Leom_Research_Proposal

advertisement
Table of Contents
1. Introduction ............................................................................................................................ 3
1.1 Introduction ...................................................................................................................... 3
1.2 Rise of smartphone .......................................................................................................... 3
1.3 Risk of smartphone .......................................................................................................... 5
1.3 Introducing remote wipe .................................................................................................. 6
2. Research Question ................................................................................................................. 8
2.1 Theoretical attack on ADM ............................................................................................. 8
2.2 Formulating research questions ..................................................................................... 13
3. Research Scope .................................................................................................................... 15
4. Literature Review................................................................................................................. 17
4.1 Discussion on patents ..................................................................................................... 17
4.2 Number of overwrites .................................................................................................... 21
4.4 Flash translation layer .................................................................................................... 23
4.5 File system ..................................................................................................................... 23
4.6 Summary ........................................................................................................................ 24
Legal Authorities ..................................................................................................................... 26
References ................................................................................................................................ 27
Security Aspect of Remote Wiping in Android
Table of Figures
Figure 1: Remote wiping process in ADM. ............................................................................... 8
Figure 2: ADM web interface. ................................................................................................... 9
Figure 3: ADM app interface. .................................................................................................... 9
Figure 4: Erase device prompt ................................................................................................. 10
Figure 5: Web traffic between web browser and Google's web server.................................... 11
Figure 6: Capturing banking instruction in CSRF ................................................................... 12
Figure 7: Asking victim to execute the instruction .................................................................. 12
Figure 8: Web traffic between Smartphone and Internet ......................................................... 13
Page 2
Security Aspect of Remote Wiping in Android
1. Introduction
1.1 Introduction
From the year 2010 onwards, the world have witnessed tremendous growth in
smartphone sales and adoption. According to International Data Corporation report
(International Data Corporation 2014), in year 2013, worldwide market reached a milestone
where vendors have shipped over a billion smartphone worldwide. That's an increase of 38.4
percent on 2012′s 725.3 million shipments and more than double the 494.4 million smartphones
shipped in 2011. Subsequently this also further increase the penetration rates of smartphone
among worldwide population.
1.2 Rise of smartphone
The roots of the contemporary smartphone industry are rooted in the feature phones
industry that preceded it and still somewhat vibrant in many countries (Head 2013). The shift
from the earlier mobile devices, known as “feature phones” due to mostly being a sum of their
features, to devices labelled as “smartphones” with more cross functional usability has been
gradual and relatively seamless. Feature phone is generally known as mobile device which is
not running the four most popular smartphone operating system (OS) (Smith 2012, p. 2); iOS,
Android, BlacBerry, and Windows Phone. As new technological advances, the mobile device
industry will however keep shifting more and more towards these the so called smartphones.
This can be observed when global annual smartphone sales surpassed sales of feature phones
for the first time in 2013.
Many observed that smartphone industry starts to grow rapidly after the release of
Apple's iPhone back in 2007 (Paik & Zhu 2013, p. 10; Müller et al. 2013, p. 1). The term
“smartphone” was allegedly coined around 1997 (Müller et al. 2013, p. 1) and the first mobile
device that could be considered as smartphone shipped in 1999 (Raento, Oulasvirta & Eagle
2009, p. 429) while the first smartphone that began penetrate mobile device market was
arguably Nokia 6600 introduced back in 2003 that sold 2 million units in four months (Nuttall,
cited in Raento, Oulasvirta & Eagle 2009, p. 430) though the trend of radical changes that is
common in mobile device industry nowadays was said to be started since the introduction of
commercial 3G mobile device by NTT DoCoMo in 2001 (Hsieh & Hsieh 2013, p. 309).
Page 3
Security Aspect of Remote Wiping in Android
Many may ask, what exactly is a “smartphone”? Carayannis and Clark (2011, p. 212)
raised the issue on difficulty of finding an accurate description of the capabilities of this device.
Carayannis and Clark continued by stating smartphone should have following property:
intelligent, wireless, rich-media technologies, in the service of smarter business. The properties
stated are considered to be too generic as feature phone also can be considered to be “wireless”
and the property of “smarter business” means they can only applicable to researchers' own
paper. Raento, Oulasvirta, and Eagle (2009, p. 427) defined smartphone as “programmable
mobile device” and equipped with relatively sophisticated sensing capabilities, increasing
storage capacity, and built-in networking to access the Internet. Although the capabilities listed
are pretty reliable to differentiate from “feature phone”, but the term “programmable” is
confusing. Raento, Oulasvirta, and Eagle referred the programmability as ability that allows
subtle control over events taking place in the phone did not take the liberty to explain the
keyword “control” and “events”. Raento, Oulasvirta, and Eagle pointed out programmability
of mobile device allows research tools to be created flexibly. This is not applicable for general
consumer who uses smartphone for personal or business use. However, from consumer's
perspective, programmability can be interpreted as the ability to install additional application,
or commonly known as “app” in smartphone industry, to extend the functionality of a
smartphone. Thus, another property of a smartphone is extensibility (see Table 1 for
comparison).
Features
Feature Phone PDA
Smartphone
Personal organiser
Limited
Yes
Yes
Telephony
Yes
No
Yes
Sensors (e.g. gyroscope, accelerometer, compass, No
proximity, etc)
No
Yes
Storage capacity
Limited
Limited Large
Internet access
No
No
Yes
Table 1: Comparison for different types of mobile device
At the same time, computing power has been doubling on average every 1.5 years since
1975, outperforming even the Moore's Law (Intel Corporation 2006). This trend also given rise
to ever escalating computing power at lower cost (Markoff 2007). As an effect, smartphone
price is also on a downward spiral (The Economist 2009). Indeed, acquiring the latest top of
the range smartphone has never been drastically cheaper, however consumer can always
purchase previously most powerful smartphone that is still considered powerful enough at
Page 4
Security Aspect of Remote Wiping in Android
much lower price years later. Today, a smartphone has become a necessity for many of us: we
use it as an alarm, make schedules, check emails, saving memos, and communicate through
social apps (Park et al. 2013, p. 2). Most of these functions can be found in another type of
mobile device called Personal Digital Assistant (PDA). PDA basically provides electronic
version of personal organiser (e.g. diary, calendar, address book, to-do lists, note and memo
pads, and clock) (Anderson & Blackwood 2004, p. 4). Smartphone on other hand is a mobile
device that includes PDA functionality, since PDA mostly is not equipped with telephony or
cellular capability (Punja & Mislan 2008, p. 1) (see Table 1).
