Presentation is loading. Please wait.

Presentation is loading. Please wait.

Android’s Malware Attack, Stealthiness and Defense: An Improvement Mohammad Ali, Humayun Ali and Zahid Anwar 2011 Frontiers of Information Technology.

Similar presentations


Presentation on theme: "Android’s Malware Attack, Stealthiness and Defense: An Improvement Mohammad Ali, Humayun Ali and Zahid Anwar 2011 Frontiers of Information Technology."— Presentation transcript:

1 Android’s Malware Attack, Stealthiness and Defense: An Improvement Mohammad Ali, Humayun Ali and Zahid Anwar 2011 Frontiers of Information Technology

2 Introduction New challenges to the security Smartphone prone to malwares and trojans A number or approaches have been implemented and proposed to avoid the installation and threats of malicious apps

3 Behavioral based detection of malware Mechanism to mediate the interaction between apps using security policies No apparent way for malware to perform malicious activities Communicate sensitive information to malicious server

4 These security mechanisms can be evaded Developing sophisticated malwares Using least and non-malicious combination of permissions Collected information can be communicated to master malicious server with covert channel Using various mechanisms present for different purpose than what they are offered

5 Mechanisms of the system used to send information that violate the security policy of the system Seem legitimate and provide an implicit way to know two or more application to convey 2 major types of covert channel Storage channel Timing channel

6 Storage channel Shared mechanism between two processes / application one application is information writer One is information reader

7 Timing channel Signaling of one process / application to the other process / application Modifying / changing system attributes

8 Using 2 apps, app1, app2 App1 grabs the sensitive data and send to app2 App2 is a general normal app, eg: a web browser The data sent to app2 is sent out to the master server through internet

9 How its works Having 2 apps, but communicating in different way Architecture used by soundcomber

10 2 apps in this architecture Soundcomber app and deliverer app Soundcomber collect sensitive information Using 4 different kinds of covert channels to share information with deliverer app Vibration settings Volume settings Screen brightness settings File locks

11 Changes levels of volume to transmit bits of information to the deliverer app Deliverer app observing the changes of volume settings Same logic is used in case of the other two methods – vibration and screen brightness settings File locks used to synchronize the write and read of data on a separate file between apps

12 How to enhance soundcomber architeture Identification of a new covert channel Eg: exchanging information using file permission Implemented this covert channel which comprises collector and deliverer apps Collector and deliverer apps continue to monitor the activity of the file created or deleted by this mechanism Collector app only continues it works if the private files is deleted

13 Private file is not created when the collector app is collect data After collecting data, it writes file permission on 10 different files. Permission are written to files in a way that permissions contain bits of data to be transmitted After writing permissions, the collector apps finally creates private file Deliverer apps will read the permissions of those 10 files

14 After done reading permissions, the deliverer apps converts it into the meaningful information and then transmits to master server

15 Enhancement in efficiency of architecture using basic compression Credit card number and pin is totally random 4 bits used for each number form 0-9 Credit card number required 4*16 = 64bits

16 Convert directly to its binary representation = 54 bits 10 bits of compression is achieved 54bits/CCN

17 Implementation

18 Defense possibilities Block the covert channel of file permission by limiting the rights of the apps by restricting them to do not delete files of other apps Modifying the kernel of android os Monitors these defense mechanisms

19 Conclusion Lots of work has been done to block malwares in android phones Almost no work is done in defining mechanisms/ frameworks, policies and implementing them to block covert channels


Download ppt "Android’s Malware Attack, Stealthiness and Defense: An Improvement Mohammad Ali, Humayun Ali and Zahid Anwar 2011 Frontiers of Information Technology."

Similar presentations


Ads by Google