Academia.eduAcademia.edu

Outline

Curbing mobile malware based on user-transparent hand movements

2015, 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom)

Abstract

In this paper, we present a run-time defense to the malware that inspects the presence/absence of certain transparent human gestures exhibited naturally by users prior to accessing a desired resource. Specifically, we focus on the use of transparent gestures to prevent the misuse of three critical smartphone capabilities-the phone calling service, the camera resource and the NFC reading functionality. We show how the underlying natural hand movement gestures associated with the three services, calling, snapping and tapping, can be detected in a robust manner using multiple-motion, position and ambient-sensors and machine learning classifiers. To demonstrate the effectiveness of our approach, we collect data from multiple phone models and multiple users in real-life or near real-life scenarios emulating both benign settings as well as adversarial scenarios. Our results show that the three gestures can be detected with a high overall accuracy, and can be distinguished from one another and from other activities (benign or malicious), serving as a viable malware defense. In the future, we believe that transparent gestures associated with other smartphone services, such as sending SMS or email, can also be integrated with our system.

References (26)

  1. W. Augustinowicz. Trojan horse electronic pickpocket demo by identity stronghold. Available online at http://www.youtube.com/watch?v=eEcz0XszEic, June 2011.
  2. M. Ballano. Android threats getting steamy, 2011.
  3. A. Bose, X. Hu, K. G. Shin, and T. Park. Behavioral detection of malware on mobile handsets. In Mobile Systems, Applications, and Services (MobiSys), 2008.
  4. I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani. Crowdroid: Behavior- based malware detection system for android. In Security and Privacy in Smartphones and Mobile Devices (SPSM), 2011.
  5. A. Chaugule, Z. Xu, and S. Zhu. A specification based intrusion detection framework for mobile phones. In Applied Cryptography and Network Security (ACNS), 2011.
  6. M. Conti, I. Zachia-Zlatea, and B. Crispo. Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. In ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2011.
  7. F-Secure. Bluetooth-worm:symbos/cabir. Available online at http://www.f-secure.com/v-descs/cabir.shtml.
  8. F-Secure. Worm:symbos/commwarrior. Available online at http://www.f- secure.com/v-descs/commwarrior.shtml.
  9. J. Figura. Machine learning for google android. Available online at http://www.cestina.cz/ obo/vyuka/projekty/figura-ml-for-android.pdf.
  10. J. Han, E. Owusu, L. Nguyen, A. Perrig, and J. Zhang. Accomplice: Location inference using accelerometers on smartphones. In Communi- cation Systems and Networks (COMSNETS), 2012.
  11. S. Kolesnikov-Jessop. Hackers go after the smartphone, 2011. www.nytimes.com/2011/02/14/technology/14iht-srprivacy14.html.
  12. H. Li, D. Ma, N. Saxena, B. Shrestha, and Y. Zhu. Tap-wave-rub: Lightweight malware prevention for smartphones using intuitive human gestures. In Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2013.
  13. P. Marquardt, A. Verma, H. Carter, and P. Traynor. (sp)iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers. In Conference on Computer and Communications Security, CCS, 2011.
  14. Microsoft. What is user account control?, 2011. http://windows.microsoft.com/en-US/windows-vista/What-is-User- Account-Control.
  15. J. Oberheide, E. Cooke, and F. Jahanian. Cloudav: N-version antivirus in the network cloud. In USENIX Security Symposium, 2008.
  16. J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian. Virtualized in-cloud security services for mobile devices. In In Virtual- ization in Mobile Computing, MobiVirt, 2008.
  17. E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. Accessory: Password inference using accelerometers on smartphones. In Mobile Computing Systems & Applications, HotMobile, 2012.
  18. N. L. Petroni, Jr. and M. Hicks. Automated detection of persistent kernel control-flow attacks. In Conference on Computer and Communications Security (CCS), 2007.
  19. F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. J. Wang, and C. Cowan. User-driven access control: Rethinking permission granting in modern operating systems. In Symposium on Security and Privacy, 2012.
  20. R. Schlegel, K. Zhang, X. yong Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A stealthy and context-aware sound trojan for smartphones. In Network & Distributed System Security Symposium, 2011.
  21. A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In Symposium on Operating Systems Principles (SOSP), 2007.
  22. A. Shabtai, R. Moskovitch, Y. Elovici, and C. Glezer. Detection of ma- licious code by applying machine learning classifiers on static features: A state-of-the-art survey. Information Security Technical Report, 2009.
  23. B. Shrestha, N. Saxena, and J. Harrison. Wave-to-access: Protecting sen- sitive mobile device services via a hand waving gesture. In Cryptology and Network Security (CANS). 2013.
  24. R. Templeman, Z. Rahman, D. J. Crandall, and A. Kapadia. Placeraider: Virtual theft in physical spaces with smartphones. In Network & Distributed System Security Symposium, 2013.
  25. D. Venugopal. An efficient signature representation and matching method for mobile devices. In Wireless Internet (WICON), 2006.
  26. M. Ward. Smartphone security put on test, 2010. Available online at http://www.bbc.com/news/technology-10912376.