10월 4, 2023

Knox HDM: High-Assurance Control of Peripheral Devices

Hayawardh Vijayakumar, Security Engineer
 인기 이미지

Privacy and data security are core concerns when using mobile devices in enterprise settings. However, privacy and security on mobile devices face unique and advanced threats. For example, a malicious insider or stealthy spyware could use the camera, mic, and GPS in the background to spy on meetings or to photograph sensitive data in controlled physical environments, and exfiltrate data through the cellular modem.

One underlying enabler for these threats is that mobile phones are extremely versatile devices that interact with their environment in multiple ways using peripheral devices1, such as modems, Wi-Fi, Bluetooth, cameras, microphones, GPS, NFC, and USB. However, these same peripherals also expose a wide attack surface that attackers can abuse for malicious purposes to compromise privacy and security. Such concerns have unfortunately resulted in mobile phones being disallowed in classified and secure locations, especially in government, as well as security concerns around their use by journalists and leaders who are potential targets of surveillance.

 

Advanced malware exploits the peripheral device attack surface

To further understand the peripheral attack surface, let us look at how advanced threats typically work (Figure 1). First, attackers infiltrate devices to execute malware code on the victim’s device. Infiltration can happen through peripherals such as USB (e.g., connecting to a malicious charger). Second, malware exploits vulnerabilities in the Android framework and the OS kernel to gain privilege and to bypass policy controls installed by an enterprise mobile device management (MDM). Third, malware collects and exfiltrates data using peripherals. For example, the device’s cameras and microphones can be hijacked to look in on and listen to a targeted individual’s environment, while the wireless radios can be leveraged for data exfiltration.

Figure 1: How advanced malware works. Specifically, advanced malware escalates its privileges using OS or Android framework vulnerabilities, and is able to stealthily access peripherals such as the camera and mic in the background.

 

Advanced malware bypasses OS-level peripheral device controls

These threats are addressed by effectively disabling peripherals, such as the camera, mic, USB, and modem. Most OSes, including Android, can disable application access to peripherals through settings and enterprise MDM APIs. However, as it stands today, advanced malware or a threat actor who has compromised the OS and escalated privilege has full control over the device’s hardware components, overriding the user’s selections within OS controls or the organization’s peripheral policies enforced via MDM. For example, the Pegasus spyware used a rooting exploit to escalate privileges to the OS, and bypassed Android’s access controls to surveil live audio and capture camera images stealthily. As another example, researchers demonstrated how an Android permissions bypass vulnerability allowed an app access to camera, microphone, and GPS data without having permissions to do so.

 

HDM: High Assurance Peripheral Device Controls

HDM is a Samsung-exclusive security layer that provides high assurance peripheral device controls to an enterprise even if the OS is compromised and across factory resets. HDM leverages ARM hardware virtualization to interpose on peripheral access, and allows or denies access according to enterprise policy (Figure 2). This policy specifies whether specific peripherals should be enabled or disabled, and also whether to trigger automatic physical lockout of peripherals upon detection of device rooting or compromise (Figure 3). HDM can control access to physical sensors (cameras and microphones), communication chips (cellular modem, Wi-Fi, Bluetooth and NFC) and other peripherals (USB, speaker and GPS) based on enterprise policy.

Figure 2: HDM mediates all accesses to peripherals even if an attacker bypasses Android OS access controls. HDM enforces access based on an enterprise policy stored in tamper-resistant secure storage that persists even across factory resets.

Figure 2: HDM mediates all accesses to peripherals even if an attacker bypasses Android OS access controls. HDM enforces access based on an enterprise policy stored in tamper-resistant secure storage that persists even across factory resets.

Figure 3: An enterprise policy specifies whether HDM should disable specific peripheral devices, and whether to trigger lockout of peripherals upon detecting device compromise.

HDM achieves strong guarantees using a unique combination of techniques:

  • HDM controls are enabled before any potentially untrusted code can run. HDM starts before the OS as part of Knox’s hardware-rooted trusted boot process, which is the chain of trust that begins when the phone is powered on and ensures that each component is cryptographically validated before being loaded.
  • HDM offers complete protection even in the face of OS compromise. HDM runs at a higher privilege than the OS by leveraging ARM’s hardware virtualization extensions, and therefore mediates and controls all accesses to peripherals even if the Android framework and OS is completely compromised by malware.
  • HDM policy is tamper-resistant and persistent across factory resets. HDM stores its enterprise policy in device secure storage that is protected from tampering and preserved even across factory resets and flashing. Even if the secure storage itself is broken by hardware attacks, HDM can apply a default protection policy.
  • HDM policy updates are cryptographically protected. HDM uses cryptographic signatures and mutual authentication for policy updates. A trusted HDM server generates and signs the enterprise policy, which is verified by HDM on-device. In turn, HDM uses its own unique, hardware-backed key to prove its identity to the server.

 

HDM Scenarios

HDM enables several use-cases in a flexible and secure manner.

