the technologies associated to the mobile context.

4.2 Overview of the NFR Framework The NFR Framework [45][46] is a goal-oriented approach for addressing NFRs. This framework represents NFRs as NFR softgoals to be satisficed. NFR softgoals are satisficed when there is sufficient positive and little negative evidence, and they are unsatisficed otherwise. NFR softgoals are identified by nomenclature “Type[Topic]”, where Type represents a non-functional aspect and Topic represents the context for the Type. Criticality of NFR softgoals is either neutral, critical (!) or very critical (!!). Softgoals may be refined into offspring softgoals with more specific Type or Topic using AND- or OR-decompositions. To determine satisficeability, we identify solutions for achieving NFRs) and their corresponding degree of contribution indicating how well they achieve NFR softgoals (MAKE (++), HELP (+), HURT (-), or BREAK (--))[44]. The NFR framework will be adopted to capture and analyze security requirements. The first steps of our methodology will be summarized as follows : Starting from the user specifications and needs we should extract the functional and non functional requirements. The Language Extended Lexicon(LEL) approach [47] could be used for domain elicitation for FR and NFR. The objective of the LEL consists in understanding the problems' language without deeply understanding the problem. For more details on the LEL and actors of the Universe of discourse see [47]. Once the NFR identified, we should focus on the design of Software Interdependency Graphs (SIG), obviously our main topic here is security. To assist the designer during this phase, we

Figure 1. Mobile application security NFR analysis Once the SIG designed and softgoals satisficed, we should run the inference check in order to dynamically verify the security in the context of all the NFRs. The obtained operationalizations should be integrated with the functional requirements. The next section is a running example on how to deal with security in the case of SMS banking.

4.3 SMS Banking running example The service consists in using the text messages in some banking operations like balance check, account transfer and some other administrative functions. Figure 2 shows the analyses of the NFR security goal using the NFR framework. Security softgoal of the application is refined into two sub-goals : Security of Transmitted messages and security of stored data. Each security sub-goal is refined into atomic security services. From the security services, we can depict the associated operationalizations that target to satisfice the service. Clouds in bold represent the final operations. For more details on the NFR framework see [45].

Figure 2. SIG of security NFR Starting from a functional use case, it will be possible to update it with the associated requirements from the NFR framework. The use case [SIM LogIn], [Sign Message] and [Encrypt Message] are obtained from the NFR Security softgoal and both of [Biometric LogIn] and [Application LogIn] where eliminated because of the HURT relationship with portability sub-goal in the usability softgoal. The CRC Integrity operation was marked as undecided because the encryption could also be used for the achievement of the integrity service. Unless we have released the mobile security ontology, we note that we have limited our integration process to use case diagrams.

5. Conclusion Mobile services are the future of information technology. With the popularity of electronic and remote services during the last decade, security has been one of the main topics for IT specialists. In the first sections of our paper, we have presented several attacks dedicated to the mobile world and a set of vulnerabilities has been reported. Predictable vulnerabilities such as the lack of physical resources and the on-the-air transmission have been confirmed. Later, we have mentioned that additional standard attacks can also be conducted in the mobile context. According to our study of mobile applications, dealing with security from one side seems to be not appropriate. Multi-session attacks remain one of the main security preoccupation. Moreover, to get operationable solutions, mobile applications should respect additional quality constraints like efficiency or usability. Hence, it was mandatory to deal with security in its context. Faced to novel attacks and additional non functional requirements, we feel the need to provide the designer of mobile applications with an approach that handles security at first stages. Our starting point was

