using labeling to prevent cross service attacks against
play

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones - PowerPoint PPT Presentation

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones Collin Mulliner, Giovanni Vigna University of California, Santa Barbara David Dagon, Wenke Lee Georgia Institute of Technology, Atlanta Using Labeling to Prevent


  1. Using Labeling to Prevent Cross-Service Attacks Against Smart Phones Collin Mulliner, Giovanni Vigna University of California, Santa Barbara David Dagon, Wenke Lee Georgia Institute of Technology, Atlanta Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  2. Smart Phones ● Combination of PDAs and mobile phones ● Integrate multiple wireless networking technologies  Wireless LAN, Bluetooth, GSM/CDMA/UMTS, IrDA ● Support installation of 3 rd -party software  For example: VoIP clients, FTP servers, games 2 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  3. Contributions ● Devised Cross-Service Attacks, a new class of attacks against smart phones ● Created a proof-of-concept cross-service attack ● Developed a protection mechanism to prevent cross- service attacks 3 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  4. Introduction to Cross-Service Attacks ● Smart phones integrate different network services  GSM, Wireless LAN, Bluetooth, IrDA ● Integration is often done without taking into account the specific characteristics of the different services  For example: free vs. pay-per-use services ● An attacker can leverage the interaction between different types of network services  For example: gain access to pay-per-use services by exploiting free services 4 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  5. Service Protection ● Local and personal area wireless networking services  Devices do not offer comprehensive protection mechanisms  Many smart phone applications are developed without security in mind ● Mobile phone services  Service providers protect their customers ● For example: firewalling 5 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  6. Crossing Service Boundaries ● Attack device using local area wireless networking service  Exploit insecure configuration of local area wireless networks and networked applications  Take control of the device ● Access mobile phone service ( cross service boundaries )  Initiate phone calls or send text messages  Exploit pay-per-use services to defraud user ● For example: 900/0190 calls and/or premium rate text messages 6 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  7. Attack Scenario ● Coffee shop with free wireless Internet access  Attacker looks for smart phones joining the wireless network  Exploits vulnerable device and causes financial damage 7 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  8. A Proof-of-Concept Attack ● Targets PocketPC-based smart phones  PocketPC is the WindowsCE version for smart phones ● Performs buffer overflow/stack-smashing attack against an FTP server  Shellcode accesses mobile phone interface and initiates call ● Overcomes complications due to WindowsCE architecture  Need to load special DLL for accessing the phone interface  Need to guess correct return address 8 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  9. Cross-Service Exploit 9 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  10. Preventing Cross-Service Attacks ● Stack protection (for preventing stack-smashing attacks)  Not available or rarely used on mobile devices  Does not prevent exploitation of application-logic errors  Does not protect against Trojan horses ● Other protection mechanisms needed  Detect and prevent attempts to cross service boundaries 10 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  11. Preventing Cross-Service Attacks Through Labeling ● Developed a security mechanism that tracks and controls network interface access using labeling  A label indicates contact with a specific network interface  A user-defined policy defines which labels should prevent access to a specific network interface ● Labels are assigned to processes as they access network interfaces ● Labels are transferred between processes and files on access or execution 11 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  12. Tracking and Controlling Network Access ● Developed a kernel-level reference monitor  Intercepts security-critical system calls  Assigns labels to processes and transfers them between processes and resources  Enforces access control policies ● Intercepted security-critical system calls:  socket(AF_INET, ...) IP-based network access  open(...) File and device access  execve(...) Program execution 12 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  13. Labeling Processes and Files ● Interface access  The process' labels are compared with the access control policy ● Access is permitted or denied  The process is labeled with label of accessed interface ● Resource/file write access and process creation  Files and processes inherit labels of creating process ● Resource/file read access and application execution  Process inherits labels from accessed and executed file 13 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  14. Label Groups 14 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  15. Access Control and Exception Policy ● Access control rules  access <interface> <deny/ask> <label(s)>  Example: access wireless_nonfree deny wireless_free ● Exception rules  exception <path> <notlabel/notinherit/notpass>  Example: exception /Windows/activesync.exe notinherit 15 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  16. Preventing the Attack ● The FTP server process is labeled on calling socket(...)  Label is set for: wireless_free ● The exploit tries to access the phone interface  For example: open(“/dev/ttyS0”, ...) ● The reference monitor is invoked  Process labels are compared with policy rules  The monitor denies access, open(...) returns EACCESS 16 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  17. Evaluation ● Our labeling system effectively prevents attacks that cross service boundaries ● System and policy language are light-weight  Appropriate for mobile devices ● Exception rules have to be used carefully  Otherwise the labeling system can be bypassed 17 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  18. Overhead ● Reference implementation for Familiar Linux  Overhead between 10% and 26% 18 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  19. Conclusions ● Smart phones present new challenges for security designers and analysts  Especially the integration of multiple networking services are problematic ● We introduced a new type of attack ● We demonstrated the possible impact of a cross-service vulnerability ● We designed and implemented a solution based on resource labeling 19 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  20. Future Work ● Extend the policy language to support more complex labeling policies ● Improve the implementation of the reference monitor to further reduce overhead 20 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

  21. Questions? Thank you for your attention! 21 Using Labeling to Prevent Cross-Service Attacks Against Smart Phones DIMVA 2006

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend