Leave Me Alone: App-level Protection Against

Slides:



Advertisements
Similar presentations
Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
Advertisements

PScout: Analyzing the Android Permission Specification
David Grochocki et al.  Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just.
Roman Schlegel City University of Hong Kong Kehuan Zhang Xiaoyong Zhou Mehool Intwala Apu Kapadia XiaoFeng Wang Indiana University Bloomington NDSS SYMPOSIUM.
What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
By : Versha Thakur Shravani Aishwarya
Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks Qi Alfred Chen, Zhiyun Qian†, Z. Morley Mao University of.
Institute of Networking and Multimedia, National Taiwan University, Jun-14, 2014.
Aurasium: Practical Policy Enforcement for Android Applications R. Xu, H. Saidi and R. Anderson Presented By: Rajat Khandelwal – 2009CS10209 Parikshit.
Lecture 1: History of Operating System
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
ITEC0722: Mobile Business and Implementation: Mobile Applications Suronapee Phoomvuthisarn, Ph.D.
Case study 2 Android – Mobile OS.
William Enck, Machigar Ongtang, and Patrick McDaniel.
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
EXPLOITING VOIP SILENCE FOR WIFI ENERGY SAVINGS IN SMART PHONES Andrew J. Pyles 1, Zhen Ren 1, Gang Zhou 1, Xue Liu 2 1 College of William and Mary, 2.
Dr. XiaoFeng Wang © SpyShield: Preserving Privacy from Spy Add-ons Zhuowei Li, XiaoFeng Wang and Jong Youl Choi Indiana University at Bloomington.
eScan Total Security Suite with Cloud Security
Introduction Our Topic: Mobile Security Why is mobile security important?
Detecting and Preventing Privilege- Escalation on Android Jiaojiao Fu 1.
ConfidentialPA Testing Mobile Applications A Model for Mobile Testing.
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
Kenichi Kourai (Kyushu Institute of Technology) Takuya Nagata (Kyushu Institute of Technology) A Secure Framework for Monitoring Operating Systems Using.
University of Central Florida TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones Written by Enck, Gilbert,
Chapter 5: Implementing Intrusion Prevention
TEMPLATE DESIGN © Department of Information Technology, Computing and Information Technology, King Abdul Aziz University.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Submission doc.: IEEE 11-13/0523r2 May 2013 Katsuo Yunoki, KDDI R&D LaboratoriesSlide 1 Understanding Current Situation of Public Wi-Fi Usage - Possible.
Checking More Alerting Less PRESENTED BY: AMIN ROIS SINUNG NUGROHO.
Operating System Principles And Multitasking
Leave Me Alone: App- level Protection Against Runtime Information Gathering on Android NAN ZHANG, KAN YUAN, MUHAMMAD NAVEED†, XIAOYONG ZHOU AND XIAOFENG.
The Smart watch 1. ① Introduction ② ADVT.&DISADVT. ③ Examples ④ Future ⑤ Conclusion Agenda 2.
Embedded System Lab. 정범종 A_DRM: Architecture-aware Distributed Resource Management of Virtualized Clusters H. Wang et al. VEE, 2015.
© 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other marks contained herein are trademarks of AT&T Intellectual Property.
Analyzing the Security Infrastructure of the Android Operating System REU TEAM :: Derek Morris Jr., Derrick Baines, Ashley Brown, Raquel Lawrence.
Monitoring and Managing Server Performance. Server Monitoring To become familiar with the server’s performance – typical behavior Prevent problems before.
Wireless and Mobile Security
Title of Presentation DD/MM/YYYY © 2015 Skycure Why Are Hackers Winning the Mobile Malware Battle.
SubVirt: Implementing malware with virtual machines Authors: Samuel T. King, Peter M. Chen University of Michigan Yi-Min Wang, Chad Verbowski, Helen J.
Dilip Dwarakanath.  The topic I’m about to present was taken from a paper titled “Apple iOS 4 Security Evaluation” written by Dino A Dai Zovi.  Dino.
Chapter 8 System Management Semester 2. Objectives  Evaluating an operating system  Cooperation among components  The role of memory, processor,
Power Guru: Implementing Smart Power Management on the Android Platform Written by Raef Mchaymech.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Denial of Convenience Attack to Smartphones Using a Fake Wi-Fi Access Point Erich Dondyk, Cliff C. Zou University of Central Florida.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Android and IOS Permissions Why are they here and what do they want from me?
AppAudit Effective Real-time Android Application Auditing Andrew Jeong
What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources Literature by S. Demetriou et al. Presented.
“What the is That? Deception and Countermeasures in the Android User Interface” Presented by Luke Moors.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
WHAT THE APP IS THAT? DECEPTION AND COUNTERMEASURES IN THE ANDROID USER INTERFACE.
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
Authors Roman Schlegel Kehuan Zhang Xiaoyong Zhou Mehool Intwala Apu Kapadia XiaoFeng Wang Soundcomber : A Stealthy and Context-Aware Sound Trojan for.
Safety, Security & Savings
Free for All! Assessing User Data Exposure to Advertising Libraries on Android Campbell Foskin.
Security Methods and Practice CET4884
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime Sadiq Basha.
Security of Mobile Operating Systems
HanGuard: SDN-driven Protection of Smart Home WiFi Devices from Malicious Mobile Apps Good morning. My name is Soteris Demetriou and I am a PhD student.
Cloud Testing Shilpi Chugh.
Internet of Things Vulnerabilities
Home Internet Vulnerabilities
Suwen Zhu, Long Lu, Kapil Singh
“Location Privacy Protection for Smartphone Users”
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Management From the memory view, we can list four important tasks that the OS is responsible for ; To know the used and unused memory partitions To allocate.
Presentation transcript:

Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android Nan Zhang∗, Kan Yuan∗, Muhammad Naveed†, Xiaoyong Zhou∗ and XiaoFeng Wang∗ Presenter: Fan Luo Revised from authors’ slides

Road Map RIG (Runtime Information Gathering) Protection against RIG Implementation and Evaluation

RIG Attacks Runtime-Information-Gathering (RIG) - Collect runtime information from target app (the victim) - Directly steal or indirectly infer sensitive user information 1) Design weaknesses of the OS shared communication channels such as Bluetooth 2) Side channels memory and network-data usages In all these attacks, a malicious app needs to run side-by-side with the target app (the victim) to collect its runtime information.  RIG attacks exploit apps to obtain sensitive user data “ranging from phone conversations to health information;” RIG, in this case, refers to “any malicious activities that involve collected data produced or receive by an app during its execution, in an attempt to directly steal or indirectly infer sensitive user information.” Stealing of sensitive information from apps is always considered to be one of the most critical threats to Android security. Recent studies show that this can happen even to the apps without explicit implementation flaws, through 1)exploiting some design weaknesses of the operating system, e.g., shared communication channels such as Bluetooth, and 2) side channels such as memory and network-data usages. 

Android Permission Issues Voice Recorder can tape any phone conversation. Determine user’s driving route with Google Navigator Game app with Bluetooth permission can also download patient data from a Bluetooth glucose meter Android user’s driving route could be determined by looking at sequences of the duration for the voice guidance produced by Google Navigator. A malicious app can abuse the permission it gets “to directly collect sensitive data from the target app running in the foreground.” a game app with the Bluetooth permission for connecting to its playpad can also download patient data from a Bluetooth glucose meter.” An official app of an external medical device, such as a blood glucose meter, can be monitored for collecting patient data from the device through the Bluetooth channel, before the official app is able to establish its connection with the device.

Android-based Internet of Things (IoT) IoT Devices 1. Belkin NetCam Wi-Fi Camera with Night Vision Designed for home surveillance and motion detection Report to the house owner remotely 2. Nest Protect Shipped 440,000 of its smoke alarms in the United States between Nov. 2013 and Apr. 2014 Android-controlled IoT devices such as Belkin NetCam Wi-Fi Camera with Night Vision and Nest Protect are equally vulnerable to RIG attacks. runtime-information-gathering (RIG) attacks an emerging security threat to Android and Android-based Internet of Things (IoT) systems. Belkin NetCam is a wireless IP camera designed for home surveillance and motion detection. It can detect burglars or other persons presence using motion detection and report the house owner remotely. Malware monitoring popular Android-based home security systems can figure out when the house is empty and the user is not looking at surveillance cameras, and even turn off the alarm delivered to her phone.

NetCam Communication Model

Utilize two side channels NetCam Attacks Utilize two side channels Traffic statistics: tcp_snd and tcp_rcv CPU usage: /proc/<pid>/stat Three steps Infer if anybody is at home Mute alarm Infer anybody is watching surveillance Motion Detection can be used by an adversary for malicious purposes such as theft or robbery.

How to Protect from RIG attack ?

