+ All Categories
Home > Documents > Mobile Handsets: A Panoramic Overview

Mobile Handsets: A Panoramic Overview

Date post: 21-Jan-2016
Category:
Upload: prisca
View: 75 times
Download: 5 times
Share this document with a friend
Description:
Mobile Handsets: A Panoramic Overview. Adam C. Champion and Dong Xuan Department of Computer Science & Engineering The Ohio State University. Outline. Introduction Mobile Handset Architecture Mobile Handset Operating Systems Networking Applications Mobile Handset Security. - PowerPoint PPT Presentation
Popular Tags:
31
Mobile Handsets: A Panoramic Overview Adam C. Champion and Dong Xuan Department of Computer Science & Engineering The Ohio State University
Transcript
Page 1: Mobile Handsets:  A Panoramic Overview

Mobile Handsets: A Panoramic Overview

Adam C. Champion and Dong XuanDepartment of Computer Science &

EngineeringThe Ohio State University

Page 2: Mobile Handsets:  A Panoramic Overview

Outline

• Introduction• Mobile Handset Architecture• Mobile Handset Operating Systems• Networking• Applications• Mobile Handset Security

Page 3: Mobile Handsets:  A Panoramic Overview

Mobile Handset Definition

• Mobile handsets (mobiles): electronic devices that provide services to users:– Internet– Games– Contacts

• Form factors: tablets, smartphones, consoles

• Mobile: your next computer system

Page 4: Mobile Handsets:  A Panoramic Overview

Mobile Handsets: Business

• Meteoric sales and growth:– Over 4 billion mobile phone users [1]– Over 5 billion mobile phone subscriptions

[2] (some people have multiple phones)–Mobile handsets & industries: $5 trillion

[3]• Mobile phones are replaced every 6

months in S. Korea (just phones) [4]• We can’t ignore these numbers• Note: mobiles are computer systems

Page 5: Mobile Handsets:  A Panoramic Overview

What’s Inside a Mobile Handset?

Source: [5]

Page 6: Mobile Handsets:  A Panoramic Overview

Handset Architecture (1)

• Handsets use several hardware components:– Microprocessor– ROM– RAM– Digital signal processor– Radio module– Microphone and speaker– Hardware interfaces– LCD display

Page 7: Mobile Handsets:  A Panoramic Overview

Handset Architecture (2)

• Handsets store system data in electronically-erasable programmable read-only memory (EEPROM)–Mobile operators can reprogram phones

without physical access to memory chips• OS is stored in ROM (nonvolatile

memory)• Most handsets also include subscriber

identity module (SIM) cards

Page 8: Mobile Handsets:  A Panoramic Overview

Handset Microprocessors

• Handsets use embedded processors– Intel, ARM architectures dominate market.

Examples include:• BlackBerry 8700, uses Intel PXA901 chip [6]• iPhone 3G, uses Samsung ARM 1100 chip [7]

– Low power use and code size are crucial [5]–Microprocessor vendors often package all

the chip’s functionality in a single chip (package-on-package (PoP)) for maximum flexibility

– Apple A4 uses a PoP design [10]

Page 9: Mobile Handsets:  A Panoramic Overview

Example: iPhone 3G CPU

• The iPhone: a real-world MH [7–9]– Runs on Samsung

S3C6400 chip, supports ARM architecture

– Highly modular architecture

Source: [8]

Page 10: Mobile Handsets:  A Panoramic Overview

Mobile Handset OSes (1)

• Key mobile OSes:– Symbian OS– BlackBerry OS– Google Android– Apple iOS– Windows Phone 7

(formerly Windows Mobile)

• Others include:– HP Palm webOS– Samsung bada

Source: [11]

Page 11: Mobile Handsets:  A Panoramic Overview

Mobile Handset OSes (2)• Symbian (^n) OS (ARM

only)– Open-source (Nokia)– Multitasking– Programming: C++, Java

ME, Python, Qt/HTML5• BlackBerry OS (ARM)

– Proprietary (RIM)– Multitasking– Many enterprise features– Programming: Java ME,