the analysis and refinement of non functional requirements which was held by the NFR Framework. Two contributions have been proposed, the first concerns the integration of an ontology to the framework in order to assist the designer during the refinement of security goals. The second contribution concerns the checking of synergy and conflict among the security and the others non functional requirements. Our proposal aims to capture and analyze security in the context of mobility, this was the analysis phase towards a whole approach. Presumably, new operations found after running the NFR Framework will be mapped to functional classes[43]. Nevertheless, we should explore several strategies of integration. To integrate NFR into FR, S. Supakkul et al.[49] deals with extension points that are applied to use cases. Subrina et al [48] deals with a meta-level weaver that targets to generate actions that should be applied to any UML model in order to apply the operationalizations obtained. A third approach[50] distinguish between operationalizable NFR and checkable ones. The main idea is that after separation of concerns during the analysis phase, the obtained set of NFRs should be integrated to FR through modeling objects like diagrams in the case of UML. Moreover, all the authors agree that NFR are repeatable and we should keep a knowledge base of NFR repository. Since our study has pointed out a set of constraints like the user interface, the power consumption, the low bandwidth, the integration process should target all the UML diagrams that may be of interest. Earlier we have mentioned the multi-facet of security in mobility through the design of ontology, so security services in the ontology should keep track of the level of security required and the associated quality of service like response time and usability. Our last projection about the implementation and coding phase deals with platforms. Hopefully, J2ME and .Net CF are the platforms dominating the market, we may then propose the design of a generic cartridge that aims to merge their shared security services and then it would be possible to target a multi-platform generation.

References [1] Juniper Research official web site. [2] Infrared Data Association. [3] The Official Bluetooth Membership site. [4] M. J. Yuan, Enterprise J2ME, Developing Mobile JAVA Applications, Ed. Upper Saddle River: Prentice Hall PTR, 2006, pp. 20-25.

[5] D. Fox and J. Box, Building solutions with the Microsoft .NET Compact Framework, Addison-Wesley Professional, 2003. [6] V. LEE, H. SCHNEIDER, and R. SCHELL, Mobile applications, Ed. Upper Saddle River: Prentice Hall PTR, 2004, pp. 46-47. [7] The WAP forum. [8] P. King and T. Hyland, “Handheld Device Markup Language Specification”, The W3C consortium, 1997.

Devices”. International Journal of Computer Science and Network Security, VOL.6 No.4, April 2006. [29] A. Biryukov, A. Shamir, and D. Wagner, “Real Time Cryptanalysis of A5/1 on PC”. [30] How can Bluetooth services and devices be effectively secured?, Computer Fraud & Security, Volume 2006, Issue 1, January 2006, Pages 4-7 .

[9] Wireless Markup Language Specification, The Wap forum, 1998.

[31] Tomtom official web site. [32] WAP Forum, “WAP WTLS: Wireless Application Protocol Wireless Transport Layer Security Specification,” 2000

[10] XHTML™ 1.0 The Extensible HyperText Markup Language.

[33] A. O. Freier, P. Karlton, and C. Kocher., “The SSL Protocol”, Version 3.0. November 1996

[11] S. M. Schafer, HTML, XHTML, and CSS Bible, Wiley, 2008, pp. 223-330.

[34] L. C. Paulson, “The Inductive Approach to Verifying Cryptographic Protocols”, Computer Laboratory

[12] The World Wide Web Consortium. [13] Gupta, Securing the wireless Internet, Communications Magazine, IEEE,Volume 39, Issue 12, 2001. [14] A. Tanenbaum, Réseaux, 3rd edition, Prentice Hall, 1997, pp. 271-273. [15]G. L. Bodic, Mobile Messaging Technologies and Services: SMS, EMS and MMS, John Wiley & Sons , 2005, pp. 1-30.

University of Cambridge, 2000. [36] R. Racic, D. Ma, and H. Chen, “Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone’s Battery”, SecureComm 2006: Second International Conference on Security and Privacy in Communication Networks, Baltimore USA, Aug. 2006.

[16] A. Ahmed Khan, “Security & Vulnerability Analysis of Wireless Messaging Protocols & Applications”, 2005. [17] Synchronized Multimedia Integration Language, The W3C consortium. [18] W. Enck, P Traynor, P McDaniel, and T. L. Porta, “Exploiting Open Functionality in SMS Capable Cellular Networks”, 12th ACM conference on Computer and communications security, USA, 2005. [19] A. Tanenbaum, “Réseaux”, 3rd edition, Prentice Hall, 1997, pp. 664-668. [20] B. Shneiderman, “Designing the User Interface: Strategies for Effective Human Computer Interaction”, Addison Wesley, 1998. [21] Push Message, Wireless application protocol, WAP Forum, 2001. [22] B. Schneier, Cryptographie appliquée, 2ème Edition, WILEY, Paris, 1997. [23] M. Briceno, I. Goldberg, and D. Wagner, “An implementation of the GSM A3A8 algorithm”. [24] D. Kock, “A Bluetooth security”, University Of Cape Town, Department Of Computer Science, Network Security. [25] Fexplorer official web site. Available at: http://www.gosymbian.com [26] J. D. HAAS, “Mobile security: SMS (& a little WAP)”, HAL 2001.Enschede. [27] C. Mulliner and G. Vigna, “Vulnerability analysis of MMS user agent”, 23rd third Chaos Communication Congress, Berlin, December 2006. [28] A. Solon, M. Callaghan, J. Harkin, and T. McGinnity, “Case Study on the Bluetooth Vulnerabilities in Mobile

