Device binding overview

Impersonation and takeover attacks create severe financial and reputational risks for the involved parties. Attacks that are in scope of this work consist of generally three parts:

Preparation
This is the phase where an attacker would perform reconnaissance and other preparatory work to execute the attack.

Theft
On this phase, an attacker would gain access to the victim’s authentication assets, such as credentials, codes, session tokens, or even a physical device.

Reuse
This final phase is for the attacker to make practical use of the stolen data in order to impersonate the victim and gain further access to the victim’s digital assets, such as bank accounts, crypto wallets etc.

Hardening against the attack preparation and theft is a valid goal that goes outside the scope of this work. Instead, this work focuses on hardening against the last phase of - reuse.

--- title: Threat landscape overview --- flowchart TD impersonation_attack preparation_phase theft_phase reuse_phase re_protection tampering_protection malware_protection tls_pinning device_binding app_attestation impersonation_attack[Impersonation and account takeover] preparation_phase[Preparation] theft_phase[Theft] reuse_phase[Reuse] impersonation_attack --> preparation_phase impersonation_attack --> theft_phase impersonation_attack --> reuse_phase re_protection([Reverse engineering protection]) tampering_protection([Tampering protection]) malware_protection([Malware protection]) tls_pinning([TLS pinning]) device_binding([Device binding]) app_attestation([Application attestation]) preparation_phase --> re_protection theft_phase --> tampering_protection theft_phase --> malware_protection theft_phase --> tls_pinning theft_phase --> device_binding reuse_phase --> device_binding reuse_phase --> app_attestation style device_binding fill:lightgreen click app_attestation href "https://www.guardsquare.com/introducing-mobile-app-attestation" "Learn more about App Attestation" click malware_protection href "https://www.guardsquare.com/mobile-app-security-research-center/malware/overview" "How to implement malware protection" click tls_pinning href "https://www.guardsquare.com/video/ssl-pinning-explained" "SSL pinning explained" click re_protection href "https://www.guardsquare.com/" "Reverse engineering and tampering protection" click tampering_protection href "https://www.guardsquare.com/" "Reverse engineering and tampering protection"

Phase Countermeasures
Preparation Protection against reverse engineering
Theft  Protection against tampering, malware, TLS pinning, device binding, and more
Reuse Device binding (this work), application attestation

Guardsquare

Table of contents