Adobe AIR (tablet)• iPhone OS (ARM only)

– Proprietary (Apple)– Multitasking– Multi-touch interface– Programming: Objective-C

• Windows Phone 7 (ARM only)– Proprietary (Microsoft)– No multitasking– Programming: Silverlight/XNA,

C#.NET/VB.NET• Android (ARM, x86, …)

– Open-source– Multitasking– Programming: Java

(Apache Harmony), scripts• Other OS features

– Most require app code signing– Many support Adobe Flash/AIR,

multitasking– ARM is predominant ISA

Page 12: Mobile Handsets:  A Panoramic Overview

Mobile Handset Networking

• Handsets communicate with each other and with service providers via many networking technologies

• Two “classes” of these technologies:– Cellular telephony–Wireless networking

• Most handsets support both, some also support physical connections such as USB

Page 13: Mobile Handsets:  A Panoramic Overview

Cellular Telephony Basics (1)

• Many mobile handsets support cellular services

• Cellular telephony is radio-based technology, radio waves propagated by antennas

• Most cellular frequency bands: 800, 850, 900, 1800, 1900, 2100 MHz

Source: [5]

Page 14: Mobile Handsets:  A Panoramic Overview

Cellular Telephony Basics (2)

• Cells, base stations– Space divided into cells,

each has base station (tower, radio equipment)

– Base stations coordinate so mobile users can access network

– Move from one cell to another: handoff

Page 15: Mobile Handsets:  A Panoramic Overview

Cellular Telephony Basics (3)

• Statistical multiplexing– Time Division Multiple Access (TDMA)

• Time & frequency band split into time slots• Each conversation gets the radio a fraction of the time

– Frequency Division Multiple Access (FDMA) analogous

Page 16: Mobile Handsets:  A Panoramic Overview

Wireless Networking (1)

• Bluetooth (BT)– Frequency-hopping radio technology: hops

among frequencies in 2.4 GHz band– Nearly ubiquitous on mobile handsets– Personal area networking: master device

associate with ≤ 7 slave devices (piconet)– Pull model, not push model:

• Master device publishes services• BT devices inquire for nearby devices, discover

published services, connect to them

– Latest version: 4.0; latest mobiles support 3.0 [12]

Page 17: Mobile Handsets:  A Panoramic Overview

Wireless Networking (2)

• WiFi (IEEE 802.11)– Variants: 802.11b, g, n, etc.– Radio technology for WLANs: 2.4, 3.6, 5 GHz– Some mobile handsets support WiFi, esp.

premium– Two modes: infrastructure and ad hoc

• Infrastructure: mobile stations communicate with deployed base stations, e.g., OSU Wireless

• Ad hoc: mobile stations communicate with each other without infrastructure

– Most mobiles support infrastructure mode

Page 18: Mobile Handsets:  A Panoramic Overview

Mobile Handset Applications

• Mobile apps span many categories, e.g.:– Games: Angry Birds, Assassin’s Creed, etc.– Multimedia: Pandora, Guitar Hero, etc.– Utilities: e-readers, password storage, etc.

• Many apps are natively developed for one mobile OS, e.g., iOS, Android– Cross-platform native mobile apps can be

developed via middleware, e.g., Rhodes [13], Titanium [14]

– Can also build (HTML5) Web apps, e.g., Ibis Reader [15], Orbium [16]

• We’ll discuss mobile app development next

Page 19: Mobile Handsets:  A Panoramic Overview

Native Mobile App Development

• Mobile apps can be developed natively for particular mobile handset OSes– iOS: Dashcode, Xcode; Mac only– Android: Eclipse; Win/Mac/Linux–Windows Phone: Visual Studio, XNA;

Windows only– Symbian: Eclipse, NetBeans, Qt;

Win/Mac/Linux– BlackBerry: Eclipse, Visual Studio;

Win/Mac

Page 20: Mobile Handsets:  A Panoramic Overview

Other Mobile App Development

• Middleware– Rhodes: Ruby/HTML compiled for all mobile OSes– Titanium: HTML/JS + APIs compiled for iOS,