[37] K. S. Siyan, TCP/IP, CampusPress, 2003. [38] Alexander, “Misuse Cases: Use Cases with Hostile Intent”, IEEE Software. Volume: 20. Issue: 1. p. 58-66. 2003 [39] Viega, J. McGraw, Building Secure Software: How to Avoid Security Problems the Right Way. 1st ed. AddisonWesley. 2001. [40] A. V. Lamsweerde, S. Brohez, R. De Landtsheer and D. Janssens, “From System Goals to Intruder Anti-Goals”, In Proceedings of the RE’03 Workshop on Requirements for High Assurance Systems (RHAS’03), Monterey (CA), Sept. 2003. [41] IEEE Recommended Practice for Software Requirements Specifications. IEEE Std 830-1998. [42] L. Cysneiros, J. C. S. P. Leite , “Using UML to Reflect Non-Functional Requirements”. Proceedings of the 2001 conference of the Centre for Advanced Studies on Collaborative research. [43] S. A. Tonu, “NFR Modeling with UML models. Thesis for the degree of Master of Applied Science in Electrical and Computer Engineering”, Waterloo, Ontario, Canada, 2006. [44] S. Supakkul, L. Chung, “A UML Profile for GoalOriented and Use Case-Driven Representation of NFRs and Frs.”,Third ACIS International Conference on Volume , Issue , 11-13 Aug. 2005 Page(s): 112 – 119. [45] J. Mylopoulos, L. Chung, and B. A. Nixon. “Representing and using nonfunctional requirements: A process-oriented approach” IEEE Transactions on Software Engineering, 18, 1992, pp.483–497. [46] L. Chung, B. A. Nixon, E. Yu, and J. Mylopoulos. “Non-Functional Requirements in Software Engineering” Kluwer, Academic Publishers, 2000.

[47] L. Cysneiros and J. do Prado Leite. “Non functional requirements: from elicitation to conceptual models”, IEEE Transactions on Software Engineering, May 2004. [48] S. A. Tonu, “Towards a Framework to Incorporate NFRs into UML Models”, Proceedings of IEEE WCRE Workshop on Reverse Engineering to Requirements (RETR), 2005. [49] S. Supakkul, L. Chung, “Integrating FRs and NFRs: A Use Case and Goal Driven Approach”, 2nd International Conference On software engineering. [50] Lihua Xu, Hadar Ziv, Thomas A. Alspaugh, and Debra J. Richardson, “An architectural pattern for non-functional dependability requirements”, The Journal of Systems and Software 79, (2006), pp.1370–1378.

[51] T. Gallagher, B. Jeffries, and L. Landauer, Chasser les failles de sécurité, Microsoft Press, 2007, Washington, USA, pp. 20-21. [52] Ike Elliott, Common VoIP Security Problem - Spoof Attacks, November 2007. [53] BlackBerry Security advisor, March 2007. [54] D. Geneiatakis, T. Dagiuklas1, C. Lambrinoudakis, G. Kambourakis and S. Gritzalis, "Novel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study", Computer Networks: The International Journal of Computer and Telecommunications Networking, Volume 51 , July 2007, pp. 2580-2593.

Towards a Mobile Applications Security Approach

back the guidelines for secure mobile applications .... storage, performance are quite limited comparing to .... 'telecom/cal.vcs' for the devices calendar file.

