Mobile VoIP Steganography
From Framework to Implementation Marcus Nutzinger Rainer Poisel Jürgen Wurzer
Institute of IT Security Research
- St. Pölten University of Applied Sciences
Mobile VoIP Steganography From Framework to Implementation Marcus - - PowerPoint PPT Presentation
Mobile VoIP Steganography From Framework to Implementation Marcus Nutzinger Rainer Poisel Jrgen Wurzer Institute of IT Security Research St. Plten University of Applied Sciences DeepSec 2010 November 25 th 2010 Mobile VoIP Steganography
Mobile VoIP Steganography – From Framework to Implementation
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
Cover Image
Key Stego Object Communications Channel Original Cover
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
embedding extraction
(cover) modified from Alice (stego object) micro speaker modified from Bob (stego object) Alice secret message A from Alice for Bob secret message B from Bob StegIT-2 framework
GUI Chat
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
Linux router (e.g. OpenWrt) Linux router (e.g. OpenWrt) Internet VoIP Client VoIP Client
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
embedding extraction framework RTP packets RTP packets netfilter-queue Linux router (e.g. OpenWrt) embedding extraction framework RTP packets RTP packets netfilter-queue Linux router (e.g. OpenWrt) Internet VoIP Client VoIP Client
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
embedding extraction micro speaker Alice modified handsfree set adapter soundcard for audio input (line in / mic) and audio output (line out) PC with StegIT-2 framework mobile phone embedding extraction micro speaker Bob modified handsfree set adapter soundcard for audio input (line in / mic) and audio output (line out) PC with StegIT-2 framework mobile phone
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
Alice Bob Secret Data Protocol Presentation Embedding Synchronization Transmission Secret Data Protocol Presentation Embedding Synchronization Transmission Frame transmission (e.g. RTP) Bytes Bits Chips Samples Samples 6 5 4 3 2 1
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
IEmbeddingEngine
+embedIntoSamples() +extractFromSamples()
ISampleIO
+read() +write()
CAlsaIO CPulseAudioIO CRoutingIO CWaveIO CSocketIO CDeinterlaceIO COriginalModifiedIO CCombinationIO ISampleIO
1 1 1 2 1 2 1 1
main
CSamplesPreprocessor
+createStegoObject() +extractFromStegoObject() 1 1 1 1
CStegCallHandle
+getEmbeddingEngine() 1 1
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
Start End io->read() Init framework: io, samles preprocessor, embedding engine EOF Action createStegoObject() extractFromStegoObject() io->write() false true Wait for extract thread Destroy framework extract thread: Wait for extraction, Extract secret data Copy audio samples into a ring buffer for extraction 1 =EMBED =EXTRACT 1
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
Start embedOrExtract() End embedOrExtract() Representation Action embedIntoSamples() Embed into encoded audio data extractFromSamples() Extract from encoded audio data Action embedIntoSamples() Embed into decoded audio samples extractFromSamples() Extract from decoded audio samples Decode Encode =EMBED =EMBED =EXTRACT =EXTRACT =ORIGINAL =DECODE For format specific embedding / extraction For decoded "analog" embedding / extraction
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
IEmbeddingEngine
+embedIntoSamples() +extractFromSamples()
IExtendedBitSource
+getBit() +putBit()
CStreamBuilder IBitSource
+getBit() +putBit()
IPacketSource
+getPacket() +putPacket()
IStegIO
+read() +write() 1 1 1 1 1 1
CPacketBuilder CByteBuilder CDynamicSSEE
1 1
CFrameBuilder CFileProtocolEngine CDummyProtocolEngine CGuiProtocolEngine CDatagramBuilder
1 1
CDefenseEmbeddingEngine CEchoEmbeddingEngine CRandLsbEmbeddingEngine
1 1 1 1 1
CSimpleFileProtocolEngine
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
eth0 vnet1 vnet2 eth0
192.168.101.10 192.168.101.1 192.168.102.2 192.168.102.20
Alice Bob Defense
Defense deactivated Defense activated Guest (Virtual Maschine) Guest (Virtual Maschine) Host (Physical Maschine) VoIP Client VoIP Client GUI GUI Call between Alice (192.168.101.10) and Bob (192.168.102.20) FW GUI FW FW
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
DeepSec 2010 November 25th 2010
Mobile VoIP Steganography – From Framework to Implementation
DeepSec 2010 November 25th 2010