Android– Still dependent on native SDK restrictions

• Web development: HTML5, CSS, JS – Works on most mobile browsers– Can develop on many IDEs, Win/Mac/Linux

• Biz: SMS/MMS/mobile network operators key

Page 21: Mobile Handsets:  A Panoramic Overview

Business Opportunities• Virtually every mobile OS supports app sales via stores,

e.g., iOS App Store, Android Market, Windows Marketplace

• Devs sign up for accounts, download SDKs– Costs: $99/yr (iOS, Win), $25 once (Android)– http://developer.apple.com, http://market.android.com,

http://create.msdn.com

Page 22: Mobile Handsets:  A Panoramic Overview

Mobile Handset Security Issues

• People store much info on their mobiles• “Smartphones are the new computers.…2

billion…will be deployed by 2013” – M.A.D. Partners [18]

• Handsets are targets for miscreants:– Calls– SMS/MMS messages– E-mail– Multimedia– Calendars– Contacts– Phone billing system [18]

Page 23: Mobile Handsets:  A Panoramic Overview

Handset Malware History (1)

• Hackers are already attacking handsets–Most well-known case: a 17-year-old broke

into Paris Hilton’s Sidekick handset [19]– Less well-known: worms, viruses, and

Trojans have targeted handsets since 2004• 2004: [20]

– Cabir worm released by “29A,” targets Symbian phones via Bluetooth

– Duts virus targets Windows Mobile phones– Brador Trojan opens backdoor on Windows Mobile [24]

Page 24: Mobile Handsets:  A Panoramic Overview

Handset Malware History (2)

• 2005: [21]– CommWarrior worm released; replicates via Bluetooth, MMS to all

contacts– Doomboot Trojan released; claims to be “Doom 2” video game,

installs Cabir and CommWarrior• 2006: [20, 21]

– RedBrowser Trojan released; claims to be a Java program, secretly sends premium-rate SMS messages to a Russian phone number

– FlexiSpy spyware released; sends log of phone calls, copies of SMS/MMS messages to Internet server for third party to view

• 2008: [22]– First iPhone Trojan released

• 2009–2010: iPhone “Rickrolling”, Android SMS malware, etc.

• “The single biggest thing threatening any enterprise today on a security basis is mobile. Furthermore, mobile phone application stores are the greatest malware delivery system ever invented by man” – Robert Smith, CTO, M.A.D. Partners [18]

Page 25: Mobile Handsets:  A Panoramic Overview

Key Handset Threats, Attacks

• Info theft [23]– Transient info: user location– Static info: bluesnarfing attacks, WEP & WPA cracks [24]

• Service/$ theft, e.g., premium-rate calls/SMS [23]• Denial-of-service attacks [23]

– Flooding attacks overload handset radio with garbage– Power-draining attacks attempt to drain battery

• Botnets and DoS attacks against networks [22, 25]• Exploiting the human factor• We’ll discuss risk management strategies

Page 26: Mobile Handsets:  A Panoramic Overview

Risk Management Strategies

• Organizations must: –Understand rapidly-evolving threatspace [18]–Understand applicable laws & regulations–Understand employee demand for handsets

and balance this against the risk they pose– Institute CSO policies to achieve compliance

(and get top management on board!)– Inform employees about policies (change

mgmt)– Implement the policies with tech and people

Page 27: Mobile Handsets:  A Panoramic Overview

Risk Management Tactics

• To implement strategies, organizations must:– Decide whether to distribute handsets to

employees for business purposes, allow use– Encrypt device data– Remote data wipe as needed– Procure, install anti-malware, firewall products– Require VPN use, strong passwords, inventory

mgmt.– Monitor employee handset use to detect attacks– Educate employees about the threatspace, train

them to treat handsets as any other computer system

– Prevent, detect, and respond appropriately

Page 28: Mobile Handsets:  A Panoramic Overview

Discussion and Questions

Thank you

Page 29: Mobile Handsets:  A Panoramic Overview

References [1]1. Wireless Intelligence, “Snapshot: Global mobile connections surpass 5 billion

milestone,” 8 Jul. 2010, https://www.wirelessintelligence.com/print/snapshot/100708.pdf

