FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment E. Fernandes, B. Crispo, M. Conti IEEE Transactions on Information Forensics.

Slides:



Advertisements
Similar presentations
Android Enterprise Applications Internet Security CIS 471 Bryce Sumida.
Advertisements

Win the Cyberwar on Mobile Banking and Payments
Dissecting Android Malware : Characterization and Evolution
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
7 Effective Habits when using the Internet Philip O’Kane 1.
David Flournoy Bit9 Mid-Atlantic Regional Manager
RADIO FREQUENCY MODULE. Introduction  An RF module is a small electronic circuit used to transmit and receive radio signals.  As the name suggests,
Iron Key and Portable Drive Security Zakary Littlefield.
 Smartphone overview › Platform comparison  App Construction  Smartphone malware and viruses  Security threats  Keeping your Smartphone clean.
1 DIGITAL RADIO -- The Eureka 147 DAB System THE THIRD AGE OF BROADCASTING The First Age of Radio Broadcasting - the era of AM The Second age - FM.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
THE MOBILE UNDERGROUND ACTIVITIES IN CHINA Lion Gu, Trend Micro RUXCON /10/2014.
Access · convergence · management security · performance Margins in Mobility – Ian Kilpatrick, Wick Hill.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
IWD2243 Wireless & Mobile Security
GROUP MEMBERS ALI RAZA EHTASHAM ZAFAR SOHAIB AHMED BILAL HASSAN FAHAD ABDUL AZIZ.
William Enck, Machigar Ongtang, and Patrick McDaniel.
Trojan Virus Presented by Andy Lindberg & Denver Bohling.
Sophos Mobile Security
Securing Your Android Device Terry Labach Information Security Services, IST.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Cosc 4765 SOPHOS Security Threat report about 2013 (and predictions for 2014)
A Scientific Approach to Software Security Dennis Fisher May 15, 2012 The Kaspersky Lab Security News Service.
 a crime committed on a computer network, esp. the Internet.
Hacking mobile devices. Basic attacks Voic hacking –An introduction and Wikipediaintroduction Wikipedia –Murdoch scandal in UKMurdoch scandal –A.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
PAQ RDS TECHNOLOGY MARKET OPPORTUNITIES AUDEMAT- AZTEC RANGE.
Wireless Communication Meghan Synishin Kara MacDonald Arlene Pino “Last year more mobile phones were sold than the number of PC’s and cars combined.” -
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
1 Company Proprietary and ConfidentialThe document name can go here Android OS Security Omar Alaql July 8, 2013 Kent State University Android OS Security.
Android Mobile Security Krystal Salerno. Introductions.
Delphi Confidential1 Weather Information Dissemination – Automotive Perspective July 25, 2007.
Android Security Auditing Slides and projects at samsclass.info.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Computer Security By Amy Dennison 7H I Love you Melissa Esafe Happy99.
Antivirus software.
Wireless and Mobile Security
Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It.
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
Monitoring Volume Level Application - End of Project Presentation Made by: Roi Abecasis Maxim Meltsin Supervisor: Boaz Mizrahi.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
Mobile Security Tom Taylor. Roadmap Security Risks Security Risks Examples of Attacks Examples of Attacks Personal Protection Personal Protection Business.
Kaspersky Small Office Security INTRODUCING New for 2014!
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
DeepDroid Dynamically Enforcing Enterprise Policy Manwoong (Andy) Choi
RCS POC – Infection Vectors Egypt June 18 th -19 st 2013 Mostapha Maanna – Marco Catino.
Wireless LAN Concepts. Wireless LAN Standards.
Android and IOS Permissions Why are they here and what do they want from me?
NORTON PHONE NUMBER TOLL FREE NUMBER ort.html.
Covert Channels Eric Pennington COSC480. Common Network Threats  Viruses, Trojans, Worms, etc.  Password Attacks  Eavesdropping  Port Scanning  Not.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
By : Praveen Tiwari.  It is a malicious technique of tricking a web user into clicking on something different to what the user perceives they are clicking.
Android’s Malware Attack, Stealthiness and Defense: An Improvement Mohammad Ali, Humayun Ali and Zahid Anwar 2011 Frontiers of Information Technology.
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
2N Net Audio System.
How To Install Norton Security on Android Phone
Ch 8- Digital devices and media: managing a digital lifestyle
Require Activate Norton antivirus with a product key |
Android Mobile apps development services company in India
Communication Systems.
Hacking mobile devices
Presentation transcript:

FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment E. Fernandes, B. Crispo, M. Conti IEEE Transactions on Information Forensics and Security 8(6): (2013)

Take Home Message  New attack vector with interesting features...for attackers  Learning and exploiting security weakness of Android security model and its implementation  Inadequateness of existing mobile AV solutions

FM Radio

FM Radio Data System (RDS) Baseband coding 1,187.5 bits per second on a 57 kHz subcarrier

Our FM Radio Attack  New attack vector: FM RDS broadcast channel  Exploiting vulnerability of Android and FM Radio API  Cross-device: Smartphone, Car Radio, USB token  Cost <500$ Antenna RDS Encoder Audio Signal Transmitter Circuit RS232 Control Receiver Antenna

Attack

Actual AVs do not help AntivirusCategoryExploitConfigurationDetected? Norton Mobile Security Lite FreeGingerBreakAnti-Malware defense activated, Daily scan, SD Card scan No Lookout SecurityFreeGingerBreakDaily scan, “security" activated, complete scan when malware was installed No AVG Antivirus Pro PaidGingerBreakFull scan modeNo Kaspersky Mobile Security PaidGingerBreakFull scan with malware existing in binary form in app directory, also Memory Scan while malware in main memory, with exploit in binary form in app directory No AVG Security ProPaidGingerBreakFull scan modeNo

Unique Features  Zero-fingerpring Attack  Broadcast  Geographic Attack  Can target a specific physical perimeter

Old Lessons Confirmed  One-fits-All paradygm is very bad for security  But good for interoperabiliy, time-to-market, ROI  Shortcuts to bypass the security model can only create problems  Difficult for a model to accomodate: openess, evolution and adaptation