Taming Mr Hayes: Mitigating Signaling Based Attacks on Smartphones Colin Mulliner, Steffen Liebergeld, Matthias Lannge, and Jean-Pierre Seifert Technische.

Slides:



Advertisements
Similar presentations
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Advertisements

Rootkits on Smart Phones: Attacks, Implications and Opportunities Jeffrey Bickford, Ryan O’Hare, Arati Baliga, Vinod Ganapathy, and Liviu Iftode Department.
EXTENSIBILITY, SAFETY AND PERFORMANCE IN THE SPIN OPERATING SYSTEM B. Bershad, S. Savage, P. Pardyak, E. G. Sirer, D. Becker, M. Fiuczynski, C. Chambers,
On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core Patrick Michael Lin, Machigar Ongtang, Vikhyath.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
By : Versha Thakur Shravani Aishwarya
Automated Remote Repair for Mobile Malware Yacin Nadji, Jonathon Giffin, Patrick Traynor Georgia Institute of Technology ACSAC’ 11.
Vivek-Vijayan University of Tennessee at Chattanooga.
Introduction to Operating Systems CS-2301 B-term Introduction to Operating Systems CS-2301, System Programming for Non-majors (Slides include materials.
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
Figure 1.1 Interaction between applications and the operating system.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition Chapter 2: Operating-System Structures Modified from the text book.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3 Operating System Organization.
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
Senior Design May AbstractDesign Alex Frisvold Alex Meyer Nazmus Sakib Eric Van Buren Our project is to develop a working emulator for an Android.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
Tanenbaum 8.3 See references
SECURING NETWORKS USING SDN AND MACHINE LEARNING DRAGOS COMANECI –
A.C. Chen ADL M Zubair Rafique Muhammad Khurram Khan Khaled Alghathbar Muddassar Farooq The 8th FTRA International Conference on Secure and.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
정보보호 및 알고리즘 조호성. Contents 정보보호 및 알고리즘 2.
CS533 Concepts of Operating Systems Jonathan Walpole.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
An approach to on the fly activation and deactivation of virtualization-based security systems Denis Efremov Pavel Iakovenko
VirtualBox What you need to know to build a Virtual Machine.
Beyond Kernel-level Integrity Measurement: Enabling Remote Attestation for the Android Platform Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean- Pierre.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Chapter 4 Application Level Security in Cellular Networks.
The Performance of Micro-Kernel- Based Systems H. Haertig, M. Hohmuth, J. Liedtke, S. Schoenberg, J. Wolter Presentation by: Seungweon Park.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
VxWorks Fall 2005 Final Project CS 450: Operating Systems Section 1 Kenneth White Josh Houck Karl Ridgeway Mike Ripley Morgan Serene.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Processes Introduction to Operating Systems: Module 3.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
Vulnerability Study of the Android Ryan Selley, Swapnil Shinde, Michael Tanner, Madhura Tipnis, Colin Vinson (Group 8)
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
Wireless and Mobile Security
The Performance of Micro-Kernel- Based Systems H. Haertig, M. Hohmuth, J. Liedtke, S. Schoenberg, J. Wolter Presentation by: Tim Hamilton.
MIDORI The Windows Killer!! by- Sagar R. Yeole Under the guidance of- Prof. T. A. Chavan.
2.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition System Programs (p73) System programs provide a convenient environment.
VMM Based Rootkit Detection on Android
Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, and Thomas La Porta 2/29/2012.
Analysis And Research Of System Security Based On.
By: Collin Molnar. Overview  Intro to Android  Security basics  Android architecture  Application isolation  Application permissions  Physical access.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 2 Introduction to Routers.
Module 54 (Cellular Telephone Network Security)
Computer System Structures
Threat, Analysis and Mitigation
“New security software vendors are coming into the marketplace offering solutions that provide support to the development environment. Example vendors.
Operating System Structures
Why VT-d Direct memory access (DMA) is a method that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing.
Mobile Operating System
Chapter 2: System Structures
Operating System Structure
Exam Review.
MOBILE DEVICE OPERATING SYSTEM
OS Virtualization.
GPRS GPRS stands for General Packet Radio System. GPRS provides packet radio access for mobile Global System for Mobile Communications (GSM) and time-division.
Chapter 2: The Linux System Part 1
Outline Chapter 2 (cont) OS Design OS structure
System calls….. C-program->POSIX call
Presentation transcript:

Taming Mr Hayes: Mitigating Signaling Based Attacks on Smartphones Colin Mulliner, Steffen Liebergeld, Matthias Lannge, and Jean-Pierre Seifert Technische Universitat Berlin and Deutsche Telekom Laboratories

Outline  Introduction  Background  Threats  Design  Implementation  The AT Command Filter  Conclusions

Introduction  Mobile botnets hijack mobile phone to produce signaling traffic sent from mobile phones to the cellular network core. – DDoS  Rooted smartphones disable protection mechanisms. Applications may launch intentional malicious activity and accidental harmful operations.

Introduction  Protect the cellular network infrastructure from malicious smartphones  Virtual modem  Device-side protection system  Android-based  AT-command filter  The OS is separated from the baseband  Safe-to-root virtualized Android

Background  Cellular Network Architecture

Background  Cellular Signaling  Signaling traffic  MSC and HLR  Voice call, SMS, and updating account settings  Packet-data  SGSN, GGSN, and HLR  Packet Data Protocol (PDP)  ME establishes a PDP context by sending a GPRS-attach message to SGSN.

