PlaceRaider: Virtual Theft in Physical Spaces with Smartphones

by   Robert Templeman, et al.

As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites. A new strain of sensor malware has been developing that leverages these sensors to steal information from the physical environment (e.g., researchers have recently demonstrated how malware can listen for spoken credit card numbers through the microphone, or feel keystroke vibrations using the accelerometer). Yet the possibilities of what malware can see through a camera have been understudied. This paper introduces a novel visual malware called PlaceRaider, which allows remote attackers to engage in remote reconnaissance and what we call virtual theft. Through completely opportunistic use of the camera on the phone and other sensors, PlaceRaider constructs rich, three dimensional models of indoor environments. Remote burglars can thus download the physical space, study the environment carefully, and steal virtual objects from the environment (such as financial documents, information on computer monitors, and personally identifiable information). Through two human subject studies we demonstrate the effectiveness of using mobile devices as powerful surveillance and virtual theft platforms, and we suggest several possible defenses against visual malware.



page 3

page 7

page 9


Smartphone camera based pointer

Large screen displays are omnipresent today as a part of infrastructure ...

Android Malware Detection Using Autoencoder

Smartphones have become an intrinsic part of human's life. The smartphon...

A Non-Intrusive Machine Learning Solution for Malware Detection and Data Theft Classification in Smartphones

Smartphones contain information that is more sensitive and personal than...

A Novel Indoor Mobile Localization System Based on Optical Camera Communication

Localizing smartphones in indoor environments offers excellent opportuni...

An Analysis of Malware Trends in Enterprise Networks

We present an empirical and large-scale analysis of malware samples capt...

SoK: Cryptojacking Malware

Emerging blockchain and cryptocurrency-based technologies are redefining...

Fighting Voice Spam with a Virtual Assistant Prototype

Mass robocalls affect millions of people on a daily basis. Unfortunately...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.