1.3 Risk of smartphone
Due to broad uses of smartphones for everyday life, many users knowingly and
unknowingly save in their phone much of their personal information such as e-mail passwords,
schedules, business documents, and personal photographs in their smartphones. Though the
portability of smartphone is convenient to carry, such compact device is also prone to loss and
theft. It is estimated there are 150,000 mobile device reported lost or stolen every year in
Australia (AMTA 2011). More than 30,000 mobile device have been stolen in London alone
at 2013 (Lynn & Davey 2014). Loss of smartphone be it accidental or theft expose user to loss
of any data stored on the device especially personal information.
With the advent of cloud storage service (e.g. Dropbox, Apple's iCloud, and Google
Drive) available to smartphone where data can be backed up automatically at frequently using
smartphone's always-on Internet connection, there is a fair chance that user could retrieve back
the information. But more serious issue is the information leakage or breach results from loss
of smartphone which could be detrimental if it falls in the wrong hands. More often than not,
the cost of the hardware or any purchased software is actually trivial compared to the cost of
information contained. In a study or social experiment conducted by Symantec (2012) where
50 smartphones were intentionally lost and then monitored for any access attempt. The report
showed 96 percent of the lost smartphones were accessed by the finders of the devices due
inherent curiosity of human nature. The report also highlighted the difficulty for owner to
regain possession of its lost smartphone as only 50 percent of the “lost” smartphones in study
were recovered through finders' attempt to contact despite the fact owner's contact information
was clearly shown on the phone.
Page 5
Security Aspect of Remote Wiping in Android
1.3 Introducing remote wipe
To mitigate the issue of data leakage, remote wiping feature has been introduced to
smartphone OS. This feature essentially allows owner to send a command remotely from
another location to its lost smartphone, and once the smartphone receives the command, it will
wipe the whole device or selected data. The command that is used to initiate the wiping
operation has been affectionately called “kill pill” (Caldwell 2011, p. 8) or “poison pill”
(Hansen 2010 , p. 3; Burnett, Friedman & Rodriguez 2011, p. 57). Reader well-versed in
business terms might refer “poison pill” as “shareholder rights plan” initiated to impose
financial burdens on a hostile buyer to acquire the firm (Ryngaert 1988, p. 377; Davis 1991, p.
583). But this definition is totally unrelated in this case. The term used here refers to a pill that
once swallowed would enable a person to end their life if they wished to do so (Rurup et al.
2005, p. 520). So, in the context of smartphone, “kill pill” essentially instruct the smartphone
to “kill” itself by destroying data.
Blackberry phone is well known to be used among US government official, so naturally
the phone operation must conform to government’s strict security policies. Remote wiping
feature has been introduced to Blackberry OS since version 4.2 which was estimated to be
released almost a decade ago. Version 4.0 was shipped in early December 2004 (Evers &
Johnston 2005, p. 3). On the other hand, remote wiping is introduced to Apple iPhone OS (now
called iOS) 3.0 through a service called “Find My iPhone” (Ogg 2009). However, at that time,
“Find My iPhone” service is only available to now-defunct MobileMe subscriber. MobileMe
was replaced by iCloud and discontinued from June 2012 onwards (Mayers & Lee 2011). It
was not until the release of iOS 4.2 released back in November 2010 (Apple 2010) when Apple
decides to offer “Find My iPhone” service for free (Aomoth 2010).
In August 2013, Google announced availability of Android Device Manager (ADM) to
devices running Android 2.2 or above (Poiesz 2013). ADM allows user to remotely ring, track,
and wipe its lost phone through Google Account website. ADM is subsequently updated to
allow user to remotely lock its phone by adding screen lock. ADM is then made available to
be accessible from an app so user can perform for instance, remote wipe through user's other
phone which is linked to the same account (Google n.d.). This announcement signify capability
Page 6
Security Aspect of Remote Wiping in Android
of finding and managing lost phone as official feature in Android which previously only
available through third-party app.
Page 7
Security Aspect of Remote Wiping in Android
2. Research Question
2.1 Theoretical attack on ADM
Figure 1: Remote wiping process in ADM.
Figure above show the process of initiating remote wipe through Android Device
Manager. The steps are outlined below:
1. User access to ADM either through web browser (see Figure 2) or Google official app
(see Figure 3). Then user choose “Erase” option to initiate remote wiping.
2. After user confirmation (see Figure 4), Google will send the wiping command.
3. Once the user's lost smartphone receives the command, data erasure shall commence.
Page 8
Security Aspect of Remote Wiping in Android
Figure 2: ADM web interface.
Figure 3: ADM app interface.
Page 9
Security Aspect of Remote Wiping in Android
Figure 4: Erase device prompt
Given the destructive nature of remote wiping feature, it has to be implemented securely
so that the erasure action on the smartphone itself can only be triggered by the owner or
authorised person. Supposedly the ADM is weakly implemented which allows an adversary to
send the wipe command to any smartphone, essentially wiping any smartphone that it wants.
Page 10
Security Aspect of Remote Wiping in Android
Figure 5: Web traffic between web browser and Google's web server
In these theoretical attacks, an adversary can spoof the command from two sources. The
first method is to spoof the request made by the user through ADM website or app. In this case,
attacker is targeting communication between the user and Google web server (see Figure 5). In
Internet environment, hacker has been using a technique called cross site request forgery
(CSRF) to spoof the request. To illustrate this technique, imagine a user called Bob is
transferring funds using online banking from account A to account B, both which are his own
accounts. Bob somehow managed to capture the command “TRANSFER FUND FROM MY
ACCOUNT TO ACCOUNT B WITH $100” that is sent to the web server to instruct the bank
to execute that transaction (see Figure 6). At the same time, Alice also login to the same online
banking website. Bob sends a web link (URL) to Alice which contains the command. When
Alice opens the link, the same instruction is sent to the web server (see Figure 7). Unbeknownst
to Alice, she had just transferred $100 from her own account to Bob's account B.
