PlaceRaider: Virtual Theft in Physical Spaces with Smartphones
NDSS
Abstract
As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites. A new strain of ‘sensor malware’ has been developing that leverages these sensors to steal information from the physical environment — e.g., researchers have recently demonstrated how malware can ‘listen’ for spoken credit card numbers through the microphone, or ‘feel’ keystroke vibrations using the accelerometer. Yet the possibilities of what malware can ‘see’ through a camera have been understudied. This paper introduces a novel ‘visual malware’ called PlaceRaider, which allows remote at- tackers to engage in remote reconnaissance and what we call “virtual theft.” Through completely opportunistic use of the phone’s camera and other sensors, PlaceRaider constructs rich, three dimensional models of indoor environments. Remote burglars can thus ‘download’ the physical space, study the environment carefully, and steal virtual objects from the environment (such as financial documents, information on computer monitors, and personally identifiable informa- tion). Through two human subject studies we demonstrate the effectiveness of using mobile devices as powerful urveillance and virtual theft platforms, and we suggest several possible defenses against visual malware.
References (36)
- M. Backes, T. Chen, M. Duermuth, H. Lensch, and M. Welk. Tempest in a teapot: Compro- mising reflections revisited. In 30th IEEE Symposium on Security and Privacy, pages 315-327, May 2009.
- M. Backes, M. Durmuth, and D. Unruh. Compromising reflections-or-how to read LCD mon- itors around the corner. In IEEE Symposium on Security and Privacy, pages 158-169, May 2008.
- M. J. Black and P. Anandan. A framework for the robust estimation of optical flow. In Proceedings of the IEEE International Conference on Computer Vision, pages 231-236, 1993.
- S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi. XManDroid: A new Android evolution to mitigate privilege escalation attacks. Technical Report TR-2011-04, Technische Universität Darmstadt, Apr. 2011.
- S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on Android. In 19th Annual Network & Distributed System Security Symposium (NDSS), Feb. 2012.
- L. Cai, S. Machiraju, and H. Chen. Defending against sensor-sniffing attacks on mobile phones. In Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds, MobiHeld '09, pages 31-36, New York, NY, USA, 2009.
- M. Conti, V. T. N. Nguyen, and B. Crispo. Crepe: context-related policy enforcement for android. In Proceedings of the 13th International Conference on Information Security, pages 331-345, Berlin, Heidelberg, 2011.
- D. Crandall, A. Owens, N. Snavely, and D. P. Huttenlocher. Discrete-continuous optimization for large-scale structure from motion. In Proc. IEEE Conf. on Computer Vision and Pattern Recognition, 2011.
- M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: Lightweight provenance for smart phone operating systems. CoRR, abs/1102.2445, 2011.
- W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taint- Droid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementa- tion, OSDI'10, pages 1-6, Berkeley, CA, USA, 2010.
- W. Enck, M. Ongtang, and P. McDaniel. Mitigating Android software misuse before it happens. Technical Report NAS-TR-0094-2008, Pennsylvania State University, 2008.
- A. Felt, K. Greenwood, and D. Wagner. The effectiveness of application permissions. In Proceedings of the USENIX Conference on Web Application Development, 2011.
- A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: attacks and defenses. In Proceedings of the 20th USENIX Conference on Security, SEC'11, pages 22-22, Berkeley, CA, USA, 2011.
- Y. Furukawa, B. Curless, S. M. Seitz, and R. Szeliski. Reconstructing building interiors from images. In IEEE International Conference on Computer Vision, pages 80-87, Oct. 2009.
- Y. Furukawa and J. Ponce. Accurate, dense, and robust multiview stereopsis. IEEE Transac- tions on Pattern Analysis and Machine Intelligence, 32(8):1362-1376, Aug. 2010.
- S. Gabarda and G. Cristóbal. Blind image quality assessment through anisotropy. J. Opt. Soc. Am. A, 24(12):B42-B51, Dec. 2007.
- M. Kuhn. Optical time-domain eavesdropping risks of CRT displays. In Proceedings of the IEEE Symposium on Security and Privacy, pages 3-18, 2002.
- B. Laxton, K. Wang, and S. Savage. Reconsidering physical key secrecy: Teleduplication via optical decoding. In Proceedings of the 15th ACM Conference on Computer and Communica- tions Security, CCS '08, pages 469-478, New York, NY, USA, 2008.
- L. Liu, G. Yan, X. Zhang, and S. Chen. VirusMeter: Preventing your cellphone from spies. In Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, RAID '09, pages 244-264, Berlin, Heidelberg, 2009.
- D. G. Lowe. Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision, 60(2):91-110, Nov. 2004.
- P. Marquardt, A. Verma, H. Carter, and P. Traynor. (sp)iPhone: Decoding vibrations from nearby keyboards using mobile phone accelerometers. In Proceedings of the 18th ACM Con- ference on Computer and Communications Security, CCS '11, pages 551-562, 2011.
- E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R. R. Choudhury. Tapprints: Your finger taps have fingerprints. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, MobiSys '12, pages 323-336, New York, NY, USA, 2012.
- K. Mowery, S. Meiklejohn, and S. Savage. Heat of the moment: Characterizing the efficacy of thermal camera-based attacks. In Proceedings of the 5th USENIX Conference on Offensive Technologies, WOOT'11, page 6, Berkeley, CA, USA, 2011.
- M. Nauman, S. Khan, and X. Zhang. Apex: Extending Android permission model and en- forcement with user-defined runtime constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pages 328-332, New York, NY, USA, 2010.
- M. Ongtang, K. Butler, and P. McDaniel. Porscha: Policy oriented secure content handling in Android. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10, pages 221-230, New York, NY, USA, 2010.
- M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically rich application-centric security in Android. In Proceedings of the 2009 Annual Computer Security Applications Con- ference, ACSAC '09, pages 340-349, Washington, DC, USA, 2009.
- E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. ACCessory: Password inference using accelerometers on smartphones. In Proceedings of the 12th Workshop on Mobile Computing Systems & Applications, HotMobile '12, pages 9:1-9:6, New York, NY, USA, 2012.
- G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid Android: Versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10, pages 347-356, New York, NY, USA, 2010.
- R. Raguram, A. M. White, D. Goswami, F. Monrose, and J.-M. Frahm. iSpy: Automatic reconstruction of typed input from compromising reflections. In ACM Conference on Computer and Communications Security, pages 527-536, 2011.
- R. Schlegel, K. Zhang, X. Zhou, I. Mehool, A. Kapadia, and X. Wang. Soundcomber: A stealthy and context-aware sound trojan for smartphones. In Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS'11, 2011.
- A. Smith. Nearly half of American adults are smartphone owners. Technical report, Pew Research Center, 2012.
- N. Snavely. Phototourism software FAQ. http://phototour.cs.washington.edu/bundler/ faq.html.
- N. Snavely, S. Seitz, and R. Szeliski. Modeling the World from Internet Photo Collections. International Journal of Computer Vision, 80:189-210, 2008.
- N. Snavely, S. M. Seitz, and R. Szeliski. Photo tourism: Exploring photo collections in 3D. In SIGGRAPH Conference Proceedings, pages 835-846, 2006.
- N. Xu, F. Zhang, Y. Luo, W. Jia, D. Xuan, and J. Teng. Stealthy video capturer: A new video-based spyware in 3G smartphones. In Proceedings of the second ACM conference on Wireless Network Security, WiSec '09, pages 69-78, New York, NY, USA, 2009.
- Y. Zhou and X. Jiang. Dissecting Android malware: Characterization and evolution. In IEEE Symposium on Security and Privacy, pages 95-109, 2012.