Top Banner
VIRUSMETER: PREVENTING YOUR CELLPHONE FROM SPIES RAID 2009 Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang, Computer Science Lab, Samsung Information Systems America Songqing Chen, Department of Computer Science, George Mason University
25

Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,

Dec 13, 2015

Download

Documents

Douglas Cox
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,

VIRUSMETER: PREVENTING YOUR CELLPHONE FROM SPIESRAID 2009

Lei Liu, Department of Computer Science, George Mason UniversityGuanhua Yan, Information Sciences Group, Los Alamos National LaboratoryXinwen Zhang, Computer Science Lab, Samsung Information Systems AmericaSongqing Chen, Department of Computer Science, George Mason University

Page 2: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,

Outline

Introduction Related Work Overview

Page 3: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,

Introduction

1 billion camera phones to be shipped in 2008 Smartphones: about 10%, 100 million

units By the end of 2007, over 370

different mobile malware Information stealing, overcharging,

battery exhaustion, network congestion

Page 4: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,

Introduction

Signature-based Encryption, obfuscation, packing

Anomaly-based High false alarm rate

Behavioral signatures Resource-constrained FlexiSPY-like malware doesn’t show

anomalies in the order of relevant API calls

Page 5: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,

Introduction

VirusMeter Based on battery power

Challenges Require power model Need to measure battery power in real-

time Lightweight. Cannot consume too much

CPU and power

Page 6: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,

Related Work

Infection vectors Bluetooth, MMS, memory cards, user

downloading Epidemic spreading in mobile, 2005

ACM WiSe Use user interaction to identify

vulnerable users, 2006 ACM WiSe Behavioral signatures for mobile mal

ware detection, 2008 Mobisys

Page 7: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,

Related Work

Limit Targeting particular situations (e.g.,

attack through MMS) Demand significant infrastructure

support Demand non-trivial computing resoures

from mobile devices

Page 8: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,

Overview

Page 9: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 10: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 11: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 12: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 13: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 14: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 15: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 16: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 17: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 18: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 19: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 20: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 21: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 22: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 23: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 24: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Page 25: Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,