Page 11
Security Aspect of Remote Wiping in Android
Figure 6: Capturing banking instruction in CSRF
Figure 7: Asking victim to execute the instruction
Another way of spoofing the command is through “replay” attack. This is targeting
communication between Google web server and the smartphone (see Figure 8).
Page 12
Security Aspect of Remote Wiping in Android
Figure 8: Web traffic between Smartphone and Internet
If an adversary managed to capture the “wiping” command sent by Google, adversary can send
the same command to another smartphone to wipe it. “Replay attack” is capturing a message
or a piece of a message that is then used at a later time (Syverson 1994, p. 187). Froma another
perspective, this attack also can be launched to “replay” the request made by user to Google to
wipe its smartphone.
2.2 Formulating research questions
The potential ways of abusing ADM is not just limited to CSRF or replay attack.
Various ways shall be discussed in details in the section on the experiment setup. The purpose
of this research is to explore the potential misuse of ADM. Therefore, the question of this thesis
seeks to answer is:
1. Can remote wipe operation in Android Device Manager (ADM) be abused to wipe
other's Android phone?
Since there are two perspective that the abuse can happen as shown in Figure 5 and Figure 8.
In answering the above question, it can be divided into two sub-questions:
1.1. Can the remote wipe request made to Android Device Manager (ADM) system be
abused?
1.2. Can the remote wipe command sent by Android Device Manager (ADM) system be
Page 13
Security Aspect of Remote Wiping in Android
abused?
If the Android smartphone can be wiped through ADM without user's request, then this will be
a finding that show security weakness in ADM. In the event of such security weakness could
not be found, the limitation various attack techniques used will be discussed. There is also
another possibility that the wipe “command” itself could not be captured due to certain
implementations in place to prevent such message from being identified and extracted. Those
implementations shall be discussed as well.
There is another important question needs to be explored as well. After a lost smartphone has
been successfully wiped through ADM, is there any data left especially personal information?
There is a possibility that there could be traces of personal information left even after being
wiped. Therefore, this thesis also seeks to answer:
2. Can personal data be recovered after being remotely wiped?
If such traces of personal data are found left in the storage of the phone even after being wiped
through ADM, then this will be a finding that user's data is not protected from data leakage in
ADM. In the event of such data could not be found, it still does not show the data does not
exist, but it could be the limitation of the tools used. In that case, we can evaluate the popular
tools used to recover data in Android platform, thus creating a benchmark.
The aim of answering all the questions mentioned above is an attempt to determine any
security weakness in ADM. Regardless of such weakness can be found or not, it is hoped that
this research assist the existing smartphone industry not just Android platform to formulate
best practises in implementing the remote wiping feature.
Page 14
Security Aspect of Remote Wiping in Android
3. Research Scope
Although this research may be abstracted and applied as a means of discussing the
remote wiping process in any platform, it will only focus upon mobile phone, specifically the
smartphone. As discussed in <<Literature Review section>>, remote wiping feature can be
found smartphone platform, but this research will only focus upon Android platform. Current
smartphone market are largely dominated by four operating systems (OS) namely Google's
Android, Apple's iOS, Microsoft's Windows Phone, and BlackBerry (IDC 2014). Google
Android is chosen simply because it has the largest market share among those four most
popular smartphone OS in terms of unit shipment. It is estimated that Android controls 78%
(Gartner 2014) to 81% (IDC 2014) of the smartphone market share.
Remote wiping feature is usually implemented by the operating system thus it is a
software-level implementation. There is also existence of hardware-level implementation
introduced by Intel called Anti-Theft technology (Intel AT). Intel AT allows user to remotely
lock down its laptop equipped with supported hardware. The laptop including the hard drive
stays locked down even the hard drive has been removed (Caldwell 2011, p. 8; Intel 2010).
Although Intel AT and remote wiping shares the same purpose which is to prevent the data
stored inside the lost device from being accessed, since Intel hardware is mostly found in
desktop and laptop but rarely found in smartphone, it is beyond the scope of this research. Most
importantly, Intel AT will be discontinued January 2015 onwards (Intel 2013).
In another embodiment, remote wipe feature can be implemented in any wireless data
communication channel supported by the smartphone, such as Wi-Fi, Bluetooth, cellular
network, and so on. As discussed in <<Literature review>>, there are several patents granted
to telecommunication companies and mobile phone manufacturers. Those patents mostly focus
on remote wiping in the context of cellular network infrastructure. This research involves
intercepting traffic between a smartphone and the server which sends the “wipe” command.
Gathering data exchange in a cellular network is not without its challenges. The first issue is
that requirement of specialised hardware (McGowan, Dover & Kerber 1999). In order to
capture the data, researcher needs to set up a radio transmitter that function as a base transceiver
station (BTS) (Androulidakis 2011, p. 284). Since a mobile phone will connect to any base
station with stronger signal, a mobile phone can be manipulated to connect to researcher's
Page 15
Security Aspect of Remote Wiping in Android
“fake” base station by placing it near to the phone. By all means, such hardware can be acquired
with proper funding.
However, the biggest challenge is performing the interception without breaking the law
(Glendrange, Hove & Hvideberg 2010, p. 3). Since the mobile phone automatically connect to
a base station, how does researcher ensure that the “fake” base station is only connected by
researcher-controlled smartphone? There is a possibility that outsider's mobile phone which is
not part of the experiment somehow got connected to the “fake” base station. Thus, in such
scenario, researcher is considered to be eavesdropping somebody else traffic which is illegal
in Australia (Telecommunications (interception And Access) Act 1979). Researcher might
stumble upon this legal implication even though it is not researcher's intention. In contrast, in
Wi-Fi environment, researcher can set up an access point (AP) in such a way that a phone needs
to be manually triggered to connect the AP, thus preventing unwanted phone to connect it.
Thus, in this environment, researcher can make sure that only researcher's mobile phone is
intercepted. All in all, in analysing remote wipe command, it will only be attempted to extract
from Internet connection through Wi-Fi.