2. T. T. Ahonen, “5 - 4 - 3 - 2 - 1, as in Billions. What do these gigantic numbers mean?,” 6 Aug. 2010, http://communities-dominate.blogs.com

3. T. T. Ahonen, 29 Sep. 2010, http://untether.tv/ellb/?p=22274. T. T. Ahonen, “When there is a mobile phone for half the planet:

Understanding the biggest technology”, 16 Jan. 2008, http://communities-dominate.blogs.com/ brands/2008/01/when-there-is-a.html

5. J. L. Hennessy and D. A. Patterson, Computer Architecture: A Quantitative Approach, 4th ed., Elsevier, 2007

6. Research in Motion, “BlackBerry 8700c Technical Specifications”, http://www.blackberry.com/products/pdfs/blackberry8700c_ent.pdf

7. R. Block, “iPhone processor found: 620MHz ARM CPU”, Engadget, 1 Jul. 2007, http://www.engadget.com/2007/07/01/iphone-processor-found-620mhz-arm/

8. Samsung Semiconductor, “Product Technical Brief: S3C6400, Jun. 2007”, http://www.samsung.com/global/system/business/semiconductor/product/2007/8/21/661267ptb_s3c6400_rev15.pdf

Page 30: Mobile Handsets:  A Panoramic Overview

References [2]9. Wikipedia, “iPhone”, updated 15 Nov. 2008,

http://en.wikipedia.org/wiki/Iphone10. Wikipedia, “Apple A4”, updated 21 Oct. 2010,

http://en.wikipedia.org/wiki/Apple_A411. Gartner (12 August 2010). "Gartner Says Worldwide Mobile Device Sales

Grew 13.8 Percent in Second Quarter of 2010, But Competition Drove Prices Down". Press release. http://www.gartner.com/it/page.jsp?id=1421013

12. Wikipedia, “Samsung Galaxy S”, updated 21 Oct. 2010, http://en.wikipedia.org/wiki/Samsung_Galaxy_S

13. Rhomobile Inc., http://rhomobile.com/14. Appcelerator Inc., http://www.appcelerator.com/15. Ibis Reader LLC, http://ibisreader.com16. Björn Nilsson, Orbium, http://jsway.se/m/ 17. Ericsson.Global mobile data traffic nearly triples in 1 year, 12 August 2010.

http://www.ericsson.com/thecompany/press/releases/2010/08/1437680.18. Georgia Tech Information Security Center, “Emerging Cyber Threat Reports

2011,” http://www.gtisc.gatech.edu/pdf/cyberThreatReport2011.pdf

Page 31: Mobile Handsets:  A Panoramic Overview

References [3]19.B. Krebs, “Teen Pleads Guilty to Hacking Paris Hilton’s Phone”,

Washington Post, 13 Sep. 2005, http://www.washingtonpost.com/wp-dyn/content/article/2005/09/13/AR2005091301423_pf.html

20.D. Emm, “Mobile malware – new avenues”, Network Security, 2006:11, Nov. 2006, pp. 4–6

21.M. Hypponen, “Malware Goes Mobile”, Scientific American, Nov. 2006, pp. 70–77, http://www.cs.virginia.edu/~robins/Malware_Goes_Mobile.pdf

22.PandaLabs, “PandaLabs Quarterly Report: January–March 2008”, http://pandalabs.pandasecurity.com/blogs/images/PandaLabs/2008/04/01/Quarterly_Report_PandaLabs_Q1_2008.pdf

23.D. Dagon et al., “Mobile Phones as Computing Devices: The Viruses are Coming!”, IEEE Pervasive Computing, Oct. – Dec. 2004, pp. 11–15

24.G. Fleishman, “Battered, but not broken: understanding the WPA crack”, Ars Technica, 6 Nov. 2008, http://arstechnica.com/articles/paedia/wpa-cracked.ars

25.http://blog.mylookout.com/2010/12/geinimi_trojan/


Recommended