<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; Smart Mobility</title>
	<atom:link href="https://javacard.vetilles.com/tag/smart-mobility/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>e-Smart is back &#8230;</title>
		<link>https://javacard.vetilles.com/2009/09/19/e-smart-is-back/</link>
		<comments>https://javacard.vetilles.com/2009/09/19/e-smart-is-back/#comments</comments>
		<pubDate>Sat, 19 Sep 2009 13:54:13 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[e-Smart]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[smart card]]></category>
		<category><![CDATA[Smart Mobility]]></category>
		<category><![CDATA[Smart University]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=440</guid>
		<description><![CDATA[It&#8217;s that time of the year when summer turns in to fall (rather violently around here), and when smart card R&#038;D people gather in Sophia Antipolis for the Smart Event. I will be present throughout the week, with quite a busy schedule, between my own participations and the interesting sessions that I want to hear. [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>It&#8217;s that time of the year when summer turns in to fall (rather violently around here), and when smart card R&#038;D people gather in Sophia Antipolis for the Smart Event. I will be present throughout the week, with quite a busy schedule, between my own participations and the interesting sessions that I want to hear.</p>
<p>Let me get you a biased timeline for this week, from Tuesday to Friday.<br />
<span id="more-440"></span></p>
<p>Let&#8217;s start by Tuesday:</p>
<ul>
<li>The <a href="http://www.strategiestm.com/conferences/smart-event/09/smart-university/program_javacard.htm" class="liexternal">Java Card 3.0 Programming</a> course at <a href="http://www.strategiestm.com/conferences/smart-event/09/smart-university/program.htm" class="liexternal">Smart University</a> lasts all Tuesday and Wednesday. My personal contribution in it is about security, on Tuesday afternoon. That should keep me busy for a full half-day.</li>
<li>If you are into contests (or if you are broke; this event is free), the new <a href="http://www.simagine.info/" class="liexternal">SIMagine</a> contest will be launched with a <a href="http://www.strategiestm.com/conferences/smart-event/09/workshops/index.htm#" class="liexternal">full-day conference</a> on Tuesday. This is not a Gemalto contest any more, but a wider contest, which is not limited to cards any more (even though I guess that involving a card in this could be a good idea). If you have a good mobile security idea (with a SIM card), that could be of interest.</li>
</ul>
<p>Wednesday will be very busy, in particular because there are events on the side of the main conferences:</p>
<ul>
<li>In the morning, the Java Card Forum organizes a meeting with academia, to see how we can help in promoting research about Java Card 3.0. This event is invitational, but if you are an academic, present at e-Smart, and you are interested, you are welcome at 10:00AM (I am not sure of the room, but I am sure that there will be an indication; follow the JCF logo).</li>
<li>In the morning, I like the title of Jacques Bus&#8217; keynote speech, <a href="http://www.strategiestm.com/conferences/smart-event/09/e-smart/program.htm#opening" class="liexternal">Trust in digital life</a>. I usually skip keynotes, but I may attend that one.</li>
<li>In the afternoon, There are also interesting speeches at e-Smart. First, one of my colleagues, Guillaume Dufay, talking about a formal model of really open cards (old topic, with a new twist), <a href="http://www.strategiestm.com/conferences/smart-event/09/e-smart/program.htm#p1a2" class="liexternal">around 3:00PM</a>. Later in the afternoon, there will also be a speech from G&#038;D about a secure runtime in the mobile; finally, Trusted Logic has a competitor in that field, moving forward to prove its interest.</li>
<li>Finally, almost all of <a href="http://www.strategiestm.com/conferences/smart-event/09/smart-mobility/program.htm" class="liexternal">Smart Mobility</a>&#8216;s <a href="http://www.strategiestm.com/conferences/smart-event/09/smart-mobility/program.htm#p1a1" class="liexternal">afternoon sessions</a> sound interesting, for various reasons. Tough choices ahead &#8230;</li>
</ul>
<p>Thursday will not be dull either, although I will finally be able to fully focus on the conferences:</p>
<ul>
<li>The <a href="http://www.strategiestm.com/conferences/smart-event/09/e-smart/program.htm#p2m1" class="liexternal">morning</a> at e-Smart will be a combination of NFC Security and Trusted Personal Devices. Two topics of interest for me, so I may be surfing between sessions.</li>
<li>Smart Mobility will bring us some discussions about the NFC ecosystems (TSMs and more), and about user experience. Interesting, but I have the feeling that there a few more new things at e-Smart (I may be wrong, though).</li>