As mentioned in section (research question), one of the main aim of this research is to
explore the possibility of triggering “wiping” action by third-party in Android phone through
ADM without owner’s knowledge. This can be achieved through several hacking techniques.
In June 2014, many Australians found their iPhones had been remotely locked through Apple’s
Find My iPhone service, which is Apple’s counterpart of ADM. Although this highlights the
fact that similar incident could happen on ADM as well, but it should be noted that the cause
of that incident probably is due to user account compromise (Turner 2014). User account
compromise is not considered as a weakness in implementation of remote wiping in any OS,
thus this factor is out of scope of this research. On the side note, user can prevent adversary
from using his or her Google account (used in ADM) even though that account has been
compromised. This can be achieved through two-factor authentication currently offered by
Google (Higgins 2013).
Page 16
Security Aspect of Remote Wiping in Android
4. Literature Review
The advent of remote wiping feature had been a decade ago when it was introduced to
Blackberry OS. The underlying process could be similar so the purpose of this literature review
is to explore how remote wiping of mobile phone is done and what is the wiping method.
Literature searching is conducted on Google Scholar, ScienceDirect, and IEEEXplore using
the following search terms; remote (wipe OR wiping), (sanitize OR sanitization) mobile phone,
secure (erase OR delete) (flash OR NAND). Flash or NAND is used because that is the current
storage method in mobile phone.
4.1 Discussion on patents
There are several patents on designing a system that allow user to remote wipe its lost
phone. Angelo, Novoa, and Olarig (2003) designed a security system made up of user's portable
device and security station. The security station can be a computer or a data centre. When user
losses portable device, user can report to security station. Security station will then send
security message wirelessly to portable device where upon receive, will perform digital selfdestruction. The patent addresses potential security issue in each process, first by authenticating
the user who reported, having more than one person in operating the security station to
authorise sending the security message to address issue of rogue employee. The process then
moves on to use of various combinations of asymmetric key pair, symmetric keys, and digital
signature to secure the security message and authenticate the security station. In most basic
form, the patent suggested security station should encrypt the security message using device's
private key, then upon receive, device will decrypt using its public key to authenticate the
source of security message. Private key is suggested to be encrypted using user's password as
security station could be compromised. Concern of replay attack whereby adversary intercepts
a security message and retransmit to the same device, can be addressed by including unique
value which is changes every time possibly by using time-based one time password algorithm,
TOTP).
Blackberry Limited (formerly known as Research In Motion, RIM), holds similar
patent on remote wiping (Brown et al. 2011). Given the nature of Blackberry product, the
designed system shown in the patent focus on Mobile Device Management (MDM) and Bring
Page 17
Security Aspect of Remote Wiping in Android
Your Own Device (BYOD) in enterprise environment. The system allows each data types (e.g.
message, calendar, address book, etc.) to be set with authorisation level. So, when issue remote
wipe or encrypt command, the command includes indicator of authorisation level of issuer (be
it the user or IT support), so only the person with or exceed authorisation level is able to modify
the selected data types. The command can be issued only to selected data types. The
authorisation level is by server to construct IT policy that will be transmitted to mobile device.
The patent also mentions authentication of the server that issues the command. Server first
encrypts the command message and successful decryption by client device thus authenticates
the source of command. Then mobile device will flag the desired data to be wiped or encrypted.
The security of the flag is mentioned that it should not be removable so adversary cannot
circumvent the wipe command.
Blackberry Limited also holds another patent whereas remote wiping can be triggered
through voice mail. The purpose of the design is to extend features found in voicemail system.
In the case of lost device, owner can call the lost device and being prompted to leave voicemail
message. The system will authenticate the user with password and once valid password is
entered, voicemail system will provide variety of options. From the options, owner can choose
wipe option, once selected, voicemail server will request network server (either provided by
carrier or owner's enterprise) to send wipe command to the lost device. There is no mention of
verification between voicemail server and network server as the patent assume both servers
should be trusted entity of each other. Verification between network server and mobile device
is also not mentioned.
The next patent although is not related to remote wipe, but it is a lost device
management. The patent is hold by Acco Brands, a manufacturer of office product (Cavacuiti
& Merrem 2003). The purpose of the system is to alert user when user's portable device is
spaced apart from user by distance exceeding predetermined threshold. The system involves a
transmitter attached to the portable device and a receiver which user carry. The transmitter will
transmit the signal to the receiver in interval and receiver will calculate the distance. If the
distance is too far, receiver will alert the user. There is consideration of encoding the signal to
uniquely identify the transmitter. The system does not involve what will happen to the
Page 18
Security Aspect of Remote Wiping in Android
mislocated portable device. This patent has been implemented in Acco's Kensington Proximo1,
although there are other similar third-party products made by start-up company such as Tile2,
SticknFind3, and Gecko4.
Sony Ericsson, a mobile phone company (currently known as Sony Mobile, a wholly
owned subsidiary of Sony) holds a patent in remote disabling mobile device (Gajdos & Kretz
2006). The patent is about the process of disabling a mobile device through cellular network
connection (e.g. GSM and CDMA). Verification is performed using asymmetric keys (control
centre encrypts with its private key, mobile device decrypt using control centre's public key),
but only for mobile device to verify identity of control centre. After verification is done, control
centre sends disabling data to mobile device. Disabling data can be comprised of instruction to
disable at least one functionality of the phone or enabling certain functionality such as tracking
and software update or enabling back disabled functionality. The patent mentions remote
wiping and wiping through overwriting with only zeros or ones. But the wiping is only for
removing program instructions to permanently disable certain functionality. Verification of
user's identity can be done through username/password. (SyncML) (overide disable command)
Nokia, a mobile phone company, holds a patent in remotely disable personal data in
mobile device (Kenney 2005).
The system assume deployment in cellular network
infrastructure. The system allow user to request the operator of cellular network to disable/erase
the lost cellular phone.. Upon successful verification of the person reported (through password
or security question), cellular network will broadcast disable signal to the phone. The disable
signal can be made up of commands to disable keypad, blank screen, sound alarm, and erase
data. After the commands have been executed by phone, phone will reply signal to verify the
commands have been successfully disabled. Verification between device and cellular network is
not considered.
