SlideShare a Scribd company logo
Android Phone Identifiers and
Eavesdropping Audio
李士暄
2014/7/41
Reference
• A Study of Android Application Security.
– Pennsylvania State University
– William Enck, Damien Octeau, Patrick McDaniel,
and Swarat Chaudhuri.
• Soundcomber: A Stealthy and Context-Aware
Sound Trojan for Smartphones.
– Indiana University Bloomington
– Kehuan Zhang, Xiaoyong Zhou, Mehool Intwala,
Apu Kapadia, XiaoFeng Wang
2
Introduction – Phone Identifiers
3
Identifiers Desciption
SIM (Subscriber
Identity Module)
A SIM card is a smart card that identifies the subscriber,
the service provider, and the mobile phone number.
PIN (personal
identification number)
A numeric password for SIM card that can be used to
authenticate the user to the system. (Default : 0000 or
1234)
IMEI (International
Mobile Equipment
Identity)
An unique number that identifies each mobile device. It
is 15 digits numbers. When a phone is reported stolen or
is not type approved, the number is marked invalid.
(Enter : *#06#)
IMSI (International
Mobile Subscriber
Identity)
An IMSI is a unique number that identifies user. It is also
15 digits long. Key Identification(KI) is an unique
password for each IMSI.
ICCID (Integrated
Circuit Card Identifier)
An ICCID is a unique number that identifies SIM card. It is
20 digits long number.
Introduction
• Phone identifiers are frequently leaked through
plaintext requests.
– Most sinks are HTTP GET or POST parameters
• Phone Identifier are used as device fingerprint.
– Not only phone identifers, but also other properties
– OS version, device hardware , application name,
platform
• IMEI is tied to personally identifiable
information(PII)
– Include IMEI in account registration and login request.
E.g. Line、Whatsapp
4William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. Pennsylvania State University.
A Study of Android Application Security
Threats
• WhatsApp Password : an inverse of your phones IMEI
number with an MD5 cryptographic hash
1. Attacker develop an faked app and let user fill in their
personal information in registration part.
2. Silently sends the victims IMEI number & phone
number to his server in the background.
3. A hacker creates database/file with IMEI numbers
with associated phone numbers.
4. A spammer buys this information from an app
developer.
5
Sequence diagram of attacker scenario for
WhatsApp application
6
Demo
• App : Siminfo
• <uses-permission
android:name="android.permission.READ_PHONE_STATE" />
• Android.telephony.TelephonyManager
• getDeviceId() // Get IMEI
• getSimSerialNumber() // Get ICCID
• getSubscriberId() //Get IMSI
• Socket Programming
7
Demo : Siminfo
8
1. Server 開啟,等待Client連線
2. Client輸入完資料按【submit】,透過socket方式
傳送給 IP為: 192.168.1.1 的Server
3. 同時將該手機的IMEI、ICCID、IMSI 傳給Server
Eavesdropping Audio
• A Trojan with access to the video camera or
microphone can
– tape a user’s phone conversations
– send the recording to other parties , which
enables remote surveillance
– We refer to as sensory malware
• Malware : Android/NickiSpy
– record user telephone conversations
– store them in the SD card memory
9
Android/NickiSpy
• Once the malware is installed, it requests the
following permissions from the user:
10
Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011
http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
Android/NickiSpy
• After installing the application and rebooting,
the device will start the following services in
the background:
11
Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011
http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
Android/NickiSpy
• AndroidManifest.xml
12
Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011
http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
Android/NickiSpy
• The malware drops a configuration file onto
the phone.
– This file has all the information the app needs
including the command server and port number
through which it communicates.
13
Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011
http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
Android/NickiSpy
• The malware recorded the conversation and
stored it on the compromised phone’s SD card.
14
Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011
http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
Android/NickiSpy
• The malware also retrieves the IMEI number
of the compromised mobile device
– And sends that information to the mobile number
“15859268161″
15
Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011
http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
Demo
• App: RecordAudio
• <uses-permission
android:name="android.permission.RECORD_AUDIO" />
• <uses-permission
android:name="android.permission.INTERNET" />
• Socket Programming
16
Demo: RecordAudio
17
1. Server開啟,等待Clinet連線
2. Client開始App後,自動連上Server(IP:192.168.1.1)
3. Server端下指令 : start(client端開始錄音)
4. Server端下指令 : stop (Client端停止錄音)
5. Client將錄音檔傳送給Server,並放在桌面上
Comments
• Android is highly dangerous!!!
• Users should never install unknown or
untrusted applications on their mobile devices.
– Do not checked Setting > Security > unknown
sources
• Pay attention to those unrelated permissions
that are requested when you install app.
18

