skip to main content
10.1145/3117811.3117814acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

NICScatter: Backscatter as a Covert Channel in Mobile Devices

Published: 04 October 2017 Publication History

Abstract

Today's mobile devices contain sensitive data, which raises concerns about data security. This paper discusses a covert channel threat on existing mobile systems. Through it, malware can wirelessly leak information without making network connections or emitting signals, such as sound, EMR, vibration, etc., that we can feel or are aware of. The covert channel is built on a communication method that we call NICScatter. NICScatter transmitter malware forces mobile devices, such as mobile phones, tablets or laptops, to reflect surrounding RF signals to covertly convey information. The operation is achieved by controlling the impedance of a device's wireless network interface card (NIC). Importantly, the operation requires no special privileges on current mobile OSs, which allows the malware to stealthily pass sensitive data to an attacker's nearby mobile device, which can then decode the signal and thus effectively gather the guarded data. Our experiments with different mobile devices show that the covert channel can achieve 1.6 bps and transmit as far as 2 meters. In a through-the-wall scenario, it can transmit up to 70 cm.

References

[1]
Android permissions. https://developer.android.com/reference/android/Manifest.permission.html.
[2]
D-link 2dbi antenna. https://www.amazon.com/D-Link-2dbi-Antenna-Wireless-Router/dp/B002XENHB0.
[3]
gnome-bluetooth source code. http://sources.debian.net/src/gnome-bluetooth/.
[4]
rfkill. https://www.kernel.org/doc/Documentation/rfkill.txt.
[5]
R&S® ZVB vector network analyzers. https://www.rohde-schwarz.com/us/product/zvb-productstartpage_63493--7990.html.
[6]
Ubuntu mobile. https://www.ubuntu.com/mobile.
[7]
Usrp n210. https://www.ettus.com/product/details/UN210-KIT.
[8]
Vert 2450 3dbi antenna. https://www.ettus.com/product/details/VERT2450.
[9]
Xcvr2450. https://kb.ettus.com/XCVR2450.
[10]
F. Adib, Z. Kabelac, D. Katabi, and R. C. Miller. 3d tracking via body radio reflections. In Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, pages 317--329. USENIX Association, 2014.
[11]
F. Adib and D. Katabi. See through walls with wifi! SIGCOMM Comput. Commun. Rev., 43(4):75--86, Aug. 2013.
[12]
S. Cabuk, C. E. Brodley, and C. Shields. Ip covert timing channels: design and detection. In Proceedings of the 11th ACM conference on Computer and communications security, pages 178--187. ACM, 2004.
[13]
B. Carrara and C. Adams. On acoustic covert channels between air-gapped systems. In International Symposium on Foundations and Practice of Security, pages 3--16. Springer, 2014.
[14]
L. Deshotels. Inaudible sound as a covert channel in mobile devices. In WOOT, 2014.
[15]
W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2):5, 2014.
[16]
V. D. Gligor. A guide to understanding covert channel analysis of trusted systems. The Center, 1994.
[17]
M. Guri, A. Kachlon, O. Hasson, G. Kedma, Y. Mirsky, and Y. Elovici. Gsmem: Data exfiltration from air-gapped computers over gsm frequencies. In USENIX Security, pages 849--864, 2015.
[18]
M. Guri, G. Kedma, A. Kachlon, and Y. Elovici. Airhopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. In MALWARE, pages 58--67. IEEE, 2014.
[19]
M. Guri, M. Monitz, Y. Mirski, and Y. Elovici. Bitwhisper: Covert signaling channel between air-gapped computers using thermal manipulations. In Computer Security Foundations Symposium, pages 276--289. IEEE, 2015.
[20]
D. Halperin, W. Hu, A. Sheth, and D. Wetherall. Predictable 802.11 packet delivery from wireless channel measurements. In ACM SIGCOMM Computer Communication Review, volume 40, pages 159--170. ACM, 2010.
[21]
M. Hanspach and M. Goetz. On covert acoustical mesh networks in air. Journal of Communications, 8(11), 2013.
[22]
M. Hanspach and M. Goetz. Recent developments in covert acoustical communications. In Sicherheit, pages 243--254. Citeseer, 2014.
[23]
Y. Hayashi, N. Homma, M. Miura, T. Aoki, and H. Sone. A threat for tablet pcs in public space: Remote visualization of screen images using em emanation. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 954--965. ACM, 2014.