<li>The first part of the afternoon is a no-brainer, at least for me. I will be on the stage, talking about Java Card 3.0 and Smart Card Web Server Security. My co-presenters, from Gemalto/Eurosmart and from Inside, will also have interesting speeches about cloud computing and about convergence.</li>
<li>If this is not you cup of tea, the <a href="http://www.strategiestm.com/conferences/smart-event/09/e-smart/program.htm#p2a1" class="liexternal">other session</a> of e-Smart could be very interesting, about state-of-the-art security. I am likely to join that session after break.</li>
<li>On the Smart Mobility side, my choice would go to the <a href="http://www.strategiestm.com/conferences/smart-event/09/smart-mobility/program.htm#p2a2" class="liexternal">Mobile banking</a> session, but mostly because I know about mots of the things presented in the other session.</li>
</ul>
<p>Friday is morning only, but that is quite a dense morning:</p>
<ul>
<li>At e-Smart, it is the <a href="http://www.strategiestm.com/conferences/smart-event/09/e-smart/program.htm#p3m1" class="liexternal">Java Card</a> session. The first part is quite introductive, with the amusing PlaySIM project (already discussed <a href="http://javacard.vetilles.com/2009/06/04/live-from-j1-the-playsim-project/" class="liinternal">here</a>). The second part includes two speeches about attacks; expect to find me there.</li>
<li>In parallel, Smart Mobility has a special TL session, with 4 consecutive speakers from Trusted Logic and Trusted Labs. I may miss some of them because of the Java Card session, but they are all worth it.</li>
</ul>
<p>Finally, I will try to be connected, like usually in conferences. I will be on Twitter (<a href="http://twitter.com/evetillard" class="liexternal">evetillard</a>), with the tag <a href="http://twitter.com/#search?q=%23esmart" class="liexternal">#esmart</a> (join me using it), and I will also try to blog live about the most exciting things.  </p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2009/09/19/e-smart-is-back/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Smart Mobility: Mobile Application Security</title>
		<link>https://javacard.vetilles.com/2008/09/17/smart-mobility-mobile-application-security/</link>
		<comments>https://javacard.vetilles.com/2008/09/17/smart-mobility-mobile-application-security/#comments</comments>
		<pubDate>Wed, 17 Sep 2008 09:18:51 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Smart Mobility]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2008/09/17/smart-mobility-mobile-application-security/</guid>
		<description><![CDATA[Part of the Smart Week, the Smart Mobility conference has started this morning. I am speaking in the afternoon, about a comparison of access control in mobile application frameworks. In support to this talk, I will write a few posts on this topic, ans also try to follow a little what happens at the conference. [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Part of the Smart Week, the <a href="http://www.strategiestm.com/conferences/smart-mobility/08/program.htm" class="liexternal">Smart Mobility</a> conference has started this morning. I am speaking in the afternoon, about a comparison of access control in mobile application frameworks. In support to this talk, I will write a few posts on this topic, ans also try to follow a little what happens at the conference.</p>
<p>This first post is about the complexity mobile application security. Without even trying to find solutions to anything, I will describe why this problem is difficult, and why it is really difficult for any actor to propose a good solution.</p>
<p>First, let&#8217;s start by a little game. Do you think that the following things should be allowed for mobile applications?</p>
<ul>
<li>A mapping application that continuously sends your position to a remote server to provide guidance.</li>
<li>An application that can modify its behavior without any notice to the operator or end-user.</li>
<li>An application that can be granted more permissions than the ones it was signed for.</li>
<li>A signed application that includes a well-known virus.</li>
</ul>
<p>The answers after the jump.<br />
<span id="more-155"></span></p>
<p>Of course, all of this has happened, and we can&#8217;t accuse small start-up companies for doing this:</p>
<ul>
<li>Google Maps offers to track you using your embedded GPS or, if you don&#8217;t have one, using the identification of mobile cells. Google warns you that the application will generate a lof of data traffic, but not really that you are being tracked by a company that has the reputation to exploit every it of data that comes through its servers.</li>
