11.07.2015 Views

sec14-paper-wang-tielei

sec14-paper-wang-tielei

sec14-paper-wang-tielei

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

files (e.g., images taken from the camera, recordedaudio, or music files) through the USB cable. Furthermore,there exists a service maintained by lockdowndcalled com.apple.mobile.house_arrest, whichprovides access to iOS app directories throughthe AFC protocol. As a result, a computerhas full USB-based access to the contents of/private/var/mobile/Applications/*.Attacks. Credentials can be accessed via theCookie.binarycookies file within an app’s directoryusing AFC. Both the httpOnly cookie that is protectedfrom JavaScript access and secure cookies that are onlytransferred through HTTPS connections can be recovered.Applying these cookies to the same apps in differentdevices allows attackers to log-in to the servicesof their victims.Real Examples. As a proof of concept, we implementeda tool that can retrieve the cookies of Facebookand Gmail apps from a USB-connected iOS device, andtransfer them to another computer.By using these stolen cookies, we successfully loggedin as the victim via the web services for both Facebookand Gmail. Although we only demonstrated the attacksagainst Facebook and Gmail, we believe that our findingaffects a number of third-party apps that store cookies inthe way similar to the Facebook and Gmail apps.5 MeasurementIn this section, we describe the methodology and datasetswe use to determine a lower bound of the coexistence ofiOS devices, App Store purchases made from WindowsiTunes, and compromised Windows machines in homenetworks, with a goal to quantitatively show that a largenumber of users are likely to connect iOS devices to infectedpersonal computers.5.1 OverviewSet BotSet iTunes Set iOSSet MacTruth❵❵❵❵❵❵❵❵❵❵Identified asCID has Mac CID has no MacCID has a Mac True Positive False PositiveCID has no Mac False Negative True NegativeTable 2: Definition of false positive and false negative.network traffic generated by iOS devices, App Store purchasesfrom Windows iTunes, and compromised Windowsmachines.First, we quantified the population of compromisedWindows machines (i.e., bots) using a labeled C&C domainsdataset (see Section 5.3). Since we only used C&Cdomains from Windows malware families, we are confidentthat all CIDs (Set bot in Figure 5) have Windowsmachines. Next, within Set bot , we further measured howmany CIDs contain network traffic generated from iOSdevices. Since there is an overlap of DNS queries fromMac OS X and queries from iOS, we excluded CIDswith Mac OS X traffic (Set Mac in Figure 5). We useda set of iOS fingerprint domain names to identify a lowerbound of CIDs containing iOS devices (Set iOS in Figure5). Then, we estimated how many iOS devices inSet iOS are likely to be connected to a Windows machine.Since there is no unique DNS query generated when aniOS device is connected to a Windows machine either viaUSB or Wi-Fi, we assumed that if users have purchasedan item from the App Store using Windows iTunes, theywill eventaully connect iOS devices to a Windows machine.We estimated a lower bound of CIDs with WindowsiTunes (Set iTunes in Figure 5). Finally, the intersectionof Set iOS and Set iTunes is our measurement result(shaded area in Figure 5).We use false positives and false negatives to evaluateour methodology. They are defined in Table 2, usingidentification of Set Mac as an example. If a CID has aMac but we identify it as without a Mac, it is a false negative.On the other hand, if a CID does not have a Macbut we identify it as with a Mac, it is a false positive. Thedefinition of false positive and false negative are similarto identifying Set iOS and Set iTunes . Since we want to beconservative about the size of Set iTunes ∩ Set iOS , we acceptfalse positives for Set Mac , false negatives for Set iOSand false negatives for Set iTunes . However, we want tohave small or zero false negatives for Set Mac as well asfalse positives for Set iOS and Set iTunes .Figure 5: (Set bot − Set Mac ) ∩ Set iOS ∩ Set iTunes is the estimationof iOS devices that can be connected with bots.Due to NAT, there are usually multiple machines (suchas Windows machines, mobile phones, and Mac machines)behind a single client ID (i.e., an anonymized IPaddress). In our measurement, we used different fingerprintsto determine the client IDs (CIDs) that produce5.2 DatasetsAll datasets are provided by Damballa, Inc [3].DNS Query Dataset. We obtained DNS traffic fromtwo large ISPs in the US, collected in 13 cities for fivedays 4 in October 2013. A-type DNS queries from allclients to the Recursive DNS Servers of the ISPs were4 10/12/2013, 10/24/2013, 10/27/2013, 10/28/2013, 10/30/2013.7USENIX Association 23rd USENIX Security Symposium 85

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!