Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

21
Stealthy Video Capturer: Video-based Spyware in 3G Smartphones Stefan Maurer Liz Ellis

Transcript of Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Page 1: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Stealthy Video Capturer: Video-based Spyware in 3G Smartphones

Stefan MaurerLiz Ellis

Page 2: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Why secure Smartphones?

• Increasing public usage–More people buying and using Smartphones– (insert statistic here)

• Smartphones are incredibly mobile– Access to the most private moments– Intimate details about habits/lifestyle revealed

Page 3: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Introduction to SVC

• Allows hackers to have control of camera• Records and sends video to a third party over

an internet connection through the phone• Three phases:– Install SVC without device owner’s knowledge– Collect video– Send files to hacker

Page 4: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Infection

• Trojan horse attached to tic-tac-toe game• Binary executable file of SVC attached as

resource file of game• After compilation, creates executable codes of

SVC• When game is executed, SVC attaches itself

independently and continues running even after game is closed.

Page 5: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Application Layer

• 3 modules• Video capture– Takes chare of camera

• File sending– Sends data to hacker

• Triggering algorithm– Dynamic control module– Determines the right time to run other modules

Page 6: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

“Stealthiness” and acquiring info

• Which is more important for the SVC intender• “Stealthiness” – term used by team– Device owner should not know program is running– Team focuses on this– 3 aspects: power, CPU usage, and memory

• Information acquisition– Sometimes, more important to get all info than

not get caught (crime scene/contracts signed)

• Scenario decides triggering algorithm!

Page 7: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Triggering Algorithm

• 2 parts: capture and sending• Should change based on practical application!• Main challenge: when to capture/send?• CeSetUserNotificationEx()– Allows spyware to record even when phone is idle

• Uses Windows Mobile API to gather more info– Power, CPU status, phone dialing, etc.– Device owner should have little suspicion

Page 8: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

SVC Architecture

Page 9: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

When to Capture/Send?

• Both use specifications from API• Examples:– Power level between 20%-80%– CPU usage should be no more than 50%– Device owner talking on phone: capture– Connection to internet (WiFi/Bluetooth): sending

• If there is knowledge about victim, can use living habits to determine when to record– Ex: businessman having important weekly

conference

Page 10: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Video Capture Module

• Called by triggering algorithm• Phases:– Open camera and take video– Determine whether images are static or dynamic– If dynamic images, compress and store

• If images are static, process terminates– Pictures of inside of pocket are not useful

• Files are hidden on the disk in hidden and unused folders

Page 11: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Video Capture Flow

Page 12: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

How to Access Camera

• Native API has little customizability– Can access camera, but no flexibility (frame rate,

file format, etc.)

• Access and build filter manually with software• Several COM controllers developed– Enable modifications of encoding and file formats– Video Encoder and Custom Format File Render

Page 13: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Data Compression

• Data compression: large files are easy to detect and hard to send

• H.263 is used to compress files–Many Smartphones use hardware for

compression, which is inaccessible– Software compression is used instead– Lower compression rate but less CPU cycles than

H.264

Page 14: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

File Sending

• Need a wireless connection–WiFi / Internet– Bluetooth– 3G Network

• Some delay between capture and sending is acceptable (real-time not mandatory)

• Use transmissions that are free of charge (unlike MMS)

• Several methods considered: MMS, FTP, streaming

Page 15: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

File Sending cont.

• Prefer ability to use any wireless connections• Video files are generally large– Segment into portions, and send individually

• Email is ideal– easily customizable, free, uniformly supported,

flexible in syntax/size

Page 16: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Results

• O2 XDA Flame chosen for testing– Windows Mobile 5.0 OS

• Evaluation of stealthiness– CPU, memory, and power consumption

• Four states– J1: SVC running with backlight off– J2: Camera operational, but recording– J3: Recording Video and compression– J4: Sending File to the intended viewer

Page 17: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Power/CPU Consumption

Page 18: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Results cont.

• Memory usage is almost constant– SVC uses less than WMP (relevance?)

• J3 uses a large amount of power and CPU• Due primarily to the complexities of the

compressions algorithm• Performance of SVC can be greatly improved using a

better compression algorithm

Page 19: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Author's Opinions

• Making SVC smarter– More intelligent triggering algorithm

• Monitor user's living patterns

– Exploit image recognition to capture video

• Resistant to Anti-Virus– AV is useless against new viruses/spyware

• Security of Phones– Low default security settings on smartphones– Biggest Vulnerability: People are stupid

Page 20: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Our Opinions

• Windows Media Player?• What if the user does not use WiFi/Bluetooth

frequently?• CPU consumption of J3• When does J4 send the files?– Large CPU consumption

Page 21: Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.

Work Cited

• Xu, N., Zhang, F., Luo, Y., Jia, W., Xuan, D., and Teng, J. 2009. Stealthy video capturer: a new video-based spyware in 3G smartphones. In Proceedings of the Second ACM Conference on Wireless Network Security (Zurich, Switzerland, March 16-19, 2009). WiSec '09. ACM, New York, NY, 69- 78.‐