Nytro Posted July 17, 2014 Report Posted July 17, 2014 Windows Phone 8 Application Security WhitepaperSyscan 2014 Singapore – Alex Plaskett and Nick Walker2014/03/30Contents1. Introduction ..................................................................................... 42. Background ...................................................................................... 42.1 Application Overview ..................................................................................... 42.2 Code Signing ................................................................................................ 52.3 Sandboxing.................................................................................................. 52.4 Exploit Mitigation .......................................................................................... 72.5 Encryption .................................................................................................. 72.6 Secure Boot ................................................................................................. 82.7 Developer Unlock .......................................................................................... 82.8 Previous Work .............................................................................................. 93. Black box Assessment ......................................................................... 103.1 Obtaining Marketplace Applications .................................................................. 103.2 Application Structure ................................................................................... 113.3 Decompiling Marketplace Applications ............................................................... 123.4 Patching Marketplace Applications ................................................................... 123.5 Obtaining a remote shell ............................................................................... 133.6 Building Standalone Executables ...................................................................... 144. Local Data Protection ......................................................................... 164.1 Insecure Data Storage................................................................................... 174.2 Data Protection API (DPAPI) ........................................................................... 204.3 Local Database Security ................................................................................ 245. Transmission Security ......................................................................... 265.1 Traffic Interception ..................................................................................... 265.2 Cipher Support and Certificate Validation .......................................................... 276. Interprocess Communication ................................................................. 296.1 File and Protocol Handlers ............................................................................. 296.2 Cross Application Navigation Forgery ................................................................ 33mwrinfosecurity.com | © MWR InfoSecurity 37. Input Validation ................................................................................ 377.1 Web Browser Control ................................................................................... 377.2 Cross Site Scripting (XSS) ............................................................................... 387.3 SQL Injection ............................................................................................. 407.4 XAML Injection ........................................................................................... 407.5 JavaScript Bridge Security ............................................................................. 418. Backgrounding and Application State ....................................................... 429. Push Notifications .............................................................................. 4510. Application Logging .......................................................................... 4811. C++/WinRT Native Code ..................................................................... 4812. Samsung ATIV S ............................................................................... 4912.1 Registry Access ......................................................................................... 4912.2 File System Access ..................................................................................... 4912.3 Enable All Side Loading / Bootstrap Samsung ..................................................... 5013. Conclusions .................................................................................... 5114. Acknowledgements ........................................................................... 5215. References ..................................................................................... 52Download: https://labs.mwrinfosecurity.com/system/assets/651/original/mwri_wp8_appsec-whitepaper-syscan_2014-03-30.pdf Quote