1
http://www.kensington.com/kensington/us/us/s/3068/proximo.aspx
http://www.thetileapp.com/
3
https://www.sticknfind.com/
4
http://geckotag.me/
2
Page 19
Security Aspect of Remote Wiping in Android
Toshiba Japan holds a patent in which the system allows remote wiping command to
be triggered via e-mail. The designed system allows device owner to send an email that will be
received by the device for remote wiping. The user has to initially set-up a password and
security level in its device. The security level is to set which data should be erased if remote
wipe command is received or it can be simply locking the device. In the case of lost device,
owner will send an email with password in the header field, then when the device receive the
email, check whether is there any password attached in header field. If there is no password, it
will be treated as normal email. If there is password attached, device compares it to the
password stored in memory (previously set by owner), and if the password is valid, proceed
with erasing data.
AT&T, a telecommunication company based in US, holds a patent where a system
allows remote disablement of mobile device (Sennett & Daly 2013). The patent focus around
infrastructure of cellular network given the nature of its holder. The system mainly focus on
method to send disable command to the mobile device. The command is sent in a form of
disable signal through any communication link in PSTN. The signal can be sent with unique
address so it may only receive by intended device or received by all device but processed only
by intended device. Upon receiving of disable signal, mobile device will broadcast
authentication request in which cellular network respond with authentication signal. This is
confirm sender of disable signal is authorised to order a disablement. The mobile device can
be any device which meets the criteria specified in the patent. The disablement only targets the
CPU and memory storage but the mobile device may be designed in such a way that it relies
on CPU and memory to access the network. The disablement can be permanent/non-reversible
or non-destructive by erasing flash memory or firmware. The disablement can be a 'lockout'
which the mobile device can be enabled back with valid password.
Good Technology, a provider of MDM solution holds a patent involving a system to
protect data in portable electronic device (Muratov & Foley 2007). The data is encrypted and
valid password must be entered upon powering on (if exceeding grace period) to decrypt the
data. If password attempt exceed user-defined limit or the device is not synced within a userdefined period, the encrypted data is erased. The encryption key gets regenerated each time
user enters valid password. The patent did not specify encryption algorithm although Blowfish
Page 20
Security Aspect of Remote Wiping in Android
is mentioned. It is also not mandatory to hash the password, although MD5 is mentioned.
Erasure method is also not mentioned, although bit-wiping is mentioned but not bit-wiping
algorithm.
Onyon, Stannard, and Ridgard (2007) holds a patent regarding mobile phone auto
destruct. The patent is about a system that allow user to remotely wipe or encrypt lost device.
The system allows user to initially activate remote wipe feature on a phone through a website
or an app. User can request web server to issue wipe command to lost device but it also can be
sent to the device via specially formatted SMS or email or network connection. There is no
mention of specific wireless communication link. Alternative method is to let the device poll
the server at an interval if any remote wipe command is pending. The verification between
device and server is through digital certificate where initial set-up may be configured with
server's certificate. The system also consider situation where attack repeated reboot the phone
upon receipt of wipe command. The system also allow override function where upon receive
wipe command, device prompts for override code, and terminate wipe command if entered
correctly. System also allow user to configure scope of data to be wipe. SyncML
4.2 Number of overwrites
Most of the patents mentioned above did not describe wiping method, except for a few
which mentioned overwriting data with zeros or ones, or 'bit-wiping'. It is popularly agreed that
erasing data should involve overwriting the original data to make it unrecoverable (Gutmann
1996; Garfinkel & Shelat 2003, p. 19) or sanitising it (Hughes & Coughlin 2006; Wei et al.
2011, p. 2). Data sanitisation can be performed using a software running in operating system
(OS) or firmware based such as ATA's Secure Erase (Hughes & Coughlin 2002). US National
Institute of Standards and Technology (NIST) (Kissel et al. 2012, pp. 28-29) and Australian
government (2014, p. 147) recommends ATA's Secure Erase command if available, otherwise
overwrite at least once in its entirety. Some (Garfinkel & Shelat 2003, p. 21; Joukov,
Papaxenopoulos & Zadok 2006, p. 62) agreed overwriting once is adequate enough. Number
of times data should be overwritten has been subject of controversy (Wright, Kleiman &
Sundhar 2008) especially when Gutmann (1996) suggested 35 times or passes. Gutmann (2003)
later clarified that a few passes should be fine and 35 passes is only suggested due to
consideration of wide range of hard drive encoding methods. Garfinkel and Shelat (2003, p.
Page 21
Security Aspect of Remote Wiping in Android
21) argued Gutmann's demonstration of possibility in recovering data even after overwriting it
once was possible because older hard drives have some gap between 'tracks' but the gap is nonexistent in modern high-density hard drives.
4.3 API-based overwriting
However many researchers argued that simple overwriting might not be applicable in
mobile phone environment due to difference in file system layout and storage technology.
Mobile phone storage is usually flash-based as opposed to magnetic spinning hard drive.
Difficulty of data overwriting is due to use of wear levelling in Flash Translation Layer (FTL)
to distribute write access across flash storage (Spreitzenbarth & Holz 2010, p. 166).
Specifically, flash-based writes new or newer data to another valid physical location while
original location is simply marked as 'invalid' (Shin 2012, pp. 257-258). This is known as outof-place update which contrast to in-place update that writes new data to on top of original.
Thus, original content is preserved even with overwrite request. Spreitzenbarth and Holtz
(2010, pp. 170-172) developed a secure deletion tool running on Symbian. The tool is
demonstrated by overwriting personal data (contacts, calendar entries, and SMS message)
using Symbian API (Application Programming Interface). To evaluate the effectiveness of the
tool, forensic acquisition is performed on the phone and personal data allegedly could not be
found. However, since only official API is used thus there was no modification to the platform,
Spreitzenbarth and Holtz did not address how wear-levelling would affect the operation of the
developed tool. Spreitzenbarth and Holtz also did not specify how thorough data recovery is
performed.
