Soundminer *

advertisement
Soundcomber :A Stealthy and
Context-Aware Sound Trojan for
Smartphones
Roman Schlegel
City University of Hong Kong
Kehuan Zhang
Xiaoyong Zhou
Mehool Intwala
Apu Kapadia
X i a o F e n g Wa n g
Indiana University Bloomington
N D S S S Y M P O S I U M 2 0 11
報告人:張逸文
Outline
2
 Introduction
 Overview
 Context-Aware Information Collection
 Stealthy Data Transmission
 Defense Architecture
 Evaluation
 Discussion
 Conclusion
Introduction(1/2)
3
 Full-fledged computing platforms
 The plague of data-stealing malware
 Sensory malware, ex:video camera, microphone
 Security protections
 Java virtual machines on Android
 Anti-virus
 Control installing un-trusted software
 Tow new observations
 Context of phone conversation is predictable and fingerprinted
 Built-in covert channel
Introduction(2/2)
4
 Main goal:

Extract a small amount of high-value private data from phone
conversations and transmit it to a malicious party
 Major contributions:
Targeted, context-aware information discovery from sound
recordings
 Stealthy data transmission
 Implementation and evaluation
 Defensive architecture

Outline
5
 Introduction
 Overview
 Context-Aware Information Collection
 Stealthy Data Transmission
 Defense Architecture
 Evaluation
 Discussion
 Conclusion
Overview(1/2)
6
 Assumptions
 work under limited privileges
 Architectural overview
Overview(2/2)
7
 Video Demo.
4392 2588 8888 8888
Outline
8
 Introduction
 Overview
 Context-Aware Information Collection
 Stealthy Data Transmission
 Defense Architecture
 Evaluation
 Discussion
 Conclusion
Context-Aware Information Collection
(1/7)
9
 monitor the phone state
 identify, record, analysis, extract
1. Audio recording
2. Audio processing
3. Targeted data extraction
using profiles
Context-Aware Information Collection(2/7)
10
1. Audio recording
 When to record

Whenever the user initiates a phone call
Recording in the background
 Determining the number called

intercept outgoing phone calls / read contact data
 the first segment compare with keywords in database
 relevant, non-overlapping keywords
 minimize necessary permissions

Context-Aware Information Collection
(3/7)
11
2. Audio processing
 decode file
 speech/tone recognition
 speech/tone extraction
Context-Aware Information Collection(4/7)
12
a)
tone recognition

DTMF(dual-tone multi-frequency)
signaling channel to inform mobile phone network of the pressed key
 aural feedback leaks to side-channel
 Goertzel’s algorithm

Context-Aware Information Collection
(5/7)
13
Speech recognition
b.
Google service:speech recognition functionality
 PocketSphinx
 Segmentation --- contain speech

ns
2
1
k   x j 
ns j 0
1 nf
Recording   k
nf k  0
k  thr
silence
k  thr
sound
thr    Recording
Context-Aware Information Collection(6/7)
14
3. Targeted data extraction using profiles
 focus on IVRs (Interactive Voice Response system)


Phone menus
based on predetermined profiles
Context-Aware Information Collection(7/7)
15

general profiles
Speech signatures
 Sequence detection
 Speech characteristics

Outline
16
 Introduction
 Overview
 Context-Aware Information Collection
 Stealthy Data Transmission
 Defense Architecture
 Evaluation
 Discussion
 Conclusion
Stealthy Data Transmission
17
 Processing centrally isn’t ideal
 No local processing on 1 minute recording → 94KB
 Credit card number → 16 bytes
 Legitimate, existing application with network access
 A paired Trojan application with network access and
communication through covert channel
Leveraging third-party applications
18
 Permission mechanism only restricts individual
application

Ex:using browser open URL http : // target ? number=N
 drawback:more noticeable due to “foreground”
 Ads to cover
Covert channels with paired Trojans(1/4)
19
 paired Trojans:Soundminer, Deliverer
 Installation of paired Trojan applications
 Pop-up ad.
 Packaged app.
 Covert channels on the smartphone




Vibration settings
Volume settings
Screen
File locks
Covert channels with paired Trojans(2/4)
20

Vibration settings
any application can change the vibration settings
 communication channel:every time the setting is changed, the system
sends a notification to interested applications
 saving and restoring original settings at opportune times
 no permissions needed
 not leave any traces

Covert channels with paired Trojans(3/4)
21

Volume settings
not automatically broadcasted
 set and check the volume alternatively
 3 bits per iteration


 1000m s

 Sending at times ts  k  ti
, k  0,......,
 1



Reading at times

miss a window
 2
ts  k  t i  t i
Screen
invisible visible channel
 covert channel:screen settings
 prevent the screen from actually turning on
 permission WAKE_LOCK



ti


Covert channels with paired Trojans(4/4)
22

File locks
exchange information through competing for a file lock
 signaling files, S1,……,Sm
 one data file
 S1~Sm/2 for Soundminer , Sm/2+1~Sm for Deliverer

Outline
23
 Introduction
 Overview
 Context-Aware Information Collection
 Stealthy Data Transmission
 Defense Architecture
 Evaluation
 Discussion
 Conclusion
Defense Architecture
24
 add a context-sensitive reference monitor to control the
AudioFinger service
 block all applications from accessing the audio data
when a sensitive call is in progress
 Reference Service RIL(radio interface layer)

enter/leave a sensitive state
 Controller
 Embedded in the AudioFinger service
 Exclusive Mode / Non-Exclusive Mode
Outline
25
 Introduction
 Overview
 Context-Aware Information Collection
 Stealthy Data Transmission
 Defense Architecture
 Evaluation
 Discussion
 Conclusion
Evaluation(1/2)
26
 Experiment settings
 Environment
 Service hotline detection
 Tone recognition
 Speech recognition --- getrusage()
 Profile-based data discovery --- extracted high-value information
 Cover channel study --- bandwidth in bits per second
 Reference monitor
Evaluation(2/2)
27
 Experiment results
 Effectiveness
Service hotline detection
 Tone/speech recognition
 Detection by anti-virus applications


Performance
Outline
28
 Introduction
 Overview
 Context-Aware Information Collection
 Stealthy Data Transmission
 Defense Architecture
 Evaluation
 Discussion
 Conclusion
Discussion
29
 Improvements on attack
 Defenses
Conclusion
30
 Soundminer, innocuous permissions
 Defense on sensor data stealing
 Highlighted the threat of stealthy sensory malware
31
Thanks ~
Goertzel’s algorithm
32
Performance
33
Download