Experience Report on the Challenges and Opportunities in Securing Smartphones Against Zero-Click Attacks

11/06/2022
by   Narmeen Shafqat, et al.
0

Zero-click attacks require no user interaction and typically exploit zero-day (i.e., unpatched) vulnerabilities in instant chat applications (such as WhatsApp and iMessage) to gain root access to the victim's smartphone and exfiltrate sensitive data. In this paper, we report our experiences in attempting to secure smartphones against zero-click attacks. We approached the problem by first enumerating several properties we believed were necessary to prevent zero-click attacks against smartphones. Then, we created a security design that satisfies all the identified properties, and attempted to build it using off-the-shelf components. Our key idea was to shift the attack surface from the user's smartphone to a sandboxed virtual smartphone ecosystem where each chat application runs in isolation. Our performance and usability evaluations of the system we built highlighted several shortcomings and the fundamental challenges in securing modern smartphones against zero-click attacks. In this experience report, we discuss the lessons we learned, and share insights on the missing components necessary to achieve foolproof security against zero-click attacks for modern mobile devices.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/26/2020

A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks

Nowadays, the usage of smartphones and their applications have become ra...
research
01/07/2022

Apples and Cars: a Comparison of Security

Cybersecurity has gained importance for cars that increasingly rely on s...
research
05/26/2021

POD: A Smartphone That Flies

We present POD, a smartphone that flies, as a new way to achieve hands-f...
research
06/09/2022

Swan: A Neural Engine for Efficient DNN Training on Smartphone SoCs

The need to train DNN models on end-user devices (e.g., smartphones) is ...
research
07/12/2019

Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers

In this paper, we build a speech privacy attack that exploits speech rev...
research
08/10/2020

NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit

Near-Field Communication (NFC) is being used in a variety of security-cr...
research
03/10/2020

This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs

In this paper, we provide the first comprehensive study of user-chosen 4...

Please sign up or login with your details

Forgot password? Click here to reset