skip to main content
10.1145/2484313.2484373acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Sensing-enabled channels for hard-to-detect command and control of mobile devices

Authors Info & Claims
Published:08 May 2013Publication History

ABSTRACT

The proliferation of mobile computing devices has enabled immense opportunities for everyday users. At the same time, however, this has opened up new, and perhaps more severe, possibilities for attacks. In this paper, we explore a novel generation of mobile malware that exploits the rich variety of sensors available on current mobile devices.

Two properties distinguish the proposed malware from the existing state-of-the-art. First, in addition to the misuse of the various traditional services available on modern mobile devices, this malware can be used for the purpose of targeted context-aware attacks. Second, this malware can be commanded and controlled over context-aware, out-of-band channels as opposed to a centralized infrastructure. These communication channels can be used to quickly reach out to a large number of infected devices, while offering a high degree of undetectability. In particular, unlike traditional network-based communication, the proposed sensing-enabled channels cannot be detected by monitoring the cellular or wireless communication networks. To demonstrate the feasibility of our proposed attack, we present different flavors of command and control channels based on acoustic, visual, magnetic and vibrational signaling. We further build and test a proof-of-concept Android application implementing many such channels.

References

  1. ButtKickers -- Low Frequency Audio Transduceers. Available at http://www.thebuttkicker.com/.Google ScholarGoogle Scholar
  2. iPhone Microhone Frequency Response. Available at http://bit.ly/IDWfei/.Google ScholarGoogle Scholar
  3. Mobile Threat Report. Available at http://bit.ly/ImefoN/.Google ScholarGoogle Scholar
  4. PPLive. Available at http://www.synacast.com/en/.Google ScholarGoogle Scholar
  5. SopCast - Free P2P internet TV. Available at http://www.sopcast.org/.Google ScholarGoogle Scholar
  6. Suggested Viewing Distance for HDTV (Calculator). Available at http://hdinstallers.com/calculator.htm.Google ScholarGoogle Scholar
  7. M. Aboleaze and A. Elnaggar. Reducing memory references for FFT calculation. In Proc. of the International Conference on Computer Design, pages 26--28, 2006.Google ScholarGoogle Scholar
  8. A. J. Aviv, M. Sherr, M. Blaze, and J. M. Smith. Evading cellular data monitoring with human movement networks. In Proc. of USENIX HotSec, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H. Bassen. Radiofrequency interference with medical devices. a technical information statement. IEEE Engineering in Medicine and Biology, 17(3):111--114, 1998.Google ScholarGoogle Scholar
  10. L. Cai and H. Chen. Touchlogger: inferring keystrokes on touch screen from smartphone motion. In Proc. of USENIX HotSec, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. E. Cochran, J. Lawrence, and C. Christensen. Quake-Catcher Network. Available at http://qcn.stanford.edu/, 2008.Google ScholarGoogle Scholar
  12. P. Dhungel, X. Hei, K. W. Ross, and N. Saxena. The pollution attack in p2p live video streaming: measurement results and defenses. In Proc. of P2P-TV, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Geng, G. Xu, M. Zhang, Y. Yang, and G. Yang. An improved sms based heterogeneous mobile botnet model. In Proc. of IEEE ICIA, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  14. K. Gopalan and S. Wenndt. Audio steganography for covert data transmissions by imperceptible tone insertion. In Communication systems and applications, Available at http://qcn.stanford.edu/, 2004.Google ScholarGoogle Scholar
  15. D. J. Griffiths. Introduction to Electrodynamics (Third Edition). Prentice Hall, 1999.Google ScholarGoogle Scholar
  16. J. Han, E. Owusu, T.-L. Nguyen, A. Perrig, and J. Zhang. ACComplice: Location Inference using Accelerometers on Smartphones. In Proc. of COMSNETS, Jan. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Harris Interactive. Teenagers: A Generation Unplugged. Available at http://bit.ly/IyH71E, 2008.Google ScholarGoogle Scholar
  18. Harris Interactive. The Harris Poll - Cell Phone Usage Continues to Increase. Available at http://bit.ly/IpgefF, 2008.Google ScholarGoogle Scholar
  19. J. Hua and K. Sakurai. A sms-based mobile botnet using flooding algorithm. In Proc. of WISTP, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. I. Ion, M. Langheinrich, P. Kumaraguru, and S. Capkun. Influence of user perception, security needs, and social factors on device pairing method choices. In Proc. of SOUPS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Jakobsson and K. Johansson. Retroactive detection of malware with applications to mobile platforms. In Proc. of USENIX HotSec, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. Kainda, I. Flechais, and A. W. Roscoe. Two heads are better than one: Security and usability of device associations in group scenarios. In Proc. of SOUPS, pages 1--13, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. H. Kim, J. Smith, and K. G. Shin. Detecting energy-greedy anomalies and mobile malware variants. In Proc. of MobiSys. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. Kim. The World's a Cell-phone Stage. SFC, Available at http://bit.ly/IpgSdf, 2006.Google ScholarGoogle Scholar
