首页> 外文期刊>Computers & Security >Dropping malware through sound injection: A comparative analysis on Android operating systems
【24h】

Dropping malware through sound injection: A comparative analysis on Android operating systems

机译:通过音响注射丢弃恶意软件:Android操作系统的比较分析

获取原文
获取原文并翻译 | 示例

摘要

Trojan droppers are regularly ranked among the top 5 worst malware threats; especially for Android. Software for malware detection opts to either identify the payload when executed in memory or detect the connection from which droppers attempt to download malicious payloads. Much effort has been put into securing network channels and stopping droppers from delivering their payloads. This paves the way for alternative routes of infiltration. Our paper extends work on inaudible sound covert channel attacks and audio fingerprinting to use them for close vicinity attacks as potential mass dropper techniques. We demonstrate that malware modules can be dropped over the air to multiple devices using the same sound medium from approximately four to five meters away. Instead of using network connections, we conceal the malware within musics inaudible frequencies. Then we use a seemingly innocent app that implements an algorithm similar to Shazams audio fingerprinting to transmit the payload over the devices microphone and execute it. To accomplish this, we combine Short-Time Discrete Fourier Transform, peak frequency mapping and dilation techniques to a Meterpreter payload as fluctuations in magnitude within inaudible frequencies. To our knowledge, there is currently no technique capable of transmitting payloads to multiple neighboring systems without discrete network connections between the payload remote location and the device. We, therefore, present realistic attack cases and provide solutions for these attack vectors, including modulation and high-peak compression of sound dependent channel frequencies.
机译:特洛伊木马滴剂定期排名前5位最糟糕的恶意软件威胁;特别适用于Android。恶意软件检测软件选择在内存中执行时识别有效载荷,或者检测到下降者尝试下载恶意有效载荷的连接。已经努力确保网络渠道并停止滴注器来提供有效载荷。这为替代渗透途径铺平了道路。我们的论文在听不清的声音隐蔽频道攻击和音频指纹识别上延伸了工作,以便使用它们作为潜在的质量滴管技术关闭附近攻击。我们展示了恶意软件模块可以使用大约4到5米的相同声音介质将空气丢弃到多个设备。我们不是使用网络连接,我们隐藏音乐中的恶意软件听不清频率。然后,我们使用看似无辜的应用程序,实现类似于Shazams音频指纹的算法,以将有效载荷传输到设备麦克风并执行它。为实现这一点,我们将短时离散傅里叶变换,峰值频率映射和扩张技术与计量额度的波动相结合。据我们所知,目前没有能够将有效载荷传输到多个相邻系统的技术,而有效载荷远程位置和设备之间的离散网络连接。因此,我们呈现了现实的攻击案例,并为这些攻击载体提供了解决方案,包括声音依赖信道频率的调制和高峰压缩。

著录项

  • 来源
    《Computers & Security》 |2021年第6期|102228.1-102228.20|共20页
  • 作者单位

    Information Security & Critical Infrastructure Protection (INFOSEC) Laboratory Department of Informatics Athens University of Economics & Business Athens Greece;

    Information Security & Critical Infrastructure Protection (INFOSEC) Laboratory Department of Informatics Athens University of Economics & Business Athens Greece;

    Information Security & Critical Infrastructure Protection (INFOSEC) Laboratory Department of Informatics Athens University of Economics & Business Athens Greece;

    Information Security & Critical Infrastructure Protection (INFOSEC) Laboratory Department of Informatics Athens University of Economics & Business Athens Greece;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Trojans; Malware; Attack; Audio; Sound; Covert channel; Infiltration; Frequency;

    机译:特洛伊木马;恶意软件;攻击;声音的;声音;隐蔽频道;浸润;频率;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号