Reardon et al. (2012) also proposed secure deletion method using the OS API on
Android. Reardon et al. developed an app that monitors the amount of free space and fill it with
random data. This is to ensure those unwanted data which has been marked as invalid is filled
with random data to achieve random deletion. Reardon et al. tested the effect of their app on
deletion latency, storage device lifetime and power consumption. Although performance
difference was calculated but the effectiveness of the proposed method was not shown. Albano
et al. (2011) proposed using standard linux commands (e.g. cp, rm, dd) to selectively modify
data in Android, without using any cryptographic primitives or kernel modules that will raise
suspicion during a forensics analysis. Their process involved first copying mtd5 partition
Page 22
Security Aspect of Remote Wiping in Android
(which stores user's installed app and data) to external SD, zero the mtd5 while selectively
modify/delete the data in external SD, move the data in external SD back to mtd5 and zero the
external SD. However, the proposed method requires Busybox to be installed (which provides
the standard linux commands mentioned). Installing Busybox requires the user to have root
privilege. Rooting Android device not only void the warranty but also may be abused by
malware to cause more harm (Pieterse & Olivier 2013, p. 4). Kang, Park, and Kim (2013)
proposed more efficient method of data wiping in mobile phone by overwriting only part of
the data that will render it unidentifiable instead of overwriting the whole data. Kang, Park,
and Kim demonstrated their method on JPEG, BMP, FLV, DOC and XLS while comparing
the time taken for their method against entire file wiping method on Android phone. However,
it could not be determined whether authors' data recoverability test and performance test are
conducted on the same device, especially type of data storage.
4.4 Flash translation layer
Shin (2012) explored the feasibility of implementing secure deletion in different FTL
scheme based on the scheme design. The factors considered including effectiveness and
performance. Shin concluded although some current scheme allow effective implementation
but limited by low performance. Shin finally proposed the need of new FTL scheme which
allow effective and good performance implementation. Wei et al. (2011) developed a new FTL
scheme that overwrite unused copies of data with zeros. The developed FTL scheme works by
re-program unused cell to flip remaining ones to zeros. However, Wei et al. pointed out their
approach could result in program disturb subsequently results in bit errors. Reardon et al (2012,
p. 9) criticised this approach because reprogramming operates outsides of specification
although Wei et al. (2011, p. 9)argued that impact of reprogramming varies between devices
and some might have no effect.
4.5 File system
Rather than modifying the FTL scheme, many researchers instead focus on file system
instead. Log-structured file system especially YAFFS (Yet Another Flash File System) is
chosen due to wide usage in flash storage of Android phone. YAFFS is the default file system
for Android since the release of first Android device (Hoog 2011, p. 141) until Google
announced the move to EXT4 starting Android 2.3 (Google 2010). Lee et al. (2010) proposed
Page 23
Security Aspect of Remote Wiping in Android
a scheme randomly generate keys to encrypt file, store them in file headers while making sure
those file headers are in a same block using “unbalanced binary hash tree” algorithm. With this
scheme, a file can be securely deleted by erasing the file header block (which stores the key).
Lee et al. (2011) extended the scheme to perform standard data sanitisation methods prescribed
by US government agencies. So, Lee at al. designed a scheme that will overwrite the data before
erase operation (previous work was erase operation only) without involving additional
operations in which previous work had to performed. So, they claimed their design is more
secure and efficient than previous work albeit through theoretical calculation and without
actual implementation. On the other hand, Reardon et al. (2013) criticised the scheme proposed
by Lee et al. (2010) for just purely conceptual and will cause too much wear on flash memory.
Reardon et al. also pointed out their previous work (Reardon et al. 2012) also too costly in
terms of flash memory wear and execution time. Reardon et al. proposed a scheme that is
similar to Lee et al. scheme (2010) where each data block is encrypted with a key and the key
is purged when the data block is no longer in used. The proposed scheme encrypted each block
of data with distinct 128-bit AES key in counter mode. IV (initialisation vector) is not used due
to distinct key. The scheme is implemented in UBIFS (Unsorted Block Image File System),
another log-structured file system. The modified file system is then implemented in Android.
Reardon et al. conducted various tests including wear analysis, power consumption, and I/O
performance.
4.6 Summary
From the patents discussed, there is a consensus among inventors of using asymmetric
cryptography to authenticate server which sends the remote wipe command. This is can be
practically implemented through Transport Layer Security (TLS) which has been commonly
implemented to secure the traffic between client and web server in the form of HTTPS
(Hypertext Transfer Protocol Secure) (Rescorla 2000). TLS is the successor of Secure Sockets
Layer (SSL) (Geer 2003, p. 14). Then, there are several articles which suggest using OS API
or standard linux command to perform the wiping without modification to the platform or the
underlying architecture such as file system. Although there was suggestion on more efficient
implementation, it is doubted that the wiping time is practical. Then there are several
modification proposals to FTL and file system. However, the proposals are more suitable for
file deletion activity occurs during daily mobile phone usage, compared to remote wiping
which involves erasing the whole data in mobile phone.
Page 24
Security Aspect of Remote Wiping in Android
The availability of ADM (Android Device Manager) means that virtually all Android
phone is equipped with remote wipe feature. Without any security in place, in worst case
scenario, this can results in mass remote wipe. Although this is not likely to happen, but it is
still necessary to inspect the security aspect of the remote wipe feature. Third-party Android
app which offers remote wiping feature has been available for years and yet as far as author
concern, there has not been studies conducted on the feature in Android platform.
Page 25
Security Aspect of Remote Wiping in Android
Legal Authorities
Telecommunications (Interception and Access) Act 1979 (Cwlth), s 7.
Page 26
Security Aspect of Remote Wiping in Android
References
Albano, P, Castiglione, A, Cattaneo, G & De Santis, A 2011. 'A novel anti-forensics
technique for the android OS', in International conference on broadband and wireless
computing, communication and applications (BWCCA), IEEE, pp. 380-385.
AMTA 2011, Lost and stolen phones, Australian Mobile Telecommunications Association,
viewed 6 June 2014, <http://www.amta.org.au/pages/Lost.and.stolen.phones>.
Anderson, P & Blackwood, A 2004, 'Mobile and PDA technologies and their future use in
education', JISC Technology and Standards Watch, vol. 4, no. 3, pp. 3-33.
Androulidakis, I 2011, 'Intercepting Mobile Phone Calls and Short Messages Using a GSM
Tester', in Computer networks, Springer, Berlin, pp. 281-288.
