Redwall. Technologies LLC

Similar documents
F5 Network Security for IoT

Architecture of Industrial IoT

SIX STEPS TO BUYING DATA LOSS PREVENTION PRODUCTS

What is TEMPEST Chapter 1

Turn on the entertainment.

IoT and the Implications for Security Inside and Outside the Enterprise. Richard Boyer CISO & Chief Architect, Security

IOT TECHNOLOGY AND ITS IMPACT

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )

T : Internet Technologies for Mobile Computing

The new HD video monitor from CAME

ipass Open Mobile 2.0 for Android Quick Start Guide

PRODUCT BROCHURE. Gemini Matrix Intercom System. Mentor RG + MasterMind Sync and Test Pulse Generator

ClickShare The one click w he one click onder w

MR20. Datasheet MR20. Dual-band, ac Wave 2 access point delivering entry-level enterprise wireless for small businesses and SOHO deployments

LITE. TV Antenna DVR with Dual-Band WiFi QUICK START GUIDE

Securing IoT in the Enterprise

Building Your DLP Strategy & Process. Whitepaper

The TRIAX Group 2018, TRIAX A/S

CONTENTS. Using Your Remote Getting Started Using your Whole Home DVR Video on Demand Pay Per View Search...

ClickShare. The one click wonder

Networks of Things. J. Voas Computer Scientist. National Institute of Standards and Technology

SecureFTP Procedure for Alma Implementing Customers

SOTI Brand Guidelines 2013

ITU-T Y.4552/Y.2078 (02/2016) Application support models of the Internet of things

PRODUCT BROCHURE. Broadcast Solutions. Gemini Matrix Intercom System. Mentor RG + MasterMind Sync and Test Pulse Generator

Delaware Division of Libraries Update A presentation at the joint Delaware Library Association/ Maryland Library Association Annual Conference 2013

ATSC 3.0 Next Gen TV ADVANCED TELEVISION SYSTEMS COMMITTEE 1

User Guide. MonitorMix User Guide 1

Evolution of STB. January Prepared for the CRE by

A New Family of Smart ihome Products

Explore your new TiVo Service only from Cogeco

MicroVision Investor Presentation September Don t just think outside the box. See outside the box.

How to Categorize Risk in IoT

Internet of Things Telecommunication operator perspective

Cable TV Quick Start Guide. Enjoy your Midco cable TV experience to the fullest with these helpful tips.

Company Overview. September MICROVISION, INC. ALL RIGHTS RESERVED.

MR70. Datasheet MR70. Dual-band, ac Wave 2 ruggedized access point delivering basic enterprise wireless for outdoor or low-density deployments

Device Management Requirements

ONSIGHT CONNECT FOR SMARTPHONES GUIDE

Smart Pianist Manual

If it s not FULL Stack it s not a CPaaS

QUICK-START GUIDE LET S JUMP RIGHT IN

DM DiagMon Architecture

WINDOWS GUIDE LIBRESTREAM.COM

Frequently Asked Questions

Cable TV Quick Start Guide. Enjoy your Midco cable TV experience to the fullest with these helpful tips.

Five-Input Universal Switcher with Wireless Presentation Link

Recognizing Stalking in Intimate Partner Cases. Part I: Recognizing Stalking in Intimate Partner Violence Cases 8/8/2017

Plug into simplicity

Meraki MR Access Point

IMPORTANT! This instruction guide explains how to install your CCTV system.

Cable TV Quick Start Guide. Enjoy your Midco cable TV experience to the fullest with these helpful tips.

Title VI in an IP Video World

SOTI Brand Guidelines 2012

82" 82Q6FN. Bezel Color: Eclipse Silver Stand Color: Eclipse Silver Bezel-free Design

TERMS AND CONDITIONS FOR USE OF MTN PROTECT SERVICE

DOWNLOAD OR READ : THE UNDOING OF ARLO KNOTT PDF EBOOK EPUB MOBI

Mirth Solutions. Powering Healthcare Transformation.

Is Now Part of To learn more about ON Semiconductor, please visit our website at

Digital Materials on Your Mobile Device

GaAs, MMIC Fundamental Mixer, 2.5 GHz to 7.0 GHz HMC557A

RFFM V TO 5.0V, 4.9GHz TO 5.85GHz a/n/ac FRONT END MODULE

IERC Standardization Challenges. Standards for an Internet of Things. 3 and 4 July 2014, ETSI HQ (Sophia Antipolis)

Winrar for windows 7 32 bit with crack

Installation Guide. Wireless Display Receiver

Coverage where you need it, made easy!