More Related Content

What's hot

Mobile security
Mobile securityMobile security
Mobile security
Tapan Khilar
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
JASHU JASWANTH
 
Computer securety
Computer securetyComputer securety
Computer securety
rushil ahmed
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Devendra Yadav
 
1. Mobile Application (In)security
1. Mobile Application (In)security1. Mobile Application (In)security
1. Mobile Application (In)security
Sam Bowne
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
Manish Gupta
 
CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSCNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOS
Sam Bowne
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
guestc03f28
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Namrata Raiyani
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
SISA Information Security Pvt.Ltd
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
Nithilan1
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
AGILLY
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
Vishal Kumar
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
Cmano Kar
 
Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056mashiur
 
Hacking
HackingHacking
Hacking
LutfulM
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
Fabio Pietrosanti
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: Android
Sam Bowne
 

What's hot (20)

Mobile security
Mobile securityMobile security
Mobile security
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
1. Mobile Application (In)security
1. Mobile Application (In)security1. Mobile Application (In)security
1. Mobile Application (In)security
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSCNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOS
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Mobile phone Data Hacking
Mobile phone Data HackingMobile phone Data Hacking
Mobile phone Data Hacking
 
It
ItIt
It
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056
 
Hacking
HackingHacking
Hacking
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: Android
 

Similar to Android phone identifiers and eavesdropping audio

ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Michael Davis
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malwareSytelReplyUK
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
Subho Halder
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesTyler Shields
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
IBM Security
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperHarsimran Walia
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest Version
Subho Halder
 
Smartphone
SmartphoneSmartphone
Smartphone
Naval OPSEC
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
bugcrowd
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
eightbit
 
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET Journal
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium Security
Jack Mannino
 
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
IBM Security
 
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Svetlin Nakov
 
Android App Security Solution
Android App Security SolutionAndroid App Security Solution
Android App Security Solution
Jay Li
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
Vince Verbeke
 

Similar to Android phone identifiers and eavesdropping audio (20)

ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest Version
 
Smartphone
SmartphoneSmartphone
Smartphone
 
OS-Project-Report-Team-8
OS-Project-Report-Team-8OS-Project-Report-Team-8
OS-Project-Report-Team-8
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
 
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection Methods
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium Security
 
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
 
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
 
Android App Security Solution
Android App Security SolutionAndroid App Security Solution
Android App Security Solution
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 

Recently uploaded

Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
Sharepoint Designs
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 

Recently uploaded (20)

Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 

Android phone identifiers and eavesdropping audio

  • 1. Android Phone Identifiers and Eavesdropping Audio 李士暄 2014/7/41
  • 2. Reference • A Study of Android Application Security. – Pennsylvania State University – William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. • Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. – Indiana University Bloomington – Kehuan Zhang, Xiaoyong Zhou, Mehool Intwala, Apu Kapadia, XiaoFeng Wang 2
  • 3. Introduction – Phone Identifiers 3 Identifiers Desciption SIM (Subscriber Identity Module) A SIM card is a smart card that identifies the subscriber, the service provider, and the mobile phone number. PIN (personal identification number) A numeric password for SIM card that can be used to authenticate the user to the system. (Default : 0000 or 1234) IMEI (International Mobile Equipment Identity) An unique number that identifies each mobile device. It is 15 digits numbers. When a phone is reported stolen or is not type approved, the number is marked invalid. (Enter : *#06#) IMSI (International Mobile Subscriber Identity) An IMSI is a unique number that identifies user. It is also 15 digits long. Key Identification(KI) is an unique password for each IMSI. ICCID (Integrated Circuit Card Identifier) An ICCID is a unique number that identifies SIM card. It is 20 digits long number.
  • 4. Introduction • Phone identifiers are frequently leaked through plaintext requests. – Most sinks are HTTP GET or POST parameters • Phone Identifier are used as device fingerprint. – Not only phone identifers, but also other properties – OS version, device hardware , application name, platform • IMEI is tied to personally identifiable information(PII) – Include IMEI in account registration and login request. E.g. Line、Whatsapp 4William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. Pennsylvania State University. A Study of Android Application Security
  • 5. Threats • WhatsApp Password : an inverse of your phones IMEI number with an MD5 cryptographic hash 1. Attacker develop an faked app and let user fill in their personal information in registration part. 2. Silently sends the victims IMEI number & phone number to his server in the background. 3. A hacker creates database/file with IMEI numbers with associated phone numbers. 4. A spammer buys this information from an app developer. 5
  • 6. Sequence diagram of attacker scenario for WhatsApp application 6
  • 7. Demo • App : Siminfo • <uses-permission android:name="android.permission.READ_PHONE_STATE" /> • Android.telephony.TelephonyManager • getDeviceId() // Get IMEI • getSimSerialNumber() // Get ICCID • getSubscriberId() //Get IMSI • Socket Programming 7
  • 8. Demo : Siminfo 8 1. Server 開啟,等待Client連線 2. Client輸入完資料按【submit】,透過socket方式 傳送給 IP為: 192.168.1.1 的Server 3. 同時將該手機的IMEI、ICCID、IMSI 傳給Server
  • 9. Eavesdropping Audio • A Trojan with access to the video camera or microphone can – tape a user’s phone conversations – send the recording to other parties , which enables remote surveillance – We refer to as sensory malware • Malware : Android/NickiSpy – record user telephone conversations – store them in the SD card memory 9
  • 10. Android/NickiSpy • Once the malware is installed, it requests the following permissions from the user: 10 Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011 http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
  • 11. Android/NickiSpy • After installing the application and rebooting, the device will start the following services in the background: 11 Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011 http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
  • 12. Android/NickiSpy • AndroidManifest.xml 12 Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011 http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
  • 13. Android/NickiSpy • The malware drops a configuration file onto the phone. – This file has all the information the app needs including the command server and port number through which it communicates. 13 Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011 http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
  • 14. Android/NickiSpy • The malware recorded the conversation and stored it on the compromised phone’s SD card. 14 Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011 http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
  • 15. Android/NickiSpy • The malware also retrieves the IMEI number of the compromised mobile device – And sends that information to the mobile number “15859268161″ 15 Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011 http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
  • 16. Demo • App: RecordAudio • <uses-permission android:name="android.permission.RECORD_AUDIO" /> • <uses-permission android:name="android.permission.INTERNET" /> • Socket Programming 16
  • 17. Demo: RecordAudio 17 1. Server開啟,等待Clinet連線 2. Client開始App後,自動連上Server(IP:192.168.1.1) 3. Server端下指令 : start(client端開始錄音) 4. Server端下指令 : stop (Client端停止錄音) 5. Client將錄音檔傳送給Server,並放在桌面上
  • 18. Comments • Android is highly dangerous!!! • Users should never install unknown or untrusted applications on their mobile devices. – Do not checked Setting > Security > unknown sources • Pay attention to those unrelated permissions that are requested when you install app. 18