Presentation is loading. Please wait.

Presentation is loading. Please wait.

FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment E. Fernandes, B. Crispo, M. Conti IEEE Transactions on Information Forensics.

Similar presentations


Presentation on theme: "FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment E. Fernandes, B. Crispo, M. Conti IEEE Transactions on Information Forensics."— Presentation transcript:

1 FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment E. Fernandes, B. Crispo, M. Conti IEEE Transactions on Information Forensics and Security 8(6): (2013)

2 Take Home Message  New attack vector with interesting features...for attackers  Learning and exploiting security weakness of Android security model and its implementation  Inadequateness of existing mobile AV solutions

3 FM Radio

4 FM Radio Data System (RDS) Baseband coding 1,187.5 bits per second on a 57 kHz subcarrier

5 Our FM Radio Attack  New attack vector: FM RDS broadcast channel  Exploiting vulnerability of Android and FM Radio API  Cross-device: Smartphone, Car Radio, USB token  Cost <500$ Antenna RDS Encoder Audio Signal Transmitter Circuit RS232 Control Receiver Antenna

6 Attack

7 Actual AVs do not help AntivirusCategoryExploitConfigurationDetected? Norton Mobile Security Lite FreeGingerBreakAnti-Malware defense activated, Daily scan, SD Card scan No Lookout SecurityFreeGingerBreakDaily scan, “security" activated, complete scan when malware was installed No AVG Antivirus Pro PaidGingerBreakFull scan modeNo Kaspersky Mobile Security PaidGingerBreakFull scan with malware existing in binary form in app directory, also Memory Scan while malware in main memory, with exploit in binary form in app directory No AVG Security ProPaidGingerBreakFull scan modeNo

8 Unique Features  Zero-fingerpring Attack  Broadcast  Geographic Attack  Can target a specific physical perimeter

9 Old Lessons Confirmed  One-fits-All paradygm is very bad for security  But good for interoperabiliy, time-to-market, ROI  Shortcuts to bypass the security model can only create problems  Difficult for a model to accomodate: openess, evolution and adaptation


Download ppt "FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment E. Fernandes, B. Crispo, M. Conti IEEE Transactions on Information Forensics."

Similar presentations


Ads by Google