315KB Sizes 2 Downloads 223 Views

Recommend Documents

Secure Key Sharing towards Mobile Applications ...
provider may misuse sensitive data of client, thus securing data stored on cloud is of utmost importance. This paper ... The key design factors that a cloud-based secure key sharing system has includes : no additional server-side ... Various access c

Secure Key Sharing towards Mobile Applications ...
logic is required on the cloud provider end; easy data access; highly scalable key sharing among multiple authorized users; minimal ... credentials in its security definition for a CSP (Cloud Service Provider). Secret key sharing ... is developed whi

A Bidirectional Transformation Approach towards ... - Semantic Scholar
to produce a Java source model for programmers to implement the system. Programmers add code and methods to the Java source model, while at the same time, designers change the name of a class on the UML ... sively studied by researchers on XML transf

A Bidirectional Transformation Approach towards ... - Semantic Scholar
to produce a Java source model for programmers to implement the system. Programmers add code and methods to ... synchronized. Simply performing the transformation from UML model to Java source model again ... In: ACM SIGPLAN–SIGACT Symposium on Pri

Security Ontology proposal for mobile applications
phone to pay at point of sale. Moreover, 50% of ... there are two kinds of attacks, one session and multi- session. .... regular PC screens or laptops. The second ...

Security Ontology proposal for mobile applications
Asymmetric or Digital Signature whereas others are mobile specific like SIM locking for example. Obviously, class instances are different from those deployed in ...

Security Ontology proposal for mobile applications
The Vonage VT. 2142-VD phone from MOTOROLA receives SIP .... the business field, the time-to-market property of mobile applications and the large target ...

Customizing Mobile Applications - CiteSeerX
The advantage of Xrdb is that clients accessing a central server do not need a ..... The PARCTAB is a hand held wireless device that communicates with ...

Towards a Framework for Designing Applications ...
Key words: CAD tool, nanotechnology, fault tolerance. PACS: 1. Introduction. As an alternative to CMOS based designs, novel nanofabrics are being proposed based on a com- bination of lithographic processes and bottom-up self-assembly based manufactur

A Noble Design Approach towards Distributed System ...
heterogeneous applications to a single complete suite. The system ... With the rapid increase in usage of such. Systems ... a strong inclination towards development of Composite .... that service as though it were a standard Web Service. It.

A Noble Design Approach towards Distributed System ...
Organizations are having multiple EIS applications to cater to their business needs, ... Collaboration Models build around Service Oriented Architecture (SOA), which uses ... implementation to support multiple vendors & platforms and access legacy ..

Towards a Stratified Learning Approach to Predict ... - CSE IIT Kgp
10 years of citation history and to avoid aging factor in ci- tation analysis ... feature values which are still unobserved, e.g., new authors or new venues ...... better stand on the shoulder of giants. In JCDL, pages. 51–60, New York, USA, 2012.

Towards a High Level Approach for the Programming of ... - HUCAA
... except in the data parallel operations. ▫ Implementation based on C++ and MPI. ▫ http://polaris.cs.uiuc.edu/hta/. HUCAA 2016. 6 .... double result = hta_A.reduce(plus());. Matrix A Matrix B .... Programmability versus. MPI+OpenCL.

Towards a High Level Approach for the Programming of ... - HUCAA
Page 1 .... Build HPL Arrays so that their host-side memory is the one of the HTA tile ... Build an HTA with a column on N tiles of size 100x100. (each tile is placed ...

A declarative approach towards ensuring auto ...
Microsoft SQL Server ... is that we make minimum assumption about the browser and the platform. We discuss the approach taken by ...

Towards a Stratified Learning Approach to Predict ... - CSE IIT Kgp
The leading objective of this paper is to show that the above finding has significant consequences to early predic- tion of citation itinerary of scientific papers. Such a pre- diction scheme can be of significant interest not only for the scholars a

Customizing Mobile Applications
by convention, re-read configuration files when they receive the HUP signal; ... The X windowing system provides a server-based resource manager, Xrdb [3], ...

Towards Automating Security Compliance Value Chain.pdf ...
Towards Automating Security Compliance Value Chain.pdf. Towards Automating Security Compliance Value Chain.pdf. Open. Extract. Open with. Sign In.

A Task-based Approach to Mobile Information ...
their phones to access the Internet (Smith, 2012). This ... access the Internet through their mobile devices, even while at home and within .... based (Kim et al., 2002; Taylor et al., 2008). Thus query- based and goal-oriented approaches to mobile i