[24]
P. Hu, P. Zhang, and D. Ganesan. Laissez-faire: Fully asymmetric backscatter communication. acm special interest group on data communication, 45(4):255--267, 2015.
[25]
V. Iyer, V. Talla, B. Kellogg, S. Gollakota, and J. Smith. Inter-technology backscatter: Towards internet connectivity for implanted devices. In SIGCOMM, pages 356--369. ACM, 2016.
[26]
B. Kellogg, A. Parks, S. Gollakota, J. R. Smith, and D. Wetherall. Wi-fi backscatter: Internet connectivity for rf-powered devices. ACM SIGCOMM Computer Communication Review, 44(4):607--618, 2015.
[27]
B. Kellogg, V. Talla, S. Gollakota, and J. R. Smith. Passive wi-fi: Bringing low power to wi-fi transmissions. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pages 151--164. USENIX Association, 2016.
[28]
M. G. Kuhn and R. J. Anderson. Soft tempest: Hidden data transmission using electromagnetic emanations. In International Workshop on Information Hiding, pages 124--142. Springer, 1998.
[29]
B. W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613--615, 1973.
[30]
B. Li, S. Zhang, and S. Shen. Csi-based wifi-inertial state estimation.
[31]
V. Liu, A. Parks, V. Talla, S. Gollakota, D. Wetherall, and J. R. Smith. Ambient backscatter: wireless communication out of thin air. In SIGCOMM, pages 39--50. ACM, 2013.
[32]
R. J. Masti, D. Rai, A. Ranganathan, C. Müller, L. Thiele, and S. Capkun. Thermal covert channels on multi-core platforms. In USENIX Security, pages 865--880, 2015.
[33]
N. Matyunin, J. Szefer, S. Biedermann, and S. Katzenbeisser. Covert channels using mobile device's magnetic field sensors. In Asia and South Pacific Design Automation Conference, pages 525--532. IEEE, 2016.
[34]
P. V. Nikitin and K. V. S. Rao. Antennas and propagation in uhf rfid systems. In 2008 IEEE International Conference on RFID, pages 277--288, April 2008.
[35]
E. Novak, Y. Tang, Z. Hao, Q. Li, and Y. Zhang. Physical media covert channels on smart mobile devices. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pages 367--378. ACM, 2015.
[36]
R. Schlegel, K. Zhang, X.-y. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: a stealthy and context-aware sound trojan for smartphones. In NDSS, volume 11, pages 17--33, 2011.
[37]
W. Van Eck. Electromagnetic radiation from video display units: An eavesdropping risk? Computers & Security, 4(4):269--286, 1985.
[38]
J. Wang and D. Katabi. Dude, where's my card?: Rfid positioning that works with multipath and non-line of sight. acm special interest group on data communication, 43(4):51--62, 2013.
[39]
R. Want. An introduction to rfid technology. IEEE pervasive computing, 5(1):25--33, 2006.
[40]
P. Zhang, M. Rostami, P. Hu, and D. Ganesan. Enabling practical backscatter communication for on-body sensors. pages 370--383, 2016.
[41]
M. Zhao, F. Adib, and D. Katabi. Emotion recognition using wireless signals. In Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, pages 95--108. ACM, 2016.

Cited By

View all

Index Terms

  1. NICScatter: Backscatter as a Covert Channel in Mobile Devices

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiCom '17: Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking
      October 2017
      628 pages
      ISBN:9781450349161
      DOI:10.1145/3117811
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 October 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. backscatter
      2. commercial devices
      3. covert channel
      4. wireless

      Qualifiers

      • Research-article

      Funding Sources

      • Huawei-HKUST Joint Laboratory
      • 973 Project
      • RGC
      • ShanghaiTech University

      Conference

      MobiCom '17
      Sponsor:

      Acceptance Rates

      MobiCom '17 Paper Acceptance Rate 35 of 186 submissions, 19%;
      Overall Acceptance Rate 440 of 2,972 submissions, 15%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)57
      • Downloads (Last 6 weeks)8
      Reflects downloads up to 15 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      EPUB

      View this article in ePub.

      ePub

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media