Background  Smartphone Architecture Baseband Processor Application Processor

Threats  Hijacked Phones and Mobile Botnets  PDP Context Change  Premium Rate SMS Trojans  Rooted Phones

Threats  Hijacked Phones and Mobile Botnets  ikee.B iPhone botnet infects about 22,000 devices  HTTP-based C&C channel  Traynor et al. issue the AT command to configure and enable call-forwarding settings in order to cause a high load on the HLR.  Mobile botnets use SMS messages for C&C.

Threats  PDP context activation and de-activation leads to high network load on the GGSN and SGSN.  On Android, it’s possible to force an PDP context change every 2 seconds.  43,200 PDP activation per day.  Pre-paid SIM cards may cause DoS attacks.

Threats  Premium Rate SMS Trojans  FakePlayer-A  The same problem applies to voice calls to premium numbers  android.permission.SEND_SMS

Threats  Rooted Phones  Simply install a modified firmware on the device  Exploiting known security flaws  EX: DroidDream

Design  Virtualize  Isolated  Assume the device’s DMA feature can be restricted to safe memory locations.  IO-MMU

Design  Micro Kernel as Secure Foundation  Modern third-generation micro kernels implement object- capabilitiesobject- capabilities  POLA (principle of least authority)

Design  Virtualized Android  Smartphone CPUs are not natively virtualizable.  The overhead of running a monolithic OS on top of a micro kernel is between 5 and 10 percent.  Enforce Android to access the baseband by not giving it access to the baseband’s IO memory.  Safe-to-root  A commercial version requires a bootloader that is capable of restricting updates to the Android partition.

Design  Virtual Modem  Baseband driver  Virtual serial interface  AT command filter  Virtual network interface  IP filter  NAT

Implementation  Intel x86-based smartphone  Moorestown platform (SOC)  Atom core  ST-Ericsson U300 – baseband  Fiasco.OC micro kernel  A L4 micro kernel

Implementation  L4Android  Based on L4Linux  L4Android kernel ABI is compatible with Android

Implementation  System Setup L4AndroidL4Linux

Implementation  L4Linux  Booting and initializing the baseband  Running baseband driver

Implementation  Modifications to Android RIL  libreference-ril.so  libsect-ril.so  They built their own abstraction library

The AT Command Filter  AT Command and Man-machine Interface (MMI) ##002# MMI Phone app AT Command AT+CCFC=0,4 AT Command AT+CCFC=0,4

The AT Command Filter AT+CGDCONT Configure a PDP context AT+CGACT Activated a configured PDP AT*EPPSD PDP context control for our ST-Ericsson baseband AT+CMGS Send an SMS message ATD+ ; Initiates a voice call to given number AT+CCFC Configure, activate, and de-activate call- forwarding settings AT+CFUN Configuration of the baseband state

The AT Command Filter  PDP Context Setup on the STE Baseband

The AT Command Filter  Special Problem  Special case APN  APN for MMS  Command side effects  If the baseband is switched between 2G and 3G, the PDP context is disconnected and reconnected

The AT Command Filter  Filtering AT Commands  AT_CCFC_interval = 60 (seconds)  AT_CCFC_threshold = 5 (# commands)

The AT Command Filter  SMS Filter  Short code detector  Short code (4-6 digits): Premium rate numbers  Block all SMS to short codes  Future work: secure GUI for legit SMS to short codes  Binary Message Payload Detector  Non-printable characters  Base64 encoding

The AT Command Filter  Blocking Commands  To not confuse the application logic in the RIL, our filter would inject the error message into the stream that carries the responses from the baseband to the RIL  Some commands are never blocked  Switch to flight mode (AT+CFUN=4)  PDP context deactivation (AT*EPPSD)  Emergency calls (ATD 911;)

The AT Command Filter  Profiling Benign AT Command Usage  Count the number of commands used Command#WhenWhy AT+CFUN2BootFlight mode. Normal mode. AT+CFUN1UseSwitch to GSM-only. AT+CDGMNT1BootSet PDP configuration. AT*EPPSD1BootActivate PDP context. AT+CMGS1UseSend a SMS message. ATD1UseIssue a voice call. AT+CCFC3UseQuery forwarding settings. AT+CCFC2UseSet a call-forwarding.

Evaluation  Setting  nanoBTS - openBSC  Faraday Cage

Evaluation  Limiting the Call-forwarding Attack [ref][ref]  2,500 TPS (Transactions per second) for low traffic network  30,000 TPS for high traffic network  AT+CCFC takes 4.7 seconds  12 commands per minute  4.7 seconds * 2,500 TPS = 11,750 hosts  Threshold = 5 commands / minutes

Evaluation

 Limiting PDP Context Changes  Switch the baseband mode between GSM-only, 3G-only, and GSM+3G  The threshold for PDP context changes, p t  The threshold for AT*EPPSD commands, e t  The threhold for AT+CFUN commands, c t  P t = e t + c t  Without any limit, 30 changes per minute is the maximum possible

Evaluation

 SMS Trojan  FakePlayer-A premium SMS Trojan  Number 3353

Evaluation  SMS Controlled Botnets  Binary Payload Detector  Blocking text messages will be complicated since they would need to be analyzed thoroughly before one is able to safety block them

Conclusions  Virtual modem  Future work  VPN Gateway  Advanced IDS/IPS  Policy Update Infrastructure  Secure GUI  Hardware Virtualization