Enhancing access control causes compatibility issues Previous Works Enhancing access control causes compatibility issues + Prevent information leaks during security-critical operations such as phone calls + Remove public resources that could be used for a side-channel analysis - Inevitably make the system less usable - Cause compatibility issues modifying either the Android OS or the apps under the threat. Specifically, one can enhance Android’s access control mechanism to prevent information leaks during security-critical operations such as phone calls, and remove the public resources that could be used for a side-channel analysis. This, however inevitably makes the system less usable and causes compatibility issues for the apps that already utilize the public resources for legitimate purposes (mobile-data monitor [16

Previous Works Modify OS Complicated and painful (Android OS ecosystem: fragmentation) New protection takes a long time before it can reach Android devices worldwide; New RIG attacks continue to be brought to the spotlight; It is less clear what an app can do by itself to control its information exposed by the OS. due to the fragmentation of the Android ecosystem deployment of any OS-level solution is often complicated and painful: whenever Google comes up with a patch, individual device manufacturers need to customize it for all their devices before passing its variations to the carriers, who will ultimately decide whether to release them and when to do that. Even in the case that the manufacturers are willing to build the protection into their new products, given the slow pace with which Android devices are upgraded, it is almost certain that the new protection will take a long time before it can reach any significant portion of the 1 billion Android devices worldwide On the other hand, new RIG attacks continue to be brought to the spotlight [2], [4], [5], [7], [17]–[19], effective mitigation is therefore in an urgent need for safeguarding Android users private information. Furthermore, pushing the problem to the app developers is by no means a good idea, as it is less clear what an app can do by itself to control its information exposed by the OS: for example, it cannot disable the recording activity of another app; also adding noise to an app’s CPU, memory and data statistics may not eliminate the side-channel leaks and certainly increases its performance overhead.

App Guardian Information Gathering - Permissions, side-channels Install / Run time features Report suspicious apps kill suspicious app Principal finished Resume suspicious app The researchers proposed a novel technique to defend against “this new category of attacks;” they developed App Guardian, which “changes neither the operating system nor the target apps, and provides immediate protection as soon as an ordinary app (with only normal and dangerous permissions) is installed.” Their app thwarts a malicious app’s runtime monitoring attempt by pausing all suspicious background processes when the target app is running; it then automatically resumes them after the app stops.

Life cycle of Guardian Protection Normal Mode Ward Mode Ward Mode

Monitoring

Entering the ward

Entering the ward oom_adj score (-17 ~ 15) (typically) 9 2

Exiting the ward

Impacts on Performance Close an app which might be restarted later + App states are well preserved - Take longer time than Switch to foreground

Finding suspicious App Use malicious app’s side channel

Finding suspicious App (Cont.) Data Stealing Attacks 1. RECORD_AUDIO permission 2. Start Audioin_X process to record audio (/proc/<pid>/task/<tid>/status) Side-channel Attacks How frequently app uses the CPU resources Number of times schedule to use CPU

Behavior change Challenge: - keep low profile before the principal show up - act aggressively afterwards Solution: Pearson correlation coefficient (r)

Collusion Challenge: Solution: Multiple apps sample at a lower rate but still collect sufficient information Solution: Grouping apps with same signature Detect link-installed apps Ask user if less obvious recommenendation

Use startForceground to start a service Self Protection Use startForceground to start a service Prevent it from killed by KILL_BACKGROUND_PROCESSES

Evaluation and analysis

Effectiveness Defeat all 12 RIG Attacks

Effectiveness

Utility Impacts and Performance 475 popular Apps from 27 categories on Google Play Store - 92 apps (19.3%) apps potentially needs to be closed - 8 apps (1.68%) may affect phone users’ experience

Overhead CPU & Memory usage Two Nexus5 phones with 250 apps installed on each - In ward mode, 5% CPU Resource, 40MB Memory - Out of ward mode, < 1% CPU Battery Usage Two Nexus5 phones with 50 apps installed on each - In ward mode, 0.12% ~ 0.18% per hour - Out of ward mode, 0.75% ~ 1.05% per day - Estimate a day, 0.84~ 1.18% per day

Discussion and future work Detection and Separation A more accurate identification of malicious activities will help Background process protection Protect background process at minimal cost Sanitization Thoroughly clean up the principals’ execution environment after the program stop running Possible side-channel attack on iOS / WatchOS

Serious of RIG attacks on Android Conclusion Serious of RIG attacks on Android IoT systems are also vulnerable App Guardian App level protection Uses side channel to protect principle

Questions 1. Why there is an urgent need to mitigate the RIG threat to mobile devices ? 2. What have been achieved by App Guardian? 3. Two main idea of App Guardian ?

Thank you !