Android Commercial Spyware Disease and Medication



Similar documents
Here to take you beyond Mobile Application development using Android Course details

Android Architecture. Alexandra Harrison & Jake Saxton

Introduction to Android

ANDROID OPERATING SYSTEM

Android Application Development

ITG Software Engineering

Review On Google Android a Mobile Platform

Android (Basic + Advance) Application Development

Remote Desktop on Mobile

An Introduction to Android

Creating and Using Databases for Android Applications

Hacking your Droid ADITYA GUPTA

Android Application Development. Daniel Switkin Senior Software Engineer, Google Inc.

Development. SriSeshaa Technologies. Table of Contents

Berlin Institute of Technology FG Security in Telecommunications

Workshop on Android and Applications Development

Analysis of advanced issues in mobile security in android operating system

Protecting against Mobile Attacks

Android Geek Night. Application framework

Commercial Spyware- Detecting the Undetectable. July 2015

Android Programming and Security

Overview of CS 282 & Android

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation

Introduction to Android

The Android Platform

INTERMEDIATE ANDROID DEVELOPMENT Course Syllabus

Lecture 17: Mobile Computing Platforms: Android. Mythili Vutukuru CS 653 Spring 2014 March 24, Monday

Introduction to Android

Технологии Java. Android: Введение. Кузнецов Андрей Николаевич. Санкт-Петербургский Государственный Политехнический Университет

Are free Android virus scanners any good?

Reminders. Lab opens from today. Many students want to use the extra I/O pins on

An Introduction to Android. Huang Xuguang Database Lab. Inha University

Nokia Networks. security you can rely on

Kaspersky Security 10 for Mobile Implementation Guide

Tutorial on Smartphone Security

A Review OnEmployee Monitoring Application Using Android Smartphone s Neha S. Mankar 1, Sweeti M. Shambharkar 2 and Asst. Prof. Priti P.

Vulnerability Analysis and Attacks on NFC enabled Mobile Phones

ANDROID INTRODUCTION TO ANDROID

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

ANDROID PROGRAMMING - INTRODUCTION. Roberto Beraldi

Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

Introduction to Android

Graduate presentation for CSCI By Janakiram Vantipalli ( Janakiram.vantipalli@colorado.edu )

Programming the Android Platform. Logistics

Smartphone market share

Android Operating System

Studying Security Weaknesses of Android System

A Short Introduction to Android

Specialized Android APP Development Program with Java (SAADPJ) Duration 2 months

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Fall 2011 SYSTEM ARCHITECTURE DESIGN TEAM MEMBERS: PROJECT OWNERS: AMIR 15 ECTS) EKAMBAR

TUTORIALS AND QUIZ ANDROID APPLICATION SANDEEP REDDY PAKKER. B. Tech in Aurora's Engineering College, 2013 A REPORT

UNIVERSITY AUTHORISED EDUCATION PARTNER (WDP)

3. Security Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

Module Title: Software Development A: Mobile Application Development

Example of Standard API

TrustPort Mobile Security

Introduction to Android: Hello, Android! 26 Mar 2010 CMPT166 Dr. Sean Ho Trinity Western University

G DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Introduction (Apps and the Android platform)

AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring

Android Application Development Lecture Notes INDEX

Norton Mobile Privacy Notice

Jordan Jozwiak November 13, 2011

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

Host-based Intrusion Prevention on Windows and UNIX. Dr. Rich Murphey White Oak Labs

Android Operating System:

A Survey on Mobile Forensic for Android Smartphones

NQ Mobile Security Frequently Asked Questions (FAQs) for Android

Synthesis for Developing Apps on Mobile Platforms

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Mobile Print/Scan Guide for Brother iprint&scan

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Getting started with Android and App Engine

An Introduction to Android Application Development. Serdar Akın, Haluk Tüfekçi

Android Security Joshua Hodosh and Tim Leek

Junos Pulse for Google Android

10 Quick Tips to Mobile Security

ANDROID PROGRAMMING - INTRODUCTION. Roberto Beraldi

Introduction to Android Development. Jeff Avery CS349, Mar 2013

Android Basics. Xin Yang

Android Architecture Diagram:

