Skip to main content

2017 | OriginalPaper | Buchkapitel

My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands

verfasst von : Jun Xie, Sha Wu, Yansong Li, Jun Guo, Wen Sun, Jiajia Liu

Erschienen in: Cyberspace Safety and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Although a number of vulnerabilities have been reported for smart wearables and lots of efforts have been taken to strengthen their security, wearable devices face still significant threats of privacy leakage due to their own inherent characteristics. Towards this end, we re-investigate in this paper the security concerns of smartbands. In particular, we first introduce our detailed methodology for security analysis, including log analysis, Hook technology, and Android reverse engineering. Then, we apply it to popular commercial smartbands of three different brands the concrete information of which is omitted, identify their common vulnerabilities, and develop accordingly a fake Android application (App) utilizing the identified loopholes, given the protection measures of shelling, obfuscation, as well as forcible pairing and resetting. By installing the fake App, we are able to conduct deception attacks against the targeted smartbands, succeeding to remotely activate/deactivate shaking function, to adjust/modify time (including value and format), and to obtain the smartband owner’s sensitive/health data. During our deception attacks, no cooperation from the smartband owner is required, neither the pairing process between the targeted smartbands and our fake App.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, K., Wang, P., Lee, Y., Wang, X., Zhang, N., Huang, H., Zou, W., Liu, P.: Finding unknown malice in 10 seconds: mass vetting for new threats at the google-play scale. In: USENIX Security, pp. 659–674 (2015) Chen, K., Wang, P., Lee, Y., Wang, X., Zhang, N., Huang, H., Zou, W., Liu, P.: Finding unknown malice in 10 seconds: mass vetting for new threats at the google-play scale. In: USENIX Security, pp. 659–674 (2015)
2.
Zurück zum Zitat Cisco: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016–2021 White Paper (2017) Cisco: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016–2021 White Paper (2017)
3.
Zurück zum Zitat Hu, W., Tao, J., Ma, X., Zhou, W., Zhao, S., Han, T.: MIGDroid: detecting app-repackaging android malware via method invocation graph. In: IEEE International Conference on Computer Communication and Networks (ICCCN), pp. 1–7 (2014) Hu, W., Tao, J., Ma, X., Zhou, W., Zhao, S., Han, T.: MIGDroid: detecting app-repackaging android malware via method invocation graph. In: IEEE International Conference on Computer Communication and Networks (ICCCN), pp. 1–7 (2014)
4.
Zurück zum Zitat Huang, H., Zhu, S., Liu, P., Wu, D.: A framework for evaluating mobile app repackaging detection algorithms. In: Huth, M., Asokan, N., Čapkun, S., Flechais, I., Coles-Kemp, L. (eds.) Trust 2013. LNCS, vol. 7904, pp. 169–186. Springer, Heidelberg (2013). doi:10.1007/978-3-642-38908-5_13 CrossRef Huang, H., Zhu, S., Liu, P., Wu, D.: A framework for evaluating mobile app repackaging detection algorithms. In: Huth, M., Asokan, N., Čapkun, S., Flechais, I., Coles-Kemp, L. (eds.) Trust 2013. LNCS, vol. 7904, pp. 169–186. Springer, Heidelberg (2013). doi:10.​1007/​978-3-642-38908-5_​13 CrossRef
5.
Zurück zum Zitat Lee, M., Lee, K., Shim, J., Cho, S., Choi, J.: Security threat on wearable services: empirical study using a commercial smartband. In: IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), pp. 1–5 (2016) Lee, M., Lee, K., Shim, J., Cho, S., Choi, J.: Security threat on wearable services: empirical study using a commercial smartband. In: IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), pp. 1–5 (2016)