Angelo, M, Novoa, M & Olarig, S 2003, After the fact protection of data in remote personal
and wireless devices, US20030065934A1, USA.
Aomoth, D 2010, App of the week: Find my iPhone, TIME, viewed 15 June 2014,
<http://techland.time.com/2010/11/23/app-of-the-week-find-my-iphone/>.
Apple 2010, iOS 4.2 software update, Apple, Inc, viewed 15 June 2014,
<http://support.apple.com/kb/DL1061>.
Australian Signals Directorate 2014, 2014 information security manual, .
Brown, MK, Brown, MS, Little, HA & Totzke, SW 2011, Selectively wiping a remote device,
US008056143B2, USA.
Burnett, RD, Friedman, M & Rodriguez, RP 2011, 'Managing laptop security', Journal of
Corporate Accounting & Finance, vol. 22, no. 5, pp. 53-61.
Caldwell, T 2011, 'The mobile ‘kill pill’ – poison or panacea?', Computer Fraud & Security,
vol. 2011, no. 10, pp. 8-12.
Carayannis, E & Clark, S 2011, 'Do smartphones make for smarter business? the smartphone
CEO study', Journal of the Knowledge Economy, vol. 2, no. 2, pp. 201-233.
Cavacuiti, J & Merrem, R 2003, Loss prevention system for portable electronic devices,
US20030043036A1, USA.
Davis, GF 1991, 'Agents without principles? the spread of the poison pill through the
intercorporate network', Administrative Science Quarterly, vol. 36, no. 4, pp. 583-613.
Evers, J & Johnston, CJ 2005, 'Chapter 1: System Architecture', in Professional blackberry,
Wiley Publication, Indianapolis, USA, pp. 3-18.
Gajdos, T & Kretz, M 2006, Method for disabling a mobile device, EP1725056A1, EU.
Garfinkel, SL & Shelat, A 2003, 'Remembrance of data passed: A study of disk sanitization
practices', IEEE Security & Privacy, vol. 1, no. 1, pp. 17-27.
Gartner 2014, Gartner says annual smartphone sales surpassed sales of feature phones for
the first time in 2013, Gartner Inc, viewed 8 June 2014,
<http://www.gartner.com/newsroom/id/2665715>.
Geer, D 2003, 'Taking steps to secure web services', Computer, vol. 36, no. 10, pp. 14-16.
Page 27
Security Aspect of Remote Wiping in Android
Glendrange, M, Hove, K & Hvideberg, E 2010, 'Decoding GSM', Master's thesis, Norwegian
University of Science and Technology, Trondheim, Norway.
Google n.d., Android device manager, Accounts Help, viewed 21 April 2014,
<https://support.google.com/accounts/answer/3265955?hl=en>.
Google 2010, Saving data safely, viewed 29th April 2014, <http://androiddevelopers.blogspot.com/2010/12/saving-data-safely.html>.
Gutmann, P 2003, Secure deletion of data from magnetic and solid-state memory, viewed
27th March 2014, <https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html>.
Gutmann, P 1996. 'Secure deletion of data from magnetic and solid-state memory', in
Proceedings of the sixth USENIX security symposium, USENIX, .
Hansen, CK 2010, 'Technology trends in mobile communications how mobile are your data?',
Invited Paper for the IEEE Reliability Society Annual Technology Report.IEEE Transactions
on Reliability, vol. 59, pp. 458-460.
Head, M 2013, 'Word of mouth in social learning: The effects of word of mouth advice in the
smartphone market', Master's thesis, Aalto University, Töölö, Helsinki, Finland.
Higgins, P 2013, How to enable two-factor authentication on twitter (and everywhere else),
EFF, viewed 15 June 2014, <https://www.eff.org/deeplinks/2013/05/howto-two-factorauthentication-twitter-and-around-web>.
Hoog, A 2011, Android forensics: Investigation, analysis and mobile security for google
android, Syngress, Waltham, MA.
Hsieh, J & Hsieh, Y 2013, 'Appealing to internet-based freelance developers in smartphone
application marketplaces', International Journal of Information Management, vol. 33, no. 2,
pp. 308-317.
Hughes, GF & Coughlin, TM 2006, Tutorial on disk drive data sanitization, Center for
Magnetic Recording Research (CMRR), UC San Diego.
Hughes, GF & Coughlin, TM 2002, 'Secure erase of disk drive data', IDEMA Insight
Magazine, p. 22.
IDC 2014, Smartphone OS market share, Q1 2014, International Data Corporation, viewed 7
June 2014, <http://www.idc.com/prodserv/smartphone-os-market-share.jsp>.
Intel 2013, Laptop security and intel anti-theft technology, Intel Corporation, viewed 7 June
2014, <http://www.intel.com/content/www/us/en/architecture-and-technology/anti-theft/antitheft-general-technology.html>.
Intel 2010, Intel anti-theft technology, Intel Corporation, viewed 7 June 2014,
<http://download.intel.com/pressroom/kits/vpro/core/pdf/IntelAT_ProductBrief.pdf>.
Intel Corporation 2006, Moore's law and intel innovation, Intel Corporation, viewed 5 June
2014, <http://www.intel.com/content/www/us/en/history/museum-gordon-moore-law.html>.
International Data Corporation 2014, Worldwide smartphone shipments top one billion units
for the first time, according to IDC, International Data Corporation, viewed 22nd March
2014, <http://www.idc.com/getdoc.jsp?containerId=prUS24645514>.
Page 28
Security Aspect of Remote Wiping in Android
Joukov, N, Papaxenopoulos, H & Zadok, E 2006. 'Secure deletion myths, issues, and
solutions', in Proceedings of the second ACM workshop on storage security and survivability,
ACM, pp. 61-66.
Kang, S, Park, K & Kim, J 2013, 'Cost effective data wiping methods for mobile phone',
Multimedia Tools and Applicationspp. 1-13.
Kenney, T 2005, Systems and methods that provide user and/or network personal data
disabling commands for mobile devices, US20050186954A1, USA.
Kissel, R, Scholl, M, Skolochenko, S & Li, X 2012, Guidelines for media sanitization, NIST
Special Publication 800-88.
