首页> 外文期刊>IEEE transactions on information forensics and security >FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment
【24h】

FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment

机译:FM 99.9,无线电病毒:利用FM无线电广播进行恶意软件部署

获取原文
获取原文并翻译 | 示例

摘要

Many modern smartphones and car radios are shipped with embedded FM radio receiver chips. The number of devices with similar chips could grow very significantly if the U.S. Congress decides to make their inclusion mandatory in any portable device as suggested by organizations such as the RIAA. While the main goal of embedding these chips is to provide access to traditional FM radio stations, a side effect is the availability of a data channel, the FM Radio Data System (RDS), which connects all these devices. Different from other existing IP-based data channels among portable devices, this new one is open, broadcast in nature, and so far completely ignored by security providers. This paper illustrates for the first time how to exploit the FM RDS protocol as an attack vector to deploy malware that, when executed, gains full control of the victim's device. We show how this attack vector allows the adversary to deploy malware on different platforms. Furthermore, we have shown the infection is undetected on devices running the Android OS, since malware detection solutions are limited in their ability due to some features of the Android security model. We support our claims by implementing an attack using RDS on different devices available on the market (smartphones, car radios, and tablets) running three different versions of Android OS. We also provide suggestions on how to limit the threat posed by this new attack vector and explain what are the design choices that make Android vulnerable. However, there are no straightforward solutions. Therefore, we also wish to draw the attention of the security community towards these attacks and initiate more research into countermeasures.
机译:<?Pub Dtl?>许多现代智能手机和车载收音机都随附有嵌入式FM收音机接收器芯片。如果美国国会决定根据RIAA等组织的建议,将其纳入任何便携式设备中,则具有相似芯片的设备的数量可能会大大增加。嵌入这些芯片的主要目的是提供对传统FM广播电台的访问,但副作用是数据通道的可用性,即连接所有这些设备的FM无线电数据系统(RDS)。与便携式设备中其他现有的基于IP的数据通道不同,此新通道是开放的,实际上是广播的,到目前为止,安全提供商已完全忽略了它。本文首次说明了如何利用FM RDS协议作为攻击媒介来部署恶意软件,该恶意软件在执行后即可完全控制受害者的设备。我们展示了这种攻击媒介如何使对手在不同平台上部署恶意软件。此外,由于恶意软件检测解决方案的功能由于Android安全模型的某些功能而受到限制,因此我们已经表明在运行Android OS的设备上未检测到感染。我们通过在运行三种不同版本的Android OS的市场上不同的设备(智能手机,汽车收音机和平板电脑)上使用RDS实施攻击来支持我们的主张。我们还提供有关如何限制此新攻击媒介构成的威胁的建议,并说明使Android容易受到攻击的设计选择。但是,没有直接的解决方案。因此,我们也希望引起安全界对这些攻击的关注,并开始对对策进行更多研究。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号