Professional Documents
Culture Documents
Plan (1/3)
Android System
Features
Permissions
Debugging mode
Plan (2/3)
Remote control & triggers
Internet polling
Plan (3/3)
SpyYourWife
Geolocation tricks
Conclusion
Plan (1/4)
Android System
Features
Permissions
Debugging mode
Android
OS for mobile phone and tablets
Advantages
Code available
http://android.google.com
6
Android
Generic features (smartphones)
WiFi connectivity
GSM/CDMA connectivity
SMS/MMS capability
Internet connectivity
Android
Security Model
Based on permissions
Internet access
Sensor management
Telephony management
Separated files
Android
SDK
Regularly updated
Java API
Sockets
Multi-threading
Android
Debugging mode
Unknown sources
10
Plan (1/4)
Android System
Features
Permissions
Debugging mode
Light state
Active processes or threads
Sound, etc.
12
Android Intents
Android is based on Activities
Kind of process
An intent contains
A name
And extra params
13
Covert channels
Covert channel
Overt channels
Communication channels
HTTP requests
SMS/MMS
TCP connections
16
TaintDroid
Intent-based communication
17
Plan (2/3)
Remote control & triggers
Internet polling
18
Internet polling
Specific triggers
19
Internet polling
Based on regular HTTP requests
20
Triggers
Instead of polling,
SMS
phone call
Geolocation
Triggers
Advantages:
Easier to implement
Coolest triggers
SMS
Phone call
22
Triggers
SMS
android.provider.Telephony.SMS_RECEIVED
24
privatefinalStringACTION=
"android.provider.Telephony.SMS_RECEIVED";
publicvoidonReceive(Contextcontext,Intentintent){
if(intent.getAction().equals(ACTION))
{
this.abortBroadcast();/*avoidfurtherbroadcast*/
}
}
25
Plan (2/3)
Remote control & triggers
Internet polling
26
YAY !
27
29
Size
Role
Message type
TP-Message Reference
X+3
X+4
...
...
30
31
32
Plan (3/3)
SpyYourWife
Geolocation tricks
Conclusion
34
SpyYourWife
SpyYourWife
False-positive reduction
35
SpyYourWife
Geolocation tricks
Plan (3/3)
SpyYourWife
Geolocation tricks
Conclusion
37
Conclusion
Android users can decrease dramatically the
security of their smartphones
Conclusion
Covert channels
Overt channels
Conclusion
Actual threats
Malwares
Constantly growing
DroidDream case
Use covert channels to communicate between apps
Trojans
Questions
Questions ?
41
Special thanks to
Heurs
@emiliengirault
@adesnos
42