<li>Yahoo has a widget framework, in which widgets can be updated deynamically during their execution, without telling anybody. I don&#8217;t want to pinpoint Yahoo, because I am sure that many widget frameworks allow this in one way or another. The main idea is here that, if code is consdered as data, it becomes difficult to control it.</li>
<li>I will not tell you the details, but there is a very simple way to assign permissions to a signed Java application, even if it has not requested it. Just perfect for Trojan horses!&#8221;</li>
<li>In Windows Mobile, the signature of an application simply verifies the identity of the person/entity who submitted the application. Of course, in such conditions, malware is getting signed, both by mistake or purposedly.</li>
</ul>
<p>If we move to principles, there are a few common assumptions that don&#8217;t hold very well:</p>
<ul>
<li><strong>Signatures are safe.</strong> In cryptographic terms, signatures are difficult to forge. But the only thing that a signature tells you is that somebody (with access to a private key) has signed a given content. A signatue by itself does not provide any guarantee about the content.</li>
<li><strong>Interpreted applications always run on a sandbox.</strong> Usually, this is quite true. However, running in the sandbox means that the application will only do what it has been authorized to do. If it gets extended permissions, it may be authorized to wipe all your contacts or to block your SIM card. Who knows?</li>
<li><strong>Applications cannot be updated.</strong> This is mostly true for native applications, and also for &#8220;standard&#8221; interpreted application like Java or .Net. However, if we move to widget frameworks, this doesn&#8217;t hold any more, and update are in fact quite frequent (and quire practical, in most cases).</li>
<li><strong>Servers should be trusted.</strong> If  you still think that, it is time to get a security training. Clients should not trust servers more than servers trust clients. Mutual authentication should be the norm.</li>
</ul>
<h2Actors of mobile applications</h2>
<p>In order to understand the security of anything, it is very important to understand who the stakeholders are. In the case of mobile security, this is very much the heart of the problem. The monst commonly mentioned actors are:</p>
<ul>
<li><strong>The device manufacturer.</strong> There is always at least one device manufacturer, and in some cases, there may be more than one (for instance if you consider the SIM card as a device).</li>
<li><strong>The mobile operator.</strong> The mobile operator is present and unique in most cases. In some cases, for instance when there is a <a href="http://en.wikipedia.org/wiki/MVNO" rel="nofollow" class="liwikipedia">MVNO</a>, there may be more than one; in some other cases, for instance with an iPod Touch, there may be none.</li>
<li><strong>The end user.</strong> There is always an end-user, who is the person in front of the screen and keyboard. For simplicity, we will only consider single-user devices, since this use case is by far the most common on mobile phones.</li>
<li><strong>The application providers.</strong> An application provider is responsible for an application. Application providers may be specialized actors, or they may just be a role of another actor.</li>
</ul>
<p>The device manufacturers and mobile operators are fairly well-known actors, and their roles are quite natural (respectively, providers of a device and of a mobile network service). The two other actors are not as clearly defined. Let&#8217;s start by the application providers. An application provider may be:</p>
<ul>
<li><strong>A device manufacturer.</strong> Today&#8217;s devices usually come with many bundled applications, to manage contacts, agenda, and more, or to offer a few basic games. The manufacturer then acts as application provider for these applications.</li>
<li><strong>A mobile operator.</strong> Many devices sold through operators are customized by the operator. Initially, operators simply customized the look and feel, but they are now embedding more and more applications. For these applications, usually branded by the operator, the operator acts as application provider.</li>
<li><strong>Third parties.</strong> Naturally, applications can in most cases be selected and loaded by the end-user. This selection may happen on the manufacturer or operator portal, but most likely, the applications will come from somewhere else, for instance from a Web site, who proposes to install an application.</li>
</ul>
<p>The end user also seems easy to define  as the guy who uses the device. However, this end user has relationships with all the other actors:</p>
<ul>
<li><strong>As a mobile service subscriber.</strong> As such, the end user is under contract with a mobile operator.</li>
<li><strong>As a device owner.</strong> This is a simple relationship, but the end-user usually has accepted some usage terms when purchasing the device.</li>
