Using Labeling to Prevent Cross-Service Attacks Against Smart Phones - - PowerPoint PPT Presentation

using labeling to prevent cross service attacks against
SMART_READER_LITE
LIVE PREVIEW

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones - - PowerPoint PPT Presentation

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones Collin Mulliner, Giovanni Vigna University of California, Santa Barbara David Dagon, Wenke Lee Georgia Institute of Technology, Atlanta Using Labeling to Prevent


slide-1
SLIDE 1

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones

Collin Mulliner, Giovanni Vigna

University of California, Santa Barbara

David Dagon, Wenke Lee

Georgia Institute of Technology, Atlanta

slide-2
SLIDE 2

2

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Smart Phones

  • Combination of PDAs and mobile phones
  • Integrate multiple wireless networking technologies

 Wireless LAN, Bluetooth, GSM/CDMA/UMTS, IrDA

  • Support installation of 3rd-party software

 For example: VoIP clients, FTP servers, games

slide-3
SLIDE 3

3

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Contributions

  • Devised Cross-Service Attacks, a new class of attacks

against smart phones

  • Created a proof-of-concept cross-service attack
  • Developed a protection mechanism to prevent cross-

service attacks

slide-4
SLIDE 4

4

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Introduction to Cross-Service Attacks

  • Smart phones integrate different network services

 GSM, Wireless LAN, Bluetooth, IrDA

  • Integration is often done without taking into account the

specific characteristics of the different services

 For example: free vs. pay-per-use services

  • An attacker can leverage the interaction between different

types of network services

 For example: gain access to pay-per-use services by exploiting

free services

slide-5
SLIDE 5

5

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Service Protection

  • Local and personal area wireless networking services

 Devices do not offer comprehensive protection mechanisms  Many smart phone applications are developed without security in

mind

  • Mobile phone services

 Service providers protect their customers

  • For example: firewalling
slide-6
SLIDE 6

6

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Crossing Service Boundaries

  • Attack device using local area wireless networking service

 Exploit insecure configuration of local area wireless networks and

networked applications

 Take control of the device

  • Access mobile phone service (cross service boundaries)

 Initiate phone calls or send text messages  Exploit pay-per-use services to defraud user

  • For example: 900/0190 calls and/or premium rate text messages
slide-7
SLIDE 7

7

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Attack Scenario

  • Coffee shop with free wireless Internet access

 Attacker looks for smart phones joining the wireless network  Exploits vulnerable device and causes financial damage

slide-8
SLIDE 8

8

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

A Proof-of-Concept Attack

  • Targets PocketPC-based smart phones

 PocketPC is the WindowsCE version for smart phones

  • Performs buffer overflow/stack-smashing attack against

an FTP server

 Shellcode accesses mobile phone interface and initiates call

  • Overcomes complications due to WindowsCE architecture

 Need to load special DLL for accessing the phone interface  Need to guess correct return address

slide-9
SLIDE 9

9

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Cross-Service Exploit

slide-10
SLIDE 10

10

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Preventing Cross-Service Attacks

  • Stack protection (for preventing stack-smashing attacks)

 Not available or rarely used on mobile devices  Does not prevent exploitation of application-logic errors  Does not protect against Trojan horses

  • Other protection mechanisms needed

 Detect and prevent attempts to cross service boundaries

slide-11
SLIDE 11

11

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Preventing Cross-Service Attacks Through Labeling

  • Developed a security mechanism that tracks and controls

network interface access using labeling

 A label indicates contact with a specific network interface  A user-defined policy defines which labels should prevent

access to a specific network interface

  • Labels are assigned to processes as they access network

interfaces

  • Labels are transferred between processes and files on

access or execution

slide-12
SLIDE 12

12

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Tracking and Controlling Network Access

  • Developed a kernel-level reference monitor

 Intercepts security-critical system calls  Assigns labels to processes and transfers them between

processes and resources

 Enforces access control policies

  • Intercepted security-critical system calls:

 socket(AF_INET, ...) IP-based network access  open(...) File and device access  execve(...) Program execution

slide-13
SLIDE 13

13

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Labeling Processes and Files

  • Interface access

 The process' labels are compared with the access control policy

  • Access is permitted or denied

 The process is labeled with label of accessed interface

  • Resource/file write access and process creation

 Files and processes inherit labels of creating process

  • Resource/file read access and application execution

 Process inherits labels from accessed and executed file

slide-14
SLIDE 14

14

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Label Groups

slide-15
SLIDE 15

15

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Access Control and Exception Policy

  • Access control rules

 access <interface> <deny/ask> <label(s)>  Example: access wireless_nonfree deny wireless_free

  • Exception rules

 exception <path> <notlabel/notinherit/notpass>  Example: exception /Windows/activesync.exe notinherit

slide-16
SLIDE 16

16

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Preventing the Attack

  • The FTP server process is labeled on calling socket(...)

 Label is set for: wireless_free

  • The exploit tries to access the phone interface

 For example: open(“/dev/ttyS0”, ...)

  • The reference monitor is invoked

 Process labels are compared with policy rules  The monitor denies access, open(...) returns EACCESS

slide-17
SLIDE 17

17

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Evaluation

  • Our labeling system effectively prevents attacks that cross

service boundaries

  • System and policy language are light-weight

 Appropriate for mobile devices

  • Exception rules have to be used carefully

 Otherwise the labeling system can be bypassed

slide-18
SLIDE 18

18

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Overhead

  • Reference implementation for Familiar Linux

 Overhead between 10% and 26%

slide-19
SLIDE 19

19

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Conclusions

  • Smart phones present new challenges for security

designers and analysts

 Especially the integration of multiple networking services are

problematic

  • We introduced a new type of attack
  • We demonstrated the possible impact of a cross-service

vulnerability

  • We designed and implemented a solution based on

resource labeling

slide-20
SLIDE 20

20

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Future Work

  • Extend the policy language to support more complex

labeling policies

  • Improve the implementation of the reference monitor to

further reduce overhead

slide-21
SLIDE 21

21

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Questions?

Thank you for your attention!