Student Attendance Through Mobile Devices

Virtualization: Hypervisors for Embedded and Safe Systems. Hanspeter Vogel Triadem Solutions AG

Kaspersky Security for Mobile Administrator's Guide

Building an Android client. Rohit Nayak Talentica Software

Basics. Bruce Crawford Global Solutions Manager

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Transcription:

Android Commercial Spyware Disease and Medication By Eng. Mustafa Saad Computer Engineer 2003 Mobile App Developer 2011 Mobile Security Researcher 2012 Udemy Premium Instructor 2014 March 2016

Agenda Introduction. Proposed Approach. How Commercial Spyware Works? Our Developed Spyware. Chameleon Spyware Demo Our Developed Anti-Spyware. Droid Smart Fuzzer Demo Spyware Dataset & results.

Introduction What Is Commercial Spyware: * Application sold worldwide for the primary purposes of spying on people, employees or monitoring children s safety. * Usually installed on the cell phone by physical access, direct web link, or repackaging attack. * Most of these apps have the ability to hide their launcher icon from your screen. * Most of these apps deliver Command and Control web page for monitoring victims. * Commercial Spywares are not too expensive.

Introduction Their Features Are Horrible:

Introduction As Reported In : Google Android Security report. Lacoon research team report. ALCATEL-LUCENT mobile malware report. Joshua Dalman briefing on Black Hat USA 2015. commercial spywares considered as : Unofficial markets working out of Google magnifier.

Proposed Approach Proposed approach to Catch Commercial spies was divided in to two main parts : * To deeply understand and discover the weak points on Android application layer, we have to develop a real spy application Disease. * To medicate the previous disease, and stop the commercial spyware attacks we propose to develop a dynamic fuzz testing application Medication.

Black Hat White Hat

How The Commercial Spy Works? Android OS Architecture: Application System Apps Developer Apps Third party Apps Application Framework Telephony Manager Window manager Package Manager Window Manager Views Content Providers Activity manager Resource Manager Notification Manager NFC, WiFi, Bluetooth Libraries Graphics Media Web Kit Android Libraries LibC SQLite Service Manager Dalvic Virtual Machine Linux Kernel Memory Management Process Management Power Management Hardware Drivers (USB,WiFi,GPS, 1-8..)

How The Commercial Spy Works? Inter Process Communication (IPC) Endpoints: IPC Endpoints Manifest Activity Service Content Provider Broadcast Receivers

Chameleon Spyware * The proposed spyware collaboration diagram: Main Activity Received SMS Registered Receiver Incoming Call Registered Receiver Outgoing Call Registered Receiver Connect To MySQL MySQL DB

Receivers Registration: Chameleon Spyware

Chameleon Spyware Received SMSs Interception :

Chameleon Spyware Outgoing Calls Interception :

Chameleon Spyware Incoming Calls Interception :

Chameleon Spyware Demo

Droid Smart Fuzzer Let s Think Like The Enemy The main idea of the Droid Smart Fuzzer is to detect Internet usage unexpected behavior for the installed applications that have the next permissions: 1. RECEIVE SMS 2. PROCESS OUTGOING CALLS 3. READ PHONE STATE 4. INTERNET

Droid Smart Fuzzer * The proposed anti spyware collaboration diagram: Reading All Installed App Permissions SMS Injector Filtering this Apps according to our permissions of interest Outgoing Call Injector Prepare the fuzzing injectors Incoming Call Injector Monitoring AUT during fuzzing lifecycle Generate the pass/fail report

Let s Detect The Undetectable

Droid Smart Fuzzer Demo

Spyware Dataset & Results * We tested DroidSmartFuzzer against top 15 commercial spyware applications and 4 free spy applications on Google & Amazon stores. * Droid Smart Fuzzer succeeded to detect all of them.

Spyware Dataset & Results * Droid Smart Fuzzer succeeded to detect Privacy and Security Issues in Baidu Map like what mentioned in CITIZEN Lab report. February 23, 2016

Thank you