On the Security of Smartphones with Clumsy Owners

*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************

Event Details
  • Date/Time:
    • Wednesday September 13, 2017 - Thursday September 14, 2017
      12:00 pm - 12:59 pm
  • Location: Klaus Advanced Computing Building, #3126, 266 Ferst Drive, Atlanta, GA
  • Phone:
  • URL:
  • Email:
  • Fee(s):
    N/A
  • Extras:
Contact

info@iisp.gatech.edu

Summaries

Summary Sentence: Assistant Professor Yossi Oren of Ben Gurion University visits Georgia Tech for a guest lecture.

Full Summary: Assistant Professor Yossi Oren of Ben Gurion University visits Georgia Tech for a guest lecture about protecting mobile devices from cyberattack.

We trust our smartphones with many secrets. We also allow them to make many important decisions for us. To protect the confidentiality of these secrets and the integrity of these decisions, the phone’s software imposes very strict limitations on what kinds of data can enter and exit the phone, and what sort of trust and privilege is given to each of the phone’s installed applications.

A smartphone, however, is not just an abstract piece of software, but rather a complicated physical device with many hardware components and sensors. Attacks which target the physical implementation of the phone, instead of its software, have the potential of severely compromising the phone’s confidentiality and integrity.

For example, mobile phones are often dropped, shattering their screens. We show how a replacement touchscreen can install malicious software, steal passwords, and even completely “root” a phone, letting the attacker execute privileged operations. All of these feats are possible even if no software is installed on the phone other than its factory default firmware. We show how a phone’s protective case can snoop after a user’s interaction with the touchscreen, even if it is not connected to the phone in any way. We also show how a protective case can use the phone’s transmitter to exfiltrate data.

Protecting the phone from these attacks is an interesting challenge, and the talk will conclude with some ideas in this direction. We will also show a constructive use for one of our attacks.

Joint work with Benyamin Farshteindiker, Omer Shwartz, Amir Cohen, Tomer Gluck, Gal Shitrit, Nir Hassidim, Asaf Grosz, Rami Puzis and Asaf Shabtai.

Bio

Yossi Oren is a senior lecturer (assistant professor) at the Department of Software and