Altum Series DATASHEET

Y10 LED lamp screen wireless group control solution

RUCKUS IoT SUITE DATA SHEET BENEFITS

Bulbs ATRIA SIRIUS VEGA USER GUIDE

Boundless 360 Design Bezel Color: Carbon Silver Stand Color: Carbon Silver Bezel-free Design

BAS70 series; 1PS7xSB70 series

Linux+Zephyr: IoT made easy

Security of the Internet of Things

Lip Sync of Audio/Video Distribution and Display

User Manual V2.6. Omniksol WIFIKIT User Manual. Omnik New Energy Co., Ltd.

HDMI Over CAT5 Receiver at 50 Meters

Datasheet. 5 GHz Carrier Radio with LTU Technology. Model: AF 5XHD. Up to 1+ Gbps Real Throughput, Up to 100 km Range

98" 98Q900RA. UltraWide Viewing Angle Ambient Mode Boundless 360 Design Bezel Color: Black Stand Color: Black Bezel-free Design

Evaluation of Barco ClickShare CSE-800 Wireless Presentation System

Bezel Color: Eclipse Silver Stand Color: Eclipse Silver Bezel-free Design

Performance Measurement in the Omnichannel Environment Ian Jacobs, Principal Analyst

Kindle Paperwhite User Manual Guide To Enjoying Your Ereader

Security Challenges in the Internet of Things. Dr. Sigrid Schefer-Wenzl

Fios Internet & TV for Business User Guide

Features. Parameter Min. Typ. Max. Units

MR53. Datasheet MR53. Dual-band ac Wave 2 access point with separate radios dedicated to security, RF management, and Bluetooth

ST2110 Why Is It So Important?

Bridging the Trust Gap for Mobile BYOD Deployments. Ojas Rege, VP Strategy, MobileIron Professional Techniques D12

GymConnect Retrofit Module

ValuNet Android ManageMyTVs Application User Guide

82" Bezel-free Design The feet design on 82" screen size varies slightly from the featured image.

Pairing code for element

Features. = +25 C, IF = 0.5 GHz, LO = +15 dbm* Parameter Min. Typ. Max. Min. Typ. Max. Units

IoT Evidence Acquisition Issues and Challenges

Internet of things (IoT) Regulatory aspects. Trilok Dabeesing, ICT Authority 28 June 2017

AW900mT. User s Manual. Point-to-multipoint. Industrial-grade, ultra-long-range 900 MHz non-line-of-sight wireless Ethernet systems

OPERATION NEXTERDAY COMPTEL FINANCIAL RESULTS Q4 AND Juhani Hintikka, CEO Helsinki, 18 th of February COMPTEL CORPORATION 2016

NetUP IPTV Solutions for Hotels

The Omnichannel Dilemma: Everyone Wants It, But How Do You Start?

Transcription:

Redwall Technologies LLC Redwall Mobile : Secure Mobile Technology Quick Brief 2015 Redwall Technologies LLC This material is for information purposes only and does not constitute and offer to sell any goods or services. Dissemination, distribution, copying or communication of this material without the approval of Redwall Technologies is strictly prohibited. REDWALL MOBILE is a registered trademark of Redwall Technologies LLC. All rights reserved. All other trademarks are the property of their respective owners.

Problem: Present and growing mobile threats Malware infected as many Android devices as it did personal computers in the second half of last year Malware found in top apps on Google Play Store Over one in three of all Android owners are likely to encounter threats on their device this year Malware records voice, intercepts emails, and more, and is not stopped by encryption or antivirus tools Current security measures such as MDMs, security apps, sandboxing, and hypervisors have been wholly ineffective against attackers Possible Unwanted Programs (PUPs), Trojans, Viruses, and other Malware (4K mobile samples/day) Mobile Malware Growth 2013 2014 Q2 2014 Q4 2015 Q2 Redwall Technologies 2

Android is used in more and more devices Redwall Technologies 3

Our offensive work inspired a new defensive technology Wide variety of systems but mobile got really interesting Containers do not address malware or data leakage, and apps must be ported to vendorspecific solutions They are, after all, just apps Cloud solutions have extreme connectivity requirements Hypervisors and RTOSs don't help at the level most attacks occur, and they have high development costs and long times to market TrustZone, dual-personas, and virtualization just pour complexity into a second "container," merely moving the problem, and not solving it Redwall Technologies LLC 4

