A First Look at Firefox OS Security

10/28/2014
by   Daniel Defreez, et al.
0

With Firefox OS, Mozilla is making a serious push for an HTML5-based mobile platform. In order to assuage security concerns over providing hardware access to web applications, Mozilla has introduced a number of mechanisms that make the security landscape of Firefox OS distinct from both the desktop web and other mobile operating systems. From an application security perspective, the two most significant of these mechanisms are the the introduction of a default Content Security Policy and code review in the market. This paper describes how lightweight static analysis can augment these mechanisms to find vulnerabilities which have otherwise been missed. We provide examples of privileged applications in the market that contain vulnerabilities that can be automatically detected. In addition to these findings, we show some of the challenges that occur when desktop software is repurposed for a mobile operating system. In particular, we argue that the caching of certificate overrides across applications–a known problem in Firefox OS–generates a counter-intuitive user experience that detracts from the security of the system.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/13/2022

Evaluation of Static Analysis on Web Applications

Web services are becoming business-critical components, often deployed w...
research
01/05/2022

WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms

The complexity of browsers has steadily increased over the years, driven...
research
04/07/2020

Vulnerabilities Mapping based on OWASP-SANS: a Survey for Static Application Security Testing (SAST)

The delivery of a framework in place for secure application development ...
research
08/11/2020

On Security Measures for Containerized Applications Imaged with Docker

Linux containers have risen in popularity in the last few years, making ...
research
04/14/2022

A Study on Web Application Vulnerabilities to find an optimal Security Architecture

Over the past three decades, computers have managed to make their way in...
research
04/20/2023

A Survey of Prevent and Detect Access Control Vulnerabilities

Broken access control is one of the most common security vulnerabilities...
research
04/19/2019

Credential Masquerading and OpenSSL Spy: Exploring ROS 2 using DDS security

The trend toward autonomous robot deployments is on an upward growth cur...

Please sign up or login with your details

Forgot password? Click here to reset