170 likes | 253 Views
Defending against Sniffing Attacks on Mobile Phones . Liang Cai (University of California, Davis), Sridhar Machiraju (Sprint Applied Research), Hao Chen (University of California, Davis) MobiHeld 2009, An ACM SIGCOMM 2009 workshop . Outline. Problem scope How app. Use sensors?
E N D
Defending against Sniffing Attacks on Mobile Phones Liang Cai (University of California, Davis), Sridhar Machiraju (Sprint Applied Research), Hao Chen (University of California, Davis) MobiHeld 2009, An ACM SIGCOMM 2009 workshop
Outline • Problem scope • How app. Use sensors? • 3 key modules & Framework • Distinction • Novel solutions • Contribution • Future research
Problem scope • Privacy based on sensors of mobile devices. • Mainly: microphone, camera, and GPS receiver. • Not consider about what attacks have been investigated extensively on desktop computers.
Problem scope • Threat model • Assumption 1: the attacker can install malware on mobile device. • Assumption 2: the attacker have no physical access to compromised mobile device; only via voice or data channels: phone calls, SMS, MMS, TCP connections. • Assumption 3: the attacker cannot compromise the operating system. And if OS is vulnerable, we could move the mechanisms into VM/firmware.
How app. Use sensors? • Dominated by sensors: start, end. • Supported by sensors: start, end. • Context Provided by sensors: continuously. • And a hardware switch might work hard.
3 key modules • User interaction • Policy engine • Interceptor
Module 1: Policy Engine & App monitoring • Whitelisting & blacklisting • Information flow tracking(no network) • Airscanner Mobile Sniffer
Module 2: User interaction • User authorization(to sensor) • Sensor in using notification
Module 3: interceptor • Locking – by a daemon program opening it • bad • Blocking – yet have the risk of losing critical data. • Then?
Distinction • Distinctions between sniffing attacks and general malware attacks: • Sensor-sniffing: could use allow but notify approach. • General malware: For the confidentiality of the file may be violated immediately, the approach is inappropriate.
Novel solutions 1: Context-aware • require no user interaction • Location tagging • Activity inference • Disappoints • maybe imprecise • only to certain sensors, e.g., difficult for GPS.
Novel solutions 2: Leveraging • 利用現有的 • E.g.: hangup button & talk button to microphone(hardware).
Novel solutions 3: Through encryption • Ensuring both security and reliable sensory data capture • When the decision is wrong, the sensory data are lost forever; this dilemma might encourage users to always authorize access. • To ensure both • 1. All app. can access the sensors • 2.Encrypt sensory data and save them unless OS determines that the app. is benign(良性) • Disappoint • App. may need to be rewritten.
Contribution • Propose a framework which consists of 3 modules: policy engine, user interaction, interceptor, and explore different mechanisms for each module. • Provide the 3 novel mechanisms.
Future research • Mobile user behavior (to Sol 3) • Algorithms for automatic context inference(to Sol 1) • Operating system primitives(to Mod 1)