Offensive work includes Android malware Developed under contract for US government customer Installs implant using Webkit or other flaws, then downloads malware Demo implant available that records ambient audio, steals photos and other data Redwall Mobile blocks our own exploits, as well as those from hackers and researchers S4 with Redwall Mobile Stops Threats Redwall Technologies LLC Redwall Technologies LLC 5

The multiple device problem Because we have multiple missions throughout the day And we switch from role to role and theatre to theatre Because we need to separate and protect data at different levels of security And because we had no other practical choice until now Redwall Technologies LLC 6

Key risks we are addressing with our novel solution Audio spy Room or ambient audio Active or OTA audio VoIP, voice notes, and other audio Location spy GPS WiFi (IP etc.) Other triangulation Data spy Stealing data (e.g. emails, photos, passwords, SMS) Inserting or changing data Mobile malware Roque apps Trojans Kernel and Android exploits Rooting or reflashing Redwall Technologies LLC 7

Solution: New approach to mobile security Military-grade security on a consumer device Clear domain separation to prevent information leakage Unclassified CLASSIFIED Security level of military equipment in a familiar commercial device Multiple, adaptable mission and theatre-specific modes on a single COTS device (turns one physical device into many separate devices) User experience consistent with consumer smartphones Protects phone (or other device) against hackers, eavesdropping, known and unknown malware threats and more using unique, patentpending techniques Keeps sensitive data encrypted and isolated from untrusted apps and networks both while stored and transmitted 2015 Redwall Technologies LLC 8

Like carrying several devices at once, each with its own apps, policies, features, and capabilities Play store Camera GPS Authentication Personal Use Games, Twitter, Gmail, Facebook, and other personal apps Y Y Y None Choose one: Personal Enterprise Restricted Secret Secure Enterprise Install approved apps only from Play Store, no location services Restricted Personal Banking and financial apps only, multifactor authentication required Some Y N PIN Y Y Y Passcode Restricted Secret Comm A encrypted voice and data app only for communicating with highly trusted parties N N N PIV card Multiple policies now define multiple modes on the device Each can operate at different levels, with different capabilities and levels of trust, different file systems, etc. Temporal isolation, biomorphics, and other patent-pending techniques provide protections that virtualization and hypervisors cannot Redwall Technologies 9

The same paradigm applies to a wide range of devices Accept commands Allow data access Take pictures Accept commands Allow data access Take pictures Alice s data Speed alerts Outgoing handsfree Location reports Bob s data Speed alerts Outgoing handsfree Location reports Charlie s data Speed alerts Outgoing handsfree Location reports Redwall Technologies 10

And many, many more Redwall Technologies 11

Key advantages Behavioral vs taxonomic analysis Not looking for specific threats, viruses, files, or patterns, but rather any behavior not allowed in the policy Policies Temporal in addition to cryptographic and other isolation methods Sandboxing, virtualization, etc. cannot provide this level of isolation Allows for both static and dynamic policy definition Device and app support Moves easily to new devices without the re-engineering efforts involved in porting virtualization or hypervisor solutions Apps run as they are from the Play Store - no container or specialized API required Biomorphics... 2015 Redwall Technologies LLC 12

Diversity through research in Biomorphics Humans have it Devices do not Redwall devices do! P τ (f)= 4τP 0 1+(2πfτ) 2 mod tε fh,ε(x, y) = εex,y L x,yε(εu)ϕ(x)du 0 = h Lx,zϕ(x)ρx(dz) [ ( 1 tε + h Ey L x,y x (s)ϕ(x)ds tε tε ( tε tε 0 + 1 tε Ey L x,y x (s)ϕ(x)ds Ex,y 0 0 = h Lxϕ(x) + hθε(x, y) 3 τ=0 P τ G = ( m v t ) ) Lx,zϕ(x)ρx(dz) )] L x,yε(εs)ϕ(x)ds x1 = δ(x2 x1) x2 = rx1 x2 x1x3 x3 = x1x2 bx3 r δ(δ + b +3) δ b 1 ρ (H2 0,t) Attacks on one phone do not work on others Used in cryptography, DPA resistance, and other defenses Redwall Technologies 13

Thank you! For licensing options or more information, please contact us through our website. Redwall is also happy to meet any customization and development needs of your agency or company. Redwall http://www.redwall.us 2015 Redwall Technologies LLC This material is for information purposes only and does not constitute and offer to sell any goods or services. Dissemination, distribution, copying or communication of this material without the approval of Redwall Technologies is strictly prohibited. REDWALL MOBILE is a registered trademark of Redwall Technologies LLC. All rights reserved. All other trademarks are the property of their respective owners.