Light Weight Defense Mechanism Against Camera Based Attacks (original) (raw)

CAMERA BASED ATTACK DETECTION AND PREVENTION TECH- NIQUES ON ANDROID MOBILE PHONES

Mobile phone security has become an important aspect of security issues in wireless multimedia communications. In this paper, we focus on security issues related to mobile phone cameras. Specifically, we discover several new attacks that are based on the use of phone cameras. We implement the attacks on real phones, and demonstrate the feasibility and effectiveness of the attacks. Furthermore, we propose a lightweight defense scheme that can effectively detect these attacks. In this paper, we are going to develop an Android application such that when a user loses his/her phone, the spy camera could be launched via remote control and capture what the thief looks like as well as the surrounding environment. Then the pictures or videos along with location information (GPS coordinates) can be sent back to the device owner so that the owner can pinpoint the thief and get the phone back. We conduct a survey on the threats and benefits of spy cameras. Then we present the basic attack model and two camera based attacks: the remote-controlled real time monitoring attack and the pass code inference attack. We run these attacks along with popular antivirus software to test their stealthiness, and conduct experiment to evaluate both types of attack.

Spy camera attacks on mobile security

International Journal of Advance Research, Ideas and Innovations in Technology, 2018

Nowadays, Smartphone security has become a major issue to resolve. All the smart phones have features like camera, touch screen and many more. These may cause attacks on users smart phones. Modern smart phone platforms provide users to customize their device using applications found on app stores. Users are constantly in trouble that they are unaware of installing malicious apps that steal personal data or gain access to other private information. For example, while using such malicious application, the application provider may carry the hidden request to have access to different devices connected to our phone such as camera, smart phone is been attacked, identifying our location through camera as it will show our surrounding area and trying to identify PIN using camera. However, few Works have studied mobile phone multimedia Security. In this survey, we focus on security problems related to mobile phone cameras. Specifically, we discuss several attacks that are based on the smart p...

A New Mobile Malware Classification for Camera Exploitation based on System Call and Permission

2017

Currently, there are many attacks and exploitation to Android smartphones by the attackers all over the world. These attacks are based on profit and caused loss of money and productivity to the victim. This exploitation can be done via camera, SMS, call, audio, image or location exploitation by attacking the system call, permission or API inside the Android smartphone. Therefore, this paper presents 32 mobile malware classification based on system call and permission to detect camera exploitation for Android smartphone. The experiment was conducted in a controlled lab environment, by applying reverse engineering with 5560 training dataset from Drebin, where both static and dynamic analyses were used to identify and extract the permission and system call from the mobile applications (apps). These 32 classification have been evaluated with 500 mobile apps from Google Play Store and 19 mobile apps matched with the classification. This new classification can be used as the database and ...

A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks

International Journal of Advanced Computer Science and Applications, 2017

Nowadays, the usage of smartphones and their applications have become rapidly popular in people's daily life. Over the last decade, availability of mobile money services such as mobile-payment systems and app markets have significantly increased due to the different forms of apps and connectivity provided by mobile devices, such as 3G, 4G, GPRS, and Wi-Fi, etc. In the same trend, the number of vulnerabilities targeting these services and communication networks has raised as well. Therefore, smartphones have become ideal target devices for malicious programmers. With increasing the number of vulnerabilities and attacks, there has been a corresponding ascent of the security countermeasures presented by the researchers. Due to these reasons, security of the payment systems is one of the most important issues in mobile payment systems. In this survey, we aim to provide a comprehensive and structured overview of the research on security solutions for smartphone devices. This survey reviews the state of the art on security solutions, threats, and vulnerabilities during the period of 2011-2017, by focusing on software attacks, such those to smartphone applications. We outline some countermeasures aimed at protecting smartphones against these groups of attacks, based on the detection rules, data collections and operating systems, especially focusing on open source applications. With this categorization, we want to provide an easy understanding for users and researchers to improve their knowledge about the security and privacy of smartphones.

