Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 6A Operating System Basics PART II.
Thank you to IT Training at Indiana University Computer Malware.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Trojan Horse Program Presented by : Lori Agrawal.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Nasca Internet Networking and Security viruses.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Remote Surveillance System Presented by: Robarin Holdings Limited Telephone: Facsimile:
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
Structure Commander Technical Presentation. Copyright (C) MCS 2013, All rights reserved. 2 STRUCTURE COMMANDER Introduction Product Overview.
ISIGN IMS Proximity Marketing Solution (IMS) iSIGN Media Corp Sales 1ATTRACT. TRANSACT. MEASURE.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
Live MobiCast using node.js Ajay Narayan ( ) Deepak Kumar Agarwal ( ) Nishchint Raina ( )
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Data Security.
Viruses.
THREATS TO MOBILE NETWORK SECURITY
Unit 2 - Hardware Computer Security.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Multimedia Databases (MMDB)
CHAPTER FOUR COMPUTER SOFTWARE.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Lecture 2 Title: Computer Software By: Mr Hashem Alaidaros MIS 101.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Software. Software or Programs A set of detailed directions telling the computer exactly what to do, one step at a time. Can be one line of code or several.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Device- dependent Runs only on specific type of computer Types of Operating Systems What are some characteristics of operating systems? Next p
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
1 Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Introduction TO Network Administration
Your Interactive Guide to the Digital World Discovering Computers 2012.
Power Guru: Implementing Smart Power Management on the Android Platform Written by Raef Mchaymech.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Technical Sales Specialist Software - OS and Applications John R. Moegling Sr. Systems Engineer.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Android and IOS Permissions Why are they here and what do they want from me?
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Managing Windows Security
Section 2 terms -Savannah Gray.
Lecture 1-Part 2: Operating-System Structures
Discovering Computers 2012: Chapter 8
3.6 Fundamentals of cyber security
RCS v7 Infection Vectors
Sharing makes life beautiful
CarPlay Solutions.
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Chap 10 Malicious Software.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Lecture 1-Part 2: Operating-System Structures
Chap 10 Malicious Software.
Presentation transcript:

Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis

Why secure Smartphones? Increasing public usage – More people buying and using Smartphones – (insert statistic here) Smartphones are incredibly mobile – Access to the most private moments – Intimate details about habits/lifestyle revealed

Introduction to SVC Allows hackers to have control of camera Records and sends video to a third party over an internet connection through the phone Three phases: – Install SVC without device owner’s knowledge – Collect video – Send files to hacker

Infection Trojan horse attached to tic-tac-toe game Binary executable file of SVC attached as resource file of game After compilation, creates executable codes of SVC When game is executed, SVC attaches itself independently and continues running even after game is closed.

Application Layer 3 modules Video capture – Takes chare of camera File sending – Sends data to hacker Triggering algorithm – Dynamic control module – Determines the right time to run other modules

“Stealthiness” and acquiring info Which is more important for the SVC intender “Stealthiness” – term used by team – Device owner should not know program is running – Team focuses on this – 3 aspects: power, CPU usage, and memory Information acquisition – Sometimes, more important to get all info than not get caught (crime scene/contracts signed) Scenario decides triggering algorithm!

Triggering Algorithm 2 parts: capture and sending Should change based on practical application! Main challenge: when to capture/send? CeSetUserNotificationEx() – Allows spyware to record even when phone is idle Uses Windows Mobile API to gather more info – Power, CPU status, phone dialing, etc. – Device owner should have little suspicion

SVC Architecture

When to Capture/Send? Both use specifications from API Examples: – Power level between 20%-80% – CPU usage should be no more than 50% – Device owner talking on phone: capture – Connection to internet (WiFi/Bluetooth): sending If there is knowledge about victim, can use living habits to determine when to record – Ex: businessman having important weekly conference

Video Capture Module Called by triggering algorithm Phases: – Open camera and take video – Determine whether images are static or dynamic – If dynamic images, compress and store If images are static, process terminates – Pictures of inside of pocket are not useful Files are hidden on the disk in hidden and unused folders

Video Capture Flow

How to Access Camera Native API has little customizability – Can access camera, but no flexibility (frame rate, file format, etc.) Access and build filter manually with software Several COM controllers developed – Enable modifications of encoding and file formats – Video Encoder and Custom Format File Render

Data Compression Data compression: large files are easy to detect and hard to send H.263 is used to compress files – Many Smartphones use hardware for compression, which is inaccessible – Software compression is used instead – Lower compression rate but less CPU cycles than H.264

File Sending Need a wireless connection – WiFi / Internet – Bluetooth – 3G Network Some delay between capture and sending is acceptable (real-time not mandatory) Use transmissions that are free of charge (unlike MMS) Several methods considered: MMS, FTP, streaming

File Sending cont. Prefer ability to use any wireless connections Video files are generally large – Segment into portions, and send individually is ideal – easily customizable, free, uniformly supported, flexible in syntax/size

Results O2 XDA Flame chosen for testing – Windows Mobile 5.0 OS Evaluation of stealthiness – CPU, memory, and power consumption Four states – J1: SVC running with backlight off – J2: Camera operational, but recording – J3: Recording Video and compression – J4: Sending File to the intended viewer

Power/CPU Consumption

Results cont. Memory usage is almost constant – SVC uses less than WMP (relevance?) J3 uses a large amount of power and CPU Due primarily to the complexities of the compressions algorithm Performance of SVC can be greatly improved using a better compression algorithm

Author's Opinions Making SVC smarter – More intelligent triggering algorithm Monitor user's living patterns – Exploit image recognition to capture video Resistant to Anti-Virus – AV is useless against new viruses/spyware Security of Phones – Low default security settings on smartphones – Biggest Vulnerability: People are stupid

Our Opinions Windows Media Player? What if the user does not use WiFi/Bluetooth frequently? CPU consumption of J3 When does J4 send the files? – Large CPU consumption

Work Cited Xu, N., Zhang, F., Luo, Y., Jia, W., Xuan, D., and Teng, J Stealthy video capturer: a new video-based spyware in 3G smartphones. In Proceedings of the Second ACM Conference on Wireless Network Security (Zurich, Switzerland, March , 2009).WiSec '09. ACM, New York, NY, 69- ‐78.