Nomadic Honeypots A Novel Concept for Smartphone Honeypots Steffen - - PowerPoint PPT Presentation

nomadic honeypots
SMART_READER_LITE
LIVE PREVIEW

Nomadic Honeypots A Novel Concept for Smartphone Honeypots Steffen - - PowerPoint PPT Presentation

Nomadic Honeypots A Novel Concept for Smartphone Honeypots Steffen Liebergeld , Matthias Lange and Collin Mulliner Security in Telecommunications Technische Universit at Berlin, Germany { steffen,mlange } @sec.t-labs.tu-berlin.de Northeastern


slide-1
SLIDE 1

Nomadic Honeypots

A Novel Concept for Smartphone Honeypots Steffen Liebergeld, Matthias Lange and Collin Mulliner

Security in Telecommunications Technische Universit¨ at Berlin, Germany {steffen,mlange}@sec.t-labs.tu-berlin.de Northeastern University crm@ccs.neu.edu

May 23, 2013

slide-2
SLIDE 2

Smartphones are a Valuable Target for Attackers

Ubiquitous Precious personal information

◮ Login credentials for email, social networks ... ◮ Banking credentials, Wallet ◮ Location

Always online Directly generate money Lots of infection vectors

Liebergeld (TUB) Nomadic Honeypots May 23, 2013 1 / 9

slide-3
SLIDE 3

Motivation

Users conscious about security Having countermeasures can be valuable market asset for cellular

  • perators

Requires information on current threats How can we collect information on mobile threats?

Liebergeld (TUB) Nomadic Honeypots May 23, 2013 2 / 9

slide-4
SLIDE 4

Infection Vectors on Smartphones

User interaction required:

◮ Apps ◮ QR-Codes

Phone needs to be placed within reach of:

◮ NFC ◮ Bluetooth ◮ WiFi, ◮ FM-radio

Insight: Static Honeypots will not work

Liebergeld (TUB) Nomadic Honeypots May 23, 2013 3 / 9

slide-5
SLIDE 5

Idea: Collect Threat Information Directly on Smartphone

Operator Malicious WiFI Inform I n f

  • r

m Warn W a r n Smartphone infected with Bluetooth worm Nomadic Honeypots Ordinary Smartphones

Liebergeld (TUB) Nomadic Honeypots May 23, 2013 4 / 9

slide-6
SLIDE 6

Concept of Nomadic Honeypots

Functional requirements:

◮ Collect threat information ◮ Send collected information to operator ◮ Confine attack: pose no harm to others

Threat Model:

◮ Allow smartphone OS to be completely compromised Liebergeld (TUB) Nomadic Honeypots May 23, 2013 5 / 9

slide-7
SLIDE 7

Concept of Nomadic Honeypots

Partition the device Isolate partitions from one another Honeypot Partition:

◮ Runs smartphone OS ◮ Interacts with the user ◮ Hosts user information and Apps ◮ Cannot directly communicate ◮ Cannot tamper with data in second partition even when compromised

Infrastructure Partition:

◮ Mediates access to all communication devices ◮ Sensors for threat information collection ◮ Snapshot mechanism for Honeypot partition ◮ Backchannel to operator (e.g VPN) Liebergeld (TUB) Nomadic Honeypots May 23, 2013 6 / 9

slide-8
SLIDE 8

Practical Design

Hardware Microkernel

Honeypot VM Infrastructure VM

Communication Devices Sensors Virtual Devices Mobile OS (ABI unmodified) Applications Backchannel

Liebergeld (TUB) Nomadic Honeypots May 23, 2013 7 / 9

slide-9
SLIDE 9

Challenges

Social challenges: How to find people who use nomadic honeypot as their primary phone? Privacy issue: information is sent to operator Usability issue: Battery duration, performance degraded Technical challenges: How to virtualize efficiently?

◮ Must ensure performance ◮ Keep battery duration at reasonable levels

How to build reasonable sensors?

◮ Which data streams to monitor? ◮ Sweet spot: Processing on device versus sending data to operator Liebergeld (TUB) Nomadic Honeypots May 23, 2013 8 / 9

slide-10
SLIDE 10

Take Away

Nomadic Honeypots: New concept for smartphone honeypots Threat collection directly on the device Two isolated partitions: Honeypot and Infrastructure Practical design proposed Work has just started Contributions welcome: steffen@sec.t-labs.tu-berlin.de

Liebergeld (TUB) Nomadic Honeypots May 23, 2013 9 / 9

slide-11
SLIDE 11

Prototype

Based on Fiasco.OC, L4Re and L4Android Runs on Galaxy S2 smartphone Mediates baseband access Parts missing: Sensors, mediating NFC, Bluetooth, secure backchannel Lots of optimization needed Battery duration of about a day

Liebergeld (TUB) Nomadic Honeypots May 23, 2013 9 / 9