Research in Progress-Defending Android Smartphones from Malware Attacks

2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT), 2013

Smart phones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features. The Android smart phone is one of the most widely used platforms by businesses and users alike. This is partially because Android smart phones use the free, open-source Linux as the underlying operating system, which allows development of applications by any software developer. This research study aims to explore security risks associated with the use of Android smart phones and the sensitive information they contain, the researcher devised a survey questionnaire to investigate and further understand security threats targeting Android smart phones. The survey also intended to study the scope of malware attacks targeting Android phones and the effectiveness of existing defense measures. The study surveyed the average Android users as the target population to understand how they perceive security and what security controls they use to protect their smart phones.

A Survey of Android Security Threats and Defenses

With billions of people using smartphones and the exponential growth of smartphone apps, it is prohibitive for app marketplaces, such as Google App Store, to thoroughly verify if an app is legitimate or malicious. As a result, mobile users are left to decide for themselves whether an app is safe to use. Even worse, recent studies have shown that over 70% of apps in markets request to collect data irrelevant to the main functions of the apps, which could cause leaking of private information or inefficient use of mobile resources. It is worth mentioning that since resource management mechanism of mobile devices is different from PC machines, existing security solutions in PC malware area are not quite compatible with mobile devices. Therefore, academic researchers and commercial anti-malware companies have proposed many security mechanisms to address the security issues of the Android devices. Considering the mechanisms and techniques which are different in nature and used in proposed works, they can be classified into different categories. In this survey, we discuss the existing Android security threats and existing security enforcements solutions between 2010-2015 and try to classify works and review their functionalities. We review a few works of each class. The survey also reviews the strength and weak points of the solutions.

Threats, Attacks, and Mitigations of Smartphone Security

Academic Journal of Nawroz University, 2020

Mobile devices such as Smart Phones and Personal Assistant Devices (PDA) that are Internet based are becoming much more capable of handling complex tasks such as online shopping, online banking as well as social media networking; However, the security mechanisms and defense measures that are built into those devices are not commensurate with those powerful communication and computational capabilities. This in turn, creates critical vulnerabilities thus promoting the chance for imminent security threats. The intent of this paper is to take a look into some of the vulnerabilities and risks associated with the use of smart phones that are Internet based, explore the current security mechanisms and strategies that are in place, and finally propose some proactive defense strategies to ensure appropriate protection of critical information contained in Smart phone devices.

Stealthy video capturer: a new video-based spyware in 3g smartphones

2009

Abstract In this paper, we investigate video-based vulnerabilities in 3G Smartphones. Particularly, we design a new video-based spyware, called Stealthy Video Capturer (SVC). SVC can secretly record video information for the third party, greatly compromising Smartphone users' privacy. We implement the spyware and conduct extensive experiments on real world 3G Smartphones.

Stealthy Video Capturer: A New Video-based Spyware

In this paper, we investigate video-based vulnerabilities in 3G Smartphones. Particularly, we design a new video-based spyware, called Stealthy Video Capturer (SVC). SVC can secretly record video information for the third party, greatly compromising Smartphone users' privacy. We implement the spyware and conduct extensive experiments on real world 3G Smartphones. Our experimental results show that the spyware can capture private video information with unremarkable power consumption, CPU and memory occupancy, hence being stealthy to Smartphone users. Moreover, SVC can naturally be resistant to almost all commercial anti-virus tools, like McAfee, Kaspersky and F-Secure mobile version. To the best of our knowledge, our work is the first one to address video-based vulnerabilities in 3G Smartphones. We expect our work will prompt serious attentions on this issue.

Vulnerabilities of Smartphones

Nowadays, mobile devices are important part of our lives. Mobile phones allow us to access many services. Current Smartphones offer capabilities of traditional personal computers. Other than the traditional functionality of the phone that is calling, various other functionalities are provided by phones. There are different types of connectivity available in mobile phones such as GSM, GPRS, Bluetooth and Wi-Fi. Due to these facilities, there is a huge increase in use of smartphones. As the advantages of smartphone have increased, there is increase in vulnerabilities of Smartphone as well. Smartphones are easy targets for malware writers. As the vulnerabilities increase, attacks also increase. There are many risks with smartphones. Phone might contain confidential data like bank details. It might also have private data like photos, music, videos etc. If a phone is lost or stolen, all the data stored in phone will be lost as well as leaked. Through various applications, smartphone migh...