Scenario 1: Fixed hardware peripheral customization

To avoid being detected or have their position compromised during military operations, operatives often require guaranteed disablement of certain radio services such as GPS, microphone, and Wi-Fi services. Using HDM to disable these subsystems on the device before troop/device deployment provides high assurance that these services cannot be activated in the field.

Scenario 2: Dynamic context-based peripheral access

To maintain integrity and protect sensitive information or intellectual property theft, organizations restrict the usage of mobile devices in secure campuses or locations. HDM can be used to disable camera/microphone subsystems on the mobile device before entering these areas. Disabling of the hardware could happen automatically using external triggers or by tapping the device at an entry gate.

As another example, when a need arises to discuss confidential matters, mobile device users need to be able to quickly and securely restrict access to microphones and camera hardware. An on-device based HDM service can be used to enable or disable the hardware subsystems ensuring the utmost secrecy is maintained. This can be thought of as a flexible privacy sticker and supports multiple peripherals where a sticker cannot be used.

Scenario 3: Zero Trust and damage containment

A core principle of Zero Trust is “assume breach”, where enterprises have to anticipate that attackers can successfully compromise a system, and take measures to contain the breach. To meet these ambitious goals for realizing Zero Trust, enterprises require new endpoint capabilities for limiting damage and data loss in the event that a device compromise is detected. HDM enables robust disabling of peripherals such as Wi-Fi and cellular modem to prevent enterprise data exfiltration once a compromise is detected.

 

Conclusion

Peripheral devices, such as the camera, microphone, and cellular modem, are increasingly abused by malicious actors to compromise devices, to spy, and to exfiltrate data. Advanced malware exploits the operating system, thereby rendering OS-level controls ineffective. Knox HDM offers high assurance, secure, and flexible controls to gate access to peripheral devices, enabling secure achievement of a wide range of flexible use-cases such as context-based access and for zero trust.


1Peripheral devices are also simply called peripherals

[아이콘] 닫기

삼성 Knox 시작하기

[아이콘] 여행가방
리셀러, 솔루션 공급업체 또는 서비스 공급업체이신가요?

지금 Knox 파트너가 되어 비즈니스 성장을 도모하세요.

[아이콘] 정보

시작할 Knox 제품 선택:

올인원 번들
Knox Suite
리브랜딩 및 맞춤 설정
Knox Configure
사기 및 도난 방지
Knox Guard
디바이스 보호 플랜
Samsung Care+ for Business
기타 제품 및 서비스

시작하기

[이미지] Knox Suite

기업용 모바일을 위한 일체형 솔루션 번들

  • 최대 30대의 디바이스에 제공되는 90일 무료 평가판을 사용해 보세요.
  • 회사 디바이스를 안전하게 보호, 배포, 관리 및 분석할 수 있는 완벽한 툴 모음입니다.
  • Knox Suite와 함께 제공되는 강력한 기능을 사용해 보세요.

Knox Suite에는 다음이 포함됩니다.:

Knox Mobile Enrollment 무료
Knox Manage
Knox E-FOTA
Knox Asset Intelligence
Knox Platform for Enterprise 무료
Knox Remote Support
Knox Capture
Knox Authentication Manager

시작하기

[이미지] Knox Configure 로고

삼성 디바이스를 리브랜딩하고 맞춤 설정하세요.

  • 최대 30대의 디바이스에 제공되는 90일 무료 평가판을 사용해 보세요.
  • 삼성 디바이스를 대량으로 구매하는 즉시 원격으로 구성하고 특정 요구 사항을 충족하도록 맞춤 구성합니다.
  • 디바이스를 일회성 배포를 위해 설정하거나 원하는 만큼 업데이트할 수 있습니다.

시작하기

[아이콘] Knox Guard 로고

삼성 디바이스를 위한 사기 및 도난 방지

  • 최대 30대의 디바이스에 제공되는 90일 무료 평가판을 사용해 보세요.
  • 원격으로 삼성 디바이스를 제어하여 금융 관련 위험성을 줄이고 자산을 보호하세요.
  • SIM 제어 및 디바이스 잠금 기능을 포함한 Knox Guard의 모든 기능을 사용해 보세요.

시작하기

[이미지] Samsung Care Plus For Business 로고

삼성 디바이스를 위한 디바이스 보호 플랜

  • 빠른 디바이스 수리 및 교체로 업무 중단을 최소화합니다. 시작하려면 삼성 영업팀에 문의하세요.
  • 한 곳에서 모든 디바이스 보증 범위 및 청구 정보를 확인하세요.
  • 이미 Samsung Care+ for Business를 구매하셨나요? Samsung Care+ for Business 콘솔에서 계정을 만들고 플랜을 활성화하세요.

기타 제품 및 서비스

[이미지] 기타 로고

고객의 고유한 요구 사항을 해결하는 최신 솔루션입니다.

  • Enterprise Tech Support를 통해 전담 계정 관리자로부터 효율적인 기술 지원을 받아보세요.
  • 삼성 소프트웨어 맞춤 설정 서비스를 사용하여 귀사를 위한 맞춤형 디바이스를 만들어 보십시오.
영업 팀에 문의