Security Features Overview - en PDF
Security Features Overview - en PDF
Confidential 1
Feature Description Protection against Category
Confidential 2
Feature Description Protection against Category
DLL and Before running a DLL, an application By making an application run a Software
browser makes sure it is on a whitelist of malicious DLL or a Web View to run a
plug-in allowed DLLs. As a special case of this malicious plug-in, it is possible for an
whitelisting feature is browser plug-in attacker to manipulate the running
whitelisting. This means that plug-ins process of an application, therewith
for the Trusted Web View are only making a user to undertake actions to
being allowed if they are on the the attacker’s advantage.
white list.
Confidential 3
Feature Description Protection against Category
Confidential 4
Feature Description Protection against Category
USB over USB over IP enables access to a USB Stealing user’s data, unauthorized Hardware
IP device over a network, where a host access.
detection device is connected to. For security USB over IP can be a real problem if a
reasons it may be necessary to detect USB device is carrying user’s sensitive
and block such access type to prevent data or an application for security
remote access to a USB device. sensitive operations, such as banking,
enterprise network access etc.
Confidential 5
Feature Description Protection against Category
Confidential 6
Feature Description Protection against Category
Protected Protected key store is a part of the User impersonation, unauthorized Software
and application that is protected by integrity access, stealing user’s private data.
separate check mechanisms and encryption. The
user key store (storage) keeps user’s
store private/secret information, e.g. for user’s
authentication. An access to the store is
strictly controlled by the application and
(if available) by a security server.
Confidential 7
Feature Description Protection against Category
Two factor The process of authenticating a user User impersonation, unauthorized Software,
authentication based on two factors pertaining to a access. Hardware
user. The factors are: what a user Whereas it may be quite feasible
knows (e.g. PIN or a password), what for an attacker to overcome one
a user possesses (token, card), what a factor (e.g. steal a password), it is
user is (biometrics), where a user is much harder to (simultaneously)
(geolocation). A two factor break the two factors, e.g. steal a
authentication system uses a password and a security token of a
combination of two factors from the user.
above list. Usually, it is a
combination of what a user knows
and what a user possesses.
Virtual device An application (virtual device) is bind Application cloning, user Software
binding to a specific mobile device that it has impersonation.
been installed onto. The binding is It is very difficult to clone an
done by collecting certain properties application that contains user’s
of the mobile device and its data and install it onto another
operating system. These properties mobile device in order to later get
should uniquely identify the mobile access to user’s data or
device and can be later used as a impersonate a user.
reference for the binding.
Confidential 8
Feature Description Protection against Category
User and Managing registered users of the system This is a preventive measure, Server
device and devices that belong to these users. which other protective
management Devices can be virtual (apps) and physical mechanisms rely upon. Being
(hardware). With this management able to manage users and their
function an administrator of the system devices is essential for
has an overview of all the users and providing an adequate
devices, activity reports, and is able to protection of the systems and
lock/unlock/delete/activate devices and its processes.
users. Moreover, an administrator has
information on an operating system a
virtual devices is running on, which
mobile device model etc.
Server-sided User’s PIN is not verified in the Brute force attacks. Software,
verified and application, but is transmitted (not a PIN Local PIN verification can be Server
protected itself, but rather a certain fingerprint used by an attacker to simply
user PIN thereof) over a secure channel (see brute force all possible PIN
“Dedicated secure channel”) to a trusted combinations. Even if there is a
server that does verification against lock after a certain amount of
securely stored fingerprints. The server trials, it can be overcome by
can deny access after a certain amount of cloning the app necessary
wrong PIN entries. amount of times and doing
brute force on the cloned
copies.
Confidential 9
Feature Description Protection against Category
App It is being controlled (preferably by a Using outdated app versions that Software,
version trusted server) that a valid version of potentially have security problems, Server
control an application is running. which may lead to compromising
user’s identity and communication.
Confidential 10
Feature Description Protection against Category
Confidential 11
Feature Description Protection against Category
Dynamic memory During an execution of a program Stealing user sensitive data. Software
dumping protection certain states are stored in the
memory. By dumping the memory
it is possible to analyze the dump
and try to recover sensitive
information from it.
Protecting mechanisms here make
sure that no sensitive information
can be retrieved from the memory
dumps.
Static executable With these protecting measures it Application manipulation and Software
patching protection is prevented that an attacker is able malicious code execution.
to change binary code of an
application of its resources.
Techniques such as integrity check
(“Application integrity check”),
code signing and function
signatures (“Integrity of critical
functions”) come into play here.
Session hijacking Session hijacking is an attack that Man-in the-middle, man-in- Software,
prevention takes over a legitimate the-browser Server
communication session between a
server and a client. Preventive
mechanisms make sure that a
session cannot be taken over.
Virtual device with See “Protected and separate user See “Protected and separate Software,
separate key store key store” and “Separate secure user key store” and “Separate Server
and communication channel”. secure channel”.
channel
Confidential 12
Feature Description Protection against Category
Confidential 13
Feature Description Protection against Category
Remote secure Being secure means also being up- Phishing Software,
update (firmware to-date regarding protecting Manipulated application or Hardware,
and software) mechanisms. Being up-to-date for firmware is installed. See Server
an application or a device is also “App version control”
achieved by an update of the
application or device’s firmware.
Remote update makes it possible
to update the application/device
remotely by a trusted server. The
update packets are transferred
over a secure channel and are
equipped with a digital signature
that must be verified before an
update can be undertaken.
Confidential 14
About Kobil Systems
Today Kobil solutions are a benchmark for digital identity and highly secure data
technology. Founded in 1986, the 120 person strong Kobil Group with head office in
Worms, Germany, is a pioneer in the areas of smart cards, one-time-passwords,
authentication and encryption.
The core of Kobil philosophy is to provide consistent identity and mobile security
management on all platforms and for all communication channels. Almost half of the
Kobil employees are engaged in development, including leading specialists in
cryptography.
Confidential 15