<li><strong>As an application user/service subscriber.</strong> This relationship comes from buying an application, or subscribing to a service that includes an application (for instance, a chat service).</li>
</ul>
<p>You may consider that distinguishing between these roles is not important. However, it starts to be important when you consider the assets that are at stake in the relationships, as each relationship considers different assets.</p>
<h2>Assets</h2>
<p>The next important item in order to reason about security is the list of the assets to be protected. Every actor needs to protect its own assets.</p>
<p>Let&#8217;s start by the device manufacturer, which is an easy one. The manufacturer&#8217;s assets are usually embedded in the device itself. The first such asset is the device&#8217;s design and code, whose integrity must be protected on the device&#8217;s itself. Confidentiality is often desirable, but it is often difficult to achieve on the device (and also elsewhere, actually). One of the challenges for device manufacturers is that thec deo embedded in a mobile device often comes from several providers. On top of the code, the device usually manages some data, whose integrity needs to be protected as well. Some of these requirements, such as the protection of the <a href="http://en.wikipedia.org/wiki/IMEI" rel="nofollow" class="liwikipedia">IMEI</a>, are actually legal requirements, as this number uniquely identifies a device, and is used as a countermeasure against theft. Finally, most devices include cryptographic keys. Some of these keys are public keys, used to verify signatures, whose integrity needs to be protected. Some other keys are secret keys, for instance used to encrypt data on the device, and their confidentiality also needs to be protected.</p>
<p>The operator&#8217;s assets are also very important. The main asset of the operator is the network and all network-related information. The access to the network must be controlled at all times, in order to verify that the device/user is actually allowed to use the network, and to perform a given operation on that network. This of course requiresamong other things some authentication, which involves sensitive cryptographic keys. Operators don&#8217;t store these directly on the device; instead, they store their sensitive information on the SIM card, which they own, and which is inserted in the phone. The same SIM card may also be used to store some other sensitive information; in particular, it is used to store thepublic key  certificates that the operator uses to verify the signatures of mobile applications.</p>
<p>From the application provider&#8217;s point of view, the code of the application is an important asset, whose integrity needs to be protected. Application providers would also like to protect the confidentiality of their code, but this is more difficult to achieve in practice. The application&#8217;s data sometimes needs to be protected, but this protection is under the direct responsibility of the application itself, as the platform can only provide limited guarantees. The platform usually only guarantees the integrity of meta-data, such as the file descriptors in a filesystem, which cannot be accessed by applications. Confidentiality is often difficult to achieve, unless it is managed by some secure element, like the SIM card.</p>
<p>The end-user also has many assets. As a mobile subscriber, the end user expects to keep the privacy of its subscription information, such as the MSISDN (phone number). Similarly, the location information, for instance the current cell identifier, needs to be considered confidential. As a device user, the end user wants to protect the privacy of its private data (pictures, videos, messages), as well as the confidentiality of location information, and of the device identifier. As an application user, the integrity of the application data should be protected, as well as its confidentiality in some cases (depending on the application itself). These constraints apply both to the information stored in the device, and to the information transmitted by the card.</p>
<h2>Threats</h2>
<p>Now that we have identified the stakeholders, their assets, and the security constraints on these assets, the next step is to look at the threats on these assets, as perceived by the various stakeholders. Some of the threats are universally recognized. Phone theft is one such threat: all actors agree that this needs to be countered, even though some actors may actually gain from it. Similarly, everybody agrees that an end-user who steals airtime is a threat, as well as an application that steals data from the end-user (for instance, a game that copies the user&#8217;s contacts). Some other threats are less obvious. An end-user using content without DRM is usually not considered as a problem, and applications that disclose sensitve user data are also widely accepted. In each case, the definition of threats greatly depends on the point of view of the actor. Building an exhaustive catalog of threats is difficult, but we can look at a few specific ones.</p>
