Secure containers in android: The samsung KNOX case study

Uri Kanonov, Avishai Wool

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Bring Your Own Device (BYOD) is a growing trend among enterprises, aiming to improve workers' mobility and pro- ductivity via their smartphones. The threats and dangers posed by the smartphones to the enterprise are also ever- growing. Such dangers can be mitigated by running the enterprise software inside a "secure container" on the smart- phone. In our work we present a systematic assessment of security critical areas in design and implementation of a se- cure container for Android using reverse engineering and attacker-inspired methods. We do this through a case-study of Samsung KNOX, a real-world product deployed on mil- lions of devices. Our research shows how KNOX security features work behind the scenes and lets us compare the vendor's public security claims against reality. Along the way we identified several design weaknesses and a few vul- nerabilities that were disclosed to Samsung.

Original languageEnglish
Title of host publicationSPSM 2016 - Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, co-located with CCS 2016
Pages3-12
Number of pages10
ISBN (Electronic)9781450345644
DOIs
StatePublished - 24 Oct 2016
Event6th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2016 - Vienna, Austria
Duration: 24 Oct 2016 → …

Publication series

NameSPSM 2016 - Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, co-located with CCS 2016

Conference

Conference6th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2016
Country/TerritoryAustria
CityVienna
Period24/10/16 → …

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Human-Computer Interaction
  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Secure containers in android: The samsung KNOX case study'. Together they form a unique fingerprint.

Cite this