skip to main content
10.1145/1514274.1514285acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Stealthy video capturer: a new video-based spyware in 3G smartphones

Authors Info & Claims
Published:16 March 2009Publication History

ABSTRACT

In this paper, we investigate video-based vulnerabilities in 3G Smartphones. Particularly, we design a new video-based spyware, called Stealthy Video Capturer (SVC). SVC can secretly record video information for the third party, greatly compromising Smartphone users' privacy. We implement the spyware and conduct extensive experiments on real world 3G Smartphones. Our experimental results show that the spyware can capture private video information with unremarkable power consumption, CPU and memory occupancy, hence being stealthy to Smartphone users. Moreover, SVC can naturally be resistant to almost all commercial anti-virus tools, like McAfee, Kaspersky and F-Secure mobile version. To the best of our knowledge, our work is the first one to address video-based vulnerabilities in 3G Smartphones. We expect our work will prompt serious attentions on this issue.

References

  1. Canalys.com. http://www.canalys.com/pr/2008/ r2008021.htmGoogle ScholarGoogle Scholar
  2. M. Hypponen. Malware Goes Mobile. Scientific American, pp. 70--76, 2006Google ScholarGoogle ScholarCross RefCross Ref
  3. SuperTasks. http://www.softwareandson.com/SuperTasks/Google ScholarGoogle Scholar
  4. Memmaid. http://www.dinarsoft.com/memmaid/Google ScholarGoogle Scholar
  5. Z. Cheng. Mobile Malware: Threats and Prevention. McAfee Avert @ Labs Technical White Papers, Sept., 2007.Google ScholarGoogle Scholar
  6. G. Lawton. Is It Finally Time to Worry about Mobile Malware? Computer,41(5), 12--14, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Dagon, T. Martin and T. Starner. Mobile Phones as Computing Devices: The Viruses are Coming! IEEE Pervasive Computing, 3(4), 11--15, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Piercy. Embedded devices next on the virus target list. Electronics Systems and Software, 2(6), 42--43, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  9. Newest Electronic Threat: Mobile Spyware. http://www.nospysoftware.com/spyware--news/spyware--adware--mobile.phpGoogle ScholarGoogle Scholar
  10. FlexiSPY Mobile Spyware: Monitoring solution or Security Nightmare. http://www.informit.com/articles/article.aspx?p=1185592Google ScholarGoogle Scholar
  11. Hidden Camera Threat Display. http://research.sunbelt-software.com/Google ScholarGoogle Scholar
  12. J. Cheng, S.H.Y. Wong, H. Yang and S. Lu. SmartSiren: virus detection and alert for Smartphones. In Proc. of MOBISYS'07, 258--271, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Bose, X. Hu, K.G. Shin and T. Park. Behavioral detection of malware on mobile handsets. In Proc. of MOBISYS'08, 225--238, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. H. Kim, J. Smith and K.G. Shin. Detecting energy-greedy anomalies and mobile malware variants. In Proc. of MOBISYS'08, 239--252, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. Fleizach, M. Liljenstam and P. Johansson, et al. Can you infect me now?: malware propagation in mobile phone networks. In Proc. of WORM'07, 61--68, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Perdisci, A. Lanzi and W. Lee. McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. In Proc. of ACSAC'08, 301--310, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Dinaburg, P. Royal, M. Sharif and W. Lee. Ether: Malware Analysis via Hardware Virtualization Extensions. In Proc. of CCS'08, 51--62, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Sharif, V. Yegneswaran, H. Saidi, P. Porras and W. Lee. Eureka: A Framework for Enabling Static Malware Analysis. In Proc. of ESORICS'08, 481--500, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. G. Gu, P. Porras, V. Yegneswaran, M. Fong and W. Lee. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In Proc. of USENIX Security Symposium, 167--182, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. C. Mulliner and G. Vigna. Vulnerability Analysis of MMS User Agents. In Proc. of ACSAC'06, 77--88, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. C. Mulliner, G. Vigna, D. Dagon and W. Lee. Using Labeling to Prevent Cross--Service Attacks Against Smart Phones. In Proc. of DIMVA'06, 91--108, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. P. Royal, M. Halpin, D. Dagon, R. Edmonds and W. Lee. PolyUnpack: Automating the Hidden--Code Extraction of Unpack-Executing Malware. In Proc. of ACSAC'06, 289--300, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. G. Shen, Y. Li and Y. Zhang. MobiUS: Enable Together--Viewing Video Experience across Two Mobile Devices. In Proc. of MOBISYS'07, 30--42, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. Racic, D. Ma and H. Chen. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery. In Proc. of Securecomm and Workshops, 1--10, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  25. P. Traynor, W. Enck, P. McDaniel and T.L. Porta. Mitigating attacks on open functionality in SMS-capable cellular networks. In Proc. of MOBICOM'06, 182--193, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. New Cabir Worms Target Mobile Phones: http://www.viruslist.com/en/analysis?pubid=200119916Google ScholarGoogle Scholar
  27. Security Model for Windows Mobile 5.0 and Windows Mobile 6. http://www.microsoft.com/technet/solutionaccelerators/mobile/maintain/SecModel/aff7cf7f-0e11-4ef4-8626--f33bd969b35a.mspx?mfr=trueGoogle ScholarGoogle Scholar
  28. A. Ranjan. Using a Camera with Windows Mobile 5. http://www.developer.com/ws/pc/article.php/10947_ 3621211_1,July 21,2006Google ScholarGoogle Scholar
  1. Stealthy video capturer: a new video-based spyware in 3G smartphones

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WiSec '09: Proceedings of the second ACM conference on Wireless network security
      March 2009
      280 pages
      ISBN:9781605584607
      DOI:10.1145/1514274

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 March 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate98of338submissions,29%

      Upcoming Conference

      WiSec '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader