1 / 9

FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment

FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment. E. Fernandes , B. Crispo , M. Conti IEEE Transactions on Information Forensics and Security 8(6): 1027-1037 (2013). Take Home Message. New attack vector with interesting features ...for attackers

dara-craft
Télécharger la présentation

FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment E. Fernandes, B. Crispo, M. Conti IEEE Transactions on Information Forensics and Security 8(6): 1027-1037 (2013)

  2. Take Home Message • New attack vector with interesting features ...for attackers • Learning and exploiting security weakness of Android security model and its implementation • Inadequateness of existing mobile AV solutions

  3. FM Radio

  4. FM Radio Data System (RDS) Baseband coding 1,187.5 bits per second on a 57 kHz subcarrier

  5. Our FM Radio Attack • New attack vector: FM RDS broadcast channel • Exploiting vulnerability of Android and FM Radio API • Cross-device: Smartphone, Car Radio, USB token • Cost <500$ Antenna RDS Encoder Transmitter Circuit Audio Signal Receiver Antenna RS232 Control

  6. Attack

  7. Actual AVs do not help

  8. Unique Features • Zero-fingerpring Attack • Broadcast • Geographic Attack • Can target a specific physical perimeter

  9. Old Lessons Confirmed • One-fits-All paradygm is very bad for security • But good for interoperabiliy, time-to-market, ROI • Shortcuts to bypass the security model can only create problems • Difficult for a model to accomodate: openess, evolution and adaptation

More Related