  25. Knowledge Networks. New Study Shows Mobile Phones Merging New, Established Roles: Communicator, Shopping Aide, Entertainment and Research Hub. Available at http://bit.ly/IDWyWv, 2008.Google ScholarGoogle Scholar
  26. M. Knysz, X. Hu, Y. Zeng, and K. G. Shin. Can open wifi networks be lethal weapons for botnets? In Proc. of INFOCOM, to appear, 2012.Google ScholarGoogle Scholar
  27. A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun, and Y. Wang. Serial hook-ups: A comparative usability study of secure device pairing methods. In Proc. of SOUPS, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. A. Kumar, N. Saxena, G. Tsudik, and E. Uzun. Caveat emptor: A comparative study of secure device pairing methods. In Proc. of PerCom, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. D. Lee. College Student's Hand-phone Usage Culture Survey. In University Culture Newspaper, 2002.Google ScholarGoogle Scholar
  30. S. Lee, K. Fu, T. Kohno, B. Ransford, and W. Maisel. Clinically significant magnetic interference of implanted cardiac devices by portable headphones. Heart rhythm : the official journal of the Heart Rhythm Society, 6(10), October 2009.Google ScholarGoogle Scholar
  31. S. Lohr. As Cellphones Bulk Up, How Much Is Too Much? Available at http://nyti.ms/IEk3hV, 2005.Google ScholarGoogle Scholar
  32. C. V. Lopes and P. Q. Aguiar. Acoustic modems for ubiquitous computing. IEEE Pervasive Computing, Mobile and Ubiquitous Systems, 2(3):62--71, July-September 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Market Analysis and Consumer Research Organisation. Study of Mobile Phone Usage Among the Teenagers And Youth In Mumbai. Available at http://bit.ly/JrjaCQ, 2004.Google ScholarGoogle Scholar
  34. P. Marquardt, A. Verma, H. Carter, and P. Traynor. (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers. In Proc. of ACM CCS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. P. Meerwald. KissFFT and ARM NEON. Online at http://bit.ly/WtSjDI, 2011.Google ScholarGoogle Scholar
  36. E. Mills. Attacking home automation networks over power lines. CNET, Available at http://cnet.co/JCm8Ji.Google ScholarGoogle Scholar
  37. C. Mulliner and J.-P. Seifert. Rise of the iBots: Owning a telco network. In Proc. of MALWARE, Oct. 2010.Google ScholarGoogle ScholarCross RefCross Ref
  38. Muzak Inc. Music and More for any Businesses. Available at http://www.muzak.com/.Google ScholarGoogle Scholar
  39. S. Nagaraja, A. Houmansadr, P. Piyawongwisal, V. Singh, P. Agarwal, and N. Borisov. Stegobot: a covert social network botnet. In Proc. of IH, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. ACCessory: Keystroke Inference using Accelerometers on Smartphones. In Proc. of HotMobile), Feb. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. W. K. Park. Mobile Phone Addiction. In Mobile Communications: Re-negotiation of the Social Sphere, 2006.Google ScholarGoogle Scholar
  42. T. Reed, J. Geis, and S. Dietrich. Skynet: a 3g-enabled mobile attack drone and stealth botmaster. In Proc. of USENIX WOOT, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. N. Saxena and J. H. Watt. Authentication technologies for the blind or visually impaired. In Proc. of USENIX HotSec, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. R. Schlegel, K. Zhang, X. yong Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A stealthy and context-aware sound trojan for smartphones. In Proc. of NDSS, 2011.Google ScholarGoogle Scholar
  45. A. N. Selian. Mobile Phones and Youth: A Look at the U.S. Student Market. Available at http://bit.ly/ZnVMA4, 2004.Google ScholarGoogle Scholar
  46. K. Singh, S. Sangal, N. Jain, P. Traynor, and W. Lee. Evaluating bluetooth as a medium for botnet command and control. In Proc. of DIMVA, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. P. L. Sunderland. Fieldwork and the Phone. 1999.Google ScholarGoogle Scholar
  48. T. A. Wikle. America's Cellular Telephone Obsession: New Geographies of Personal Communication. In Journal of American and Comparative Cultures, 2001.Google ScholarGoogle Scholar
  49. C. Xiang, F. Binxing, Y. Lihua, L. Xiaoyi, and Z. Tianning. Andbot: towards advanced mobile botnets. In Proc. of USENIX LEET, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Y. Zeng, K. Shin, and X. Hu. Design of SMS commanded and controlled and P2P structured mobile botnets. In Proc. of ACM WiSec, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Sensing-enabled channels for hard-to-detect command and control of mobile devices

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
            May 2013
            574 pages
            ISBN:9781450317672
            DOI:10.1145/2484313

            Copyright © 2013 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 8 May 2013

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            ASIA CCS '13 Paper Acceptance Rate35of216submissions,16%Overall Acceptance Rate418of2,322submissions,18%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader