Android’s Malware Attack, Stealthiness and Defense: An Improvement Mohammad Ali, Humayun Ali and Zahid Anwar 2011 Frontiers of Information Technology.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Roman Schlegel City University of Hong Kong Kehuan Zhang Xiaoyong Zhou Mehool Intwala Apu Kapadia XiaoFeng Wang Indiana University Bloomington NDSS SYMPOSIUM.
Automated Remote Repair for Mobile Malware Yacin Nadji, Jonathon Giffin, Patrick Traynor Georgia Institute of Technology ACSAC’ 11.
Analysis of the Communication between Colluding Applications on Modern Smartphones Claudio Marforio 1, Hubert Ritzdorf 1, Aurélien Francillon 2, Srdjan.
Aurasium: Practical Policy Enforcement for Android Applications R. Xu, H. Saidi and R. Anderson Presented By: Rajat Khandelwal – 2009CS10209 Parikshit.
Aurasium: Practical Policy Enforcement for Android Applications R. Xu, H. Saidi and R. Anderson.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
DAN WALLACH, RICE UNIVERSITY PRESENTED BY: FERAS AL TAROUTI Smartphone Security: Trends and Predictions.
SMS Mobile Botnet Detection Using A Multi-Agent System Abdullah Alzahrani, Natalia Stakhanova, and Ali A. Ghorbani Faculty of Computer Science, University.
William Enck, Machigar Ongtang, and Patrick McDaniel.
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
Trojan Virus Presented by Andy Lindberg & Denver Bohling.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Cyber Crimes.
Detecting and Preventing Privilege- Escalation on Android Jiaojiao Fu 1.
APT29 HAMMERTOSS Jayakrishnan M.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Monitoring Architecture for Lawful Interception in VoIP Networks Second International Conference on Internet Monitoring and Protection (ICIMP 2007), IEEE.
Introduction and Overview Questions answered in this lecture: What is an operating system? How have operating systems evolved? Why study operating systems?
Active Security Ryan Hand, Michael Ton, Eric Keller.
KAIST Internet Security Lab. CS710 Behavioral Detection of Malware on Mobile Handsets MobiSys 2008, Abhijit Bose et al 이 승 민.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
VMM Based Rootkit Detection on Android
Cybersecurity Test Review Introduction to Digital Technology.
Mobile Device Security Threats Christina Blakley Host Computer Security.
THREATS, VULNERABILITIES IN ANDROID OS BY DNYANADA PRAMOD ARJUNWADKAR AJINKYA THORVE Guided by, Prof. Shambhu Upadhyay.
Covert Channels Eric Pennington COSC480. Common Network Threats  Viruses, Trojans, Worms, etc.  Password Attacks  Eavesdropping  Port Scanning  Not.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
ANDROID ACCESS CONTROL Presented by: Justin Williams Masters of Computer Science Candidate.
How To Remove Flooders?-Get Help Website:
Authors Roman Schlegel Kehuan Zhang Xiaoyong Zhou Mehool Intwala Apu Kapadia XiaoFeng Wang Soundcomber : A Stealthy and Context-Aware Sound Trojan for.
Botnets A collection of compromised machines
Application layer tcp/ip
TriggerScope: Towards Detecting Logic Bombs in Android Applications
3.6 Fundamentals of cyber security
Secure Software Confidentiality Integrity Data Security Authentication
AUDACIOUS: USER DRIVEN ACCESS CONTROL WITH UNMODIFIED OPERATING SYSTEM
The Open Grid Service Architecture (OGSA) Standard for Grid Computing
Secure Sockets Layer (SSL)
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Chapter 2: System Structures
Understanding the OSI Reference Model
Botnets A collection of compromised machines
How to Get Rid of Online Threats Impacting your Computer Device?
Security in Networking
TriggerScope Towards detecting logic bombs in android applications
Lecture 1 Line Encoding 2nd semester
Building communicating web applications leveraging endpoints and cloud resource service Problem Summary: aRtisy (R-T-C) is a developer platform and SDK.
Firewalls Jiang Long Spring 2002.
Securing Windows 7 Lesson 10.
Operating Systems : Overview
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
ONLINE SECURE DATA SERVICE
Operating Systems : Overview
Understanding Android Security
Operating System Concepts
Designing IIS Security (IIS – Internet Information Service)
Web Servers (IIS and Apache)
Chapter 13: I/O Systems.
Week 7 - Wednesday CS363.
Chapter 3 Software.
Presentation transcript:

Android’s Malware Attack, Stealthiness and Defense: An Improvement Mohammad Ali, Humayun Ali and Zahid Anwar 2011 Frontiers of Information Technology

Introduction New challenges to the security Smartphone prone to malwares and trojans A number or approaches have been implemented and proposed to avoid the installation and threats of malicious apps

Behavioral based detection of malware Mechanism to mediate the interaction between apps using security policies No apparent way for malware to perform malicious activities Communicate sensitive information to malicious server

These security mechanisms can be evaded Developing sophisticated malwares Using least and non-malicious combination of permissions Collected information can be communicated to master malicious server with covert channel Using various mechanisms present for different purpose than what they are offered

Mechanisms of the system used to send information that violate the security policy of the system Seem legitimate and provide an implicit way to know two or more application to convey 2 major types of covert channel Storage channel Timing channel

Storage channel Shared mechanism between two processes / application one application is information writer One is information reader

Timing channel Signaling of one process / application to the other process / application Modifying / changing system attributes

Using 2 apps, app1, app2 App1 grabs the sensitive data and send to app2 App2 is a general normal app, eg: a web browser The data sent to app2 is sent out to the master server through internet

How its works Having 2 apps, but communicating in different way Architecture used by soundcomber

2 apps in this architecture Soundcomber app and deliverer app Soundcomber collect sensitive information Using 4 different kinds of covert channels to share information with deliverer app Vibration settings Volume settings Screen brightness settings File locks

Changes levels of volume to transmit bits of information to the deliverer app Deliverer app observing the changes of volume settings Same logic is used in case of the other two methods – vibration and screen brightness settings File locks used to synchronize the write and read of data on a separate file between apps

How to enhance soundcomber architeture Identification of a new covert channel Eg: exchanging information using file permission Implemented this covert channel which comprises collector and deliverer apps Collector and deliverer apps continue to monitor the activity of the file created or deleted by this mechanism Collector app only continues it works if the private files is deleted

Private file is not created when the collector app is collect data After collecting data, it writes file permission on 10 different files. Permission are written to files in a way that permissions contain bits of data to be transmitted After writing permissions, the collector apps finally creates private file Deliverer apps will read the permissions of those 10 files

After done reading permissions, the deliverer apps converts it into the meaningful information and then transmits to master server

Enhancement in efficiency of architecture using basic compression Credit card number and pin is totally random 4 bits used for each number form 0-9 Credit card number required 4*16 = 64bits

Convert directly to its binary representation = 54 bits 10 bits of compression is achieved 54bits/CCN

Implementation

Defense possibilities Block the covert channel of file permission by limiting the rights of the apps by restricting them to do not delete files of other apps Modifying the kernel of android os Monitors these defense mechanisms

Conclusion Lots of work has been done to block malwares in android phones Almost no work is done in defining mechanisms/ frameworks, policies and implementing them to block covert channels