<p>Let&#8217;s first consider stolen phones. The end-user bears most of the costs related to phone theft. When it occurs, the user loses a device, but also the assets on the phones. In addition, it may be possible for the thief to actually (mis)use the applications on the phone. This particular issue needs to be addressed by application providers, by providing a way to limit the abuse of applications (for instance by blocking it), and by being able to replace an application (and its data?) on a new device. The theft issue can also be addressed by the network operator, for instance by being able to replace the phone by a phone with the same configuration.</p>
<p>The next threat we can consider is the abuse of the network by customers. The obvious victim is here the network operator, who at least loses some business. In the worst case, the integrity of the network could be compromised. Such a threat is normally impossible at the application level, or it would at least require a considerable amount of permissions. The standard APIs defined in application frameworks usually don&#8217;t allow applications to circumvent network access controls. This means that such threats will rely on malware that directly accesses low-level features, and consequently, that interpreted frameworks are better protected, because they usually don&#8217;t provide any way to access these low-level features. There are other cases in which network abuse can be a threat to the end-user. If an application (malware) includes a Trojan horse that transforms a phone into a spambot, the end-user may not be aware that the application is using the network, a least until his next bill arrives. However, even in such a case, and especially if the attack is widespread, it is quite likely that operators will bear at least a part of the attack&#8217;s cost, as they will need to waive some of the costs incurred by their customers. </p>
<p>Another kind of threat is the abuse of an application by an end-user. For instance, a customer may access protected content illegally by intercepting an information stream after decryption by the application, or by modifying the application to make it send the protected application to another application. Such attacks obviously target application providers, or more widely, content providers. Protection may here come from signatures and integrity protections, but basically, the application providers need to rely on the mobile device&#8217;s application framework and basic platform to provide security services.</p>
<p>The last threat we will consider is an application that discloses data. The victim is in many cases the end-user, and possibly the operator. The data that may be leaked includes operator data, such as connection-related data or network data, or more likely end-user data such as location information, contact information, pictures, videos, <em>etc</em>. The two potential issues are here the privacy/confidentiality of the information disclosed, and the potential legal issues linked to the disclosure and/or aggregation of the data (for instance, in France, large databases need to be declare to a control authority).</p>
<h2>What about the application?</h2>
<p>The idea has been here to show the complexity of the security constraints on mobile applications. Here, the main issue is that mobile applications may be both the attacker and the victim, depend on the issue.</p>
<p>If you consider a mobile application as a potential attacker, there are things that you can do. First, the application framework may enforce a lot of protections, for instance based on access control. Then, the operator may impose a security policy, and require the application provider to prove the inocuity of his application before to sign the application. Third-party laboratories may be used in such a certification scheme.</p>
<p>If you consider the mobile application as the vistim, the options are more limited. In particular, the application is responsible for protecting its assets, and the security policy is necessarily application-dependent, and necessarily relies on the application&#8217;s specification. In such a case, it is much more difficult to verify the application of the policy, and most application providers are not ready to assume the costs associated to such a certification.</p>
<p>In future posts, we will look at permissions and access control mechanisms, and also to certification schemes that are available to application providers and mobile operators.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2008/09/17/smart-mobility-mobile-application-security/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