6.
Zurück zum Zitat Liu, X., Zhou, Z., Diao, W., Li, Z., Zhang, K.: When good becomes evil: keystore inference with smartwatch. In: ACM CCS, pp. 1273–1285 (2015) Liu, X., Zhou, Z., Diao, W., Li, Z., Zhang, K.: When good becomes evil: keystore inference with smartwatch. In: ACM CCS, pp. 1273–1285 (2015)
7.
Zurück zum Zitat Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: Tapprints: your finger taps have fingerprints. In: ACM MobiSys, pp. 323–336 (2012) Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: Tapprints: your finger taps have fingerprints. In: ACM MobiSys, pp. 323–336 (2012)
8.
Zurück zum Zitat Pan, X., Ling, Z., Pingley, A., Yu, W., Zhang, N., Fu, X.: How privacy leaks from bluetooth mouse? In: ACM CCS, pp. 1013–1015 (2012) Pan, X., Ling, Z., Pingley, A., Yu, W., Zhang, N., Fu, X.: How privacy leaks from bluetooth mouse? In: ACM CCS, pp. 1013–1015 (2012)
9.
Zurück zum Zitat Ren, Y., Chen, Y., Chuah, M.C., Yang, J.: User verification leveraging gait recognition for smartphone enabled mobile healthcare systems. IEEE Trans. Mobile Comput. 14(9), 1961–1974 (2014)CrossRef Ren, Y., Chen, Y., Chuah, M.C., Yang, J.: User verification leveraging gait recognition for smartphone enabled mobile healthcare systems. IEEE Trans. Mobile Comput. 14(9), 1961–1974 (2014)CrossRef
10.
Zurück zum Zitat Ryan, M.: Bluetooth: with low energy comes low security. In: USENIX WOOT, p. 4 (2013) Ryan, M.: Bluetooth: with low energy comes low security. In: USENIX WOOT, p. 4 (2013)
11.
Zurück zum Zitat Sherman, M., Clark, G., Yang, Y., Sugrim, S., Modig, A., Lindqvist, J., Oulasvirta, A., Roos, T.: User-generated free-form gestures for authentication: security and memorability. In: ACM Mobisys, pp. 176–189 (2014) Sherman, M., Clark, G., Yang, Y., Sugrim, S., Modig, A., Lindqvist, J., Oulasvirta, A., Roos, T.: User-generated free-form gestures for authentication: security and memorability. In: ACM Mobisys, pp. 176–189 (2014)
12.
Zurück zum Zitat Spill, D., Bittau, A.: Bluesniff: eve meets alice and bluetooth. In: USENIX WOOT, pp. 1–10 (2007) Spill, D., Bittau, A.: Bluesniff: eve meets alice and bluetooth. In: USENIX WOOT, pp. 1–10 (2007)
13.
Zurück zum Zitat Wang, C., Guo, X., Wang, Y., Chen, Y., Liu, B.: Friend or foe? Your wearable devices reveal your personal PIN. In: ACM ASIA CCS, pp. 189–200 (2016) Wang, C., Guo, X., Wang, Y., Chen, Y., Liu, B.: Friend or foe? Your wearable devices reveal your personal PIN. In: ACM ASIA CCS, pp. 189–200 (2016)
14.
Zurück zum Zitat Wang, H., Lai, T.T.T., Choudhury, R.R.: Mole: motion leaks through smartwatch sensors. In: ACM MobiCom, pp. 155–166 (2015) Wang, H., Lai, T.T.T., Choudhury, R.R.: Mole: motion leaks through smartwatch sensors. In: ACM MobiCom, pp. 155–166 (2015)
15.
Zurück zum Zitat Zheng, X., Pan, L., Yilmaz, E.: Security analysis of modern mission critical android mobile applications. In: ACM ACSW (2017) Zheng, X., Pan, L., Yilmaz, E.: Security analysis of modern mission critical android mobile applications. In: ACM ACSW (2017)
16.
Zurück zum Zitat Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: ACM CODASPY, pp. 317–326 (2012) Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: ACM CODASPY, pp. 317–326 (2012)
Metadaten
Titel
My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands
verfasst von
Jun Xie
Sha Wu
Yansong Li
Jun Guo
Wen Sun
Jiajia Liu
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-69471-9_22