3 MOBILE SECURITY
PLATFORM ASSESSMENT
In the previous section, three of the most important
mobile security platforms were analyzed for better
understanding of the topics discussed below. This
section will define the most known vulnerabilities
and weaknesses of these operating systems by using
the following methodology schema:
Implementation Failures.
File System Failures.
Native Application Failures.
Communication Failures.
Bluetooth Failures.
MMS (Multimedia Messaging System)
Failures.
3.1 Symbian OS
Nowadays, Symbian OS is considered the most
attacked operating system on the market, followed
by far by Windows Mobile (Heath, 2006). This
experience is translated into a robust security
platform with a really small number of
vulnerabilities.
Implementation failures, also known as bugs, are
one of the most important loopholes in any operating
system. However, the wide range of this attack
vector exceeds the scope of this assessment, and it
will only analyze file system and native application
failures, which have been considered the most
relevant and harmful inside of a mobile phone.
Currently, the number of known Symbian OS
implementation vulnerabilities is really small or
non-existent.
Communications failures are the most recent
loopholes in any operating system, because the
growing evolution of the mobile phones involves the
creation of weak communications protocols adapted
to user requirements. Bluetooth and MMS failures
are the most known Symbian OS failures, but they
need to use social engineering techniques for
exploiting the mobile phone. The problem of the
social engineering techniques is that the mobile
phone user carries all the liability and the security
platform cannot perform any countermeasure.
Furthermore, Bluetooth attacks have a wide range of
varieties listed below (Gostev, 2008):
Bluetooth Propagation (Cabir/29.A).
Operating System Infection (Skulls).
Phonebook Access and MMS Propagation
(Commwar).
3.2 Windows Mobile
Windows Mobile is nowadays one of the most
important mobile operating systems. This
importance is due to Microsoft Windows
predominance on the computer market and the
current growing number of devices with this
platform.
File system failures are the most dangerous case of
implementation failures because their presence are
extended to all mobile phones with the involved
operating system, but they are also the most cost-
effective to fix because only one patch release can
be applied to all the involved operating systems. A
sample of this type of vulnerability is described
below:
Bypassing the code-signing protection in
Windows Mobile is relatively easy because, once
a mobile phone user accepts the installation of a
normal application, provided by Visual Studio
but used with malicious purposes
(
SDKCerts.cab), any installed application
signed with a special certificate
(
SDKSamplePrivDeveloper.spc) will have
full privileges (Moreno, 2008).
Native applications failures are the existing
implementation failures in each system application
and excluding third-party applications. These
failures are less dangerous than the previous type,
but the profitability to fix these failures will depend
on the number of existing application instances. If a
majority uses an application, the released patch will
be cost-effective. Some samples of these failures are
the numerous cases of denial of service in
ActiveSync and PIE (Pocket Internet Explorer)
(Dunham, 2009).
Bluetooth and MMS (Bluetooth, 2009) (MMS,
2003) are considered one of the main
communication failures in any operating system, but
in fact, it is commonly used for spreading malicious
applications. However, Bluetooth is vulnerable to
driver-level attacks and BD_ADDR Spoofing attacks
(Moreno, 2009) and MMS has some vulnerabilities
via shellcode-based applications in MMS Client and
Composer (Dunham, 2009).
3.3 iPhone OS
As we discuss in the previous section, iPhone OS is
a single-user operating system. However, the only
system user is the root account and all the
applications are running with no restrictions.
Implementation failures are the only existing
failures in the iPhone OS, because the
communications protocols are very restrictive and
ASSESSMENT OF MOBILE SECURITY PLATFORMS
131