Lee, B, Son, K, Won, D & Kim, S 2011, 'Secure data deletion for USB flash memory.',
Journal of Information Science & Engineering, vol. 27, no. 3, pp. 933-952.
Lee, J, Yi, S, Heo, J, Park, H, Shin, SY & Cho, Y 2010, 'An efficient secure deletion scheme
for flash file systems.', Journal of Information Science & Engineering, vol. 26, no. 1, pp. 2738.
Lynn, G & Davey, E 2014, 'Black market' for stolen smartphones exposed, BBC, viewed 6
June 2014, <http://www.bbc.com/news/uk-england-london-26979061>.
Markoff, J 2007, Intel says chips will run faster, using less power, The New York Times,
viewed 5 June 2014,
<http://www.nytimes.com/2007/01/27/technology/27chip.html?_r=0&ei=5087&em=&en=59
a4d10473c4a8c8&ex=1170046800&pagewanted=print>.
Mayers, S & Lee, M 2011, 'From MobileMe to iCloud', in Learn OS X lion, Apress, New
York, pp. 245-253.
McGowan, R, Dover, RD & Kerber, KD 1999, Method and apparatus for intercepting calls
in a communications system, US5937345, USA.
Müller, MU, Medyckyj-Scott, D, Cowie, A, Heuer, T & Roudier, P 2013. 'Current status and
future directions of mobile GIS', in Proceedings of the SIRC NZ 2013 - (GIS and remote
sensing research conference), University of Otago, Dunedin, New Zealand, pp. 1-6.
Muratov, AV & Foley, RE 2007, Method and system for protecting data within portable
electronic devices, US007159120B2, USA.
Ogg, E 2009, Updated: IPhone OS 3.0 now available, CNET, viewed 15 June 2014,
<http://www.cnet.com/news/updated-iphone-os-3-0-now-available/>.
Onyon, R, Stannard, L & Ridgard, L 2007, Remote cell phone auto destruct,
US20070056043Al, USA.
Paik, Y & Zhu, F 2013, The impact of patent wars on firm strategy: Evidence from the global
smartphone market, Harvard Business School.
Park, M, Choi, Y, Eom, J & Chung, T 2013, 'Dangerous wi-fi access point: Attacks to benign
smartphone applications', Personal and Ubiquitous Computingpp. 1-14.
Pieterse, H & Olivier, MS 2013. 'Security steps for smartphone users', in Information security
for south africa, 2013, IEEE, pp. 1-6.
Page 29
Security Aspect of Remote Wiping in Android
Poiesz, B 2013, Find your lost phone with android device manager, Android Official Blog,
viewed 21 April 2014, <http://officialandroid.blogspot.com/2013/08/find-your-lost-phonewith-android.html>.
Punja, SG & Mislan, RP 2008, 'Mobile device analysis', Small Scale Digital Device
Forensics Journal, vol. 2, no. 1, pp. 1-16.
Raento, M, Oulasvirta, A & Eagle, N 2009, 'Smartphones an emerging tool for social
scientists', Sociological Methods & Research, vol. 37, no. 3, pp. 426-454.
Reardon, J, Capkin, S & Basin, D 2013, Data node encrypted file system: Efficient secure
deletion for flash memory, Department of Computer Science, ETH Zurich.
Reardon, J, Marforio, C, Capkin, S & Basin, D 2012. 'User-level secure deletion on logstructured file systems', in Proceedings of the 7th ACM symposium on information, computer
and communications security, ACM, pp. 63-64.
Rescorla, E 2000, HTTP over TLS, RFC 2818, viewed 4 May 2014,
<https://tools.ietf.org/html/rfc2818>.
Rurup, ML, Onwuteaka-Philipsen, BD, Wal, Gvd, Heide, Avd & Maas, PJvD 2005, 'A
"suicide pill" for older people: Attitudes of physicians, the general population, and relatives
of patients who died after euthanasia or physician-assisted suicide in the netherlands', Death
Studies, vol. 29, no. 6, pp. 519-534.
Ryngaert, M 1988, 'The effect of poison pill securities on shareholder wealth', Journal of
Financial Economics, vol. 20, no. 1, pp. 377-417.
Sennett, DWA & Daly, BK 2013, Remote disablement of a communication device,
US008375422B2, USA.
Shin, I 2012, 'Secure file delete in NAND-based storage', International Journal of Security &
its Applications, vol. 6, no. 2, pp. 257-260.
Smith, A 2012, 46% of american adults are smartphone owners: Smartphone users now
outnumber users of more basic mobile phones within the national adult population, Pew
Research Center’s Internet & American Life Project, Washington.
Spreitzenbarth, M & Holz, T 2010. 'Towards secure deletion on smartphones.', in 5th
conference of the GI special interest group “Sicherheit, schutz und zuverlässigkeit”,
Gesellschaft für Informatik e.V. (GI), pp. 165-176.
Symantec 2012, Symantec smartphone honey stick project, Symantec Corporation, viewed 2
June 2014,
<https://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=symantecsmartphone-honey-stick-project>.
Syverson, P 1994. 'A taxonomy of replay attacks [cryptographic protocols]', in Proceedings
of computer security foundations workshop VII (CSFW 7), IEEE, pp. 187-191.
The Economist 2009, The boom in smart-phones: Cleverly simple, The Economist, viewed 5
June 2014, <http://www.economist.com/node/14563636>.
Turner, A 2014, Apple iCloud users urged to change passwords as hackers target iDevices,
The Sydney Morning Herald, viewed 12 June 2014, <http://www.smh.com.au/digital-
Page 30
Security Aspect of Remote Wiping in Android
life/computers/gadgets-on-the-go/apple-icloud-users-urged-to-change-passwords-as-hackerstarget-idevices-20140611-zrwzy.html>.
Wei, MYC, Grupp, LM, Spada, FE & Swanson, S 2011. 'Reliably erasing data from flashbased solid state drives', in 9th USENIX conference on file and storage technologies (FAST),
USENIX, pp. 1-13.
Wright, C, Kleiman, D & Sundhar, S 2008, 'Overwriting hard drive data: The great wiping
controversy', in Information systems security, Springer, pp. 243-257.
Page 31
Download