首页> 外文会议>European Conference on Information Warfare and Security >Covert Channel Based Eavesdropping Malware Analysis and Detection for Android Systems
【24h】

Covert Channel Based Eavesdropping Malware Analysis and Detection for Android Systems

机译:基于封面的窃听恶意软件分析和检测Android系统

获取原文

摘要

Nowadays we have highly developed semiconductor engineering and can see the increasingly popular use of mobile computing devices and smartphones which are not only equipped with high speed CPUs and enormous storage capabilities but also have various built-in auxiliary processors and sensors. This advanced hardware and technology brings great convenience, however users are faced with a growing threat to their personal privacy due to various information security issues. This is especially true for the non-official APP markets which might provide malicious cybercriminals with a breeding ground from which to spread their malware and viruses targeting Android mobile devices. Due to their growing popularity, mobile phones and smartphones and tools for voice communication and information-passing may be endangered by the threats mentioned above once there is malicious eavesdropping malware which targets these smart mobile devices and they start to spread themselves. Regardless of whether users are passing information via a telephone network, their voices over Internet Protocol communication system, or simple text messages and email, malware will inevitably crop up, causing negative consequences which smartphone users must face due to the-great threat to their personal privacy and information security. The very existence of Covert Channels on Android systems provides a pathway for stealthy data transfer between different Android APPs. Malicious Android APPs can utilize system resources such as screen brightness, volume and external storage to launch a covert channel communication. If no appropriate countermeasure is deployed, malicious Android Malware will use this approach to lower Android Permissions required to block each malware's entry, secretly transmitting/receiving private data, and jeopardizing smartphone users' privacy and information security. Therefore, we have to pay attention to these kinds of threats. In this paper, we analyze various scenarios and examine the possibility of android smartphones being eavesdropped upon by malicious APPs. For the purpose of experiment and analysis for our anti-eavesdropping framework design, we implemented a test malware which integrates VoIP technology and an Android covert channel. In our conclusion, we propose a malware eavesdropping countermeasure solution composed of a Covert Channel Detection Module and an Eavesdropping Behavior Analysis Module. Based on this solution, we implement an Android APP and prove that our APP can execute malicious eavesdropping behavior analysis using limited Android Permissions and mobile computing resources.
机译:如今我们已经发达了高度发达的半导体工程,并且可以看到越来越流行的移动计算设备和智能手机不仅具有高速CPU和巨大的存储功能,而且还具有各种内置辅助处理器和传感器。这种先进的硬件和技术带来了极大的便利,但由于各种信息安全问题,用户面临着对其个人隐私的威胁越来越威胁。这对于非官方应用市场尤其如此,这可能提供具有繁殖场的恶意网络犯罪分子,从中传播他们的恶意软件和病毒,针对Android移动设备。由于它们的越来越受欢迎,移动电话和智能手机和用于语音通信的工具和用于语音通信的工具可能会被上面提到的威胁危害上面提到的威胁,而是针对这些智能移动设备的恶意窃听恶意软件,他们开始传播自己。无论是用户是否通过电话网络传递信息,他们通过互联网协议通信系统的声音,或简单的短信和电子邮件,恶意软件将不可避免地裁剪,导致智能手机用户必须面对的负面后果由于对其个人的巨大威胁而面临的负面影响隐私和信息安全。 Android系统上的隐蔽通道的存在提供了一个途径,可以在不同的Android应用程序之间隐藏数据传输。恶意Android应用程序可以利用屏幕亮度,卷和外部存储等系统资源来启动封面通道通信。如果没有部署适当的对策,恶意android恶意软件将使用此方法来降低阻止每个恶意软件的条目,秘密传输/接收私有数据以及危害智能手机用户隐私和信息安全性所需的Android权限。因此,我们必须注意这些威胁。在本文中,我们分析了各种场景,并检查恶意应用程序窃听的Android智能手机的可能性。为了对我们的防窃听框架设计进行实验和分析,我们实现了一个集成VoIP技术和Android隐蔽通道的测试恶意软件。在我们结论中,我们提出了一种恶意软件窃听的对策解决方案,由封闭通道检测模块和窃听行为分析模块组成。基于此解决方案,我们实现了Android应用程序并证明我们的应用程序可以使用有限的Android权限和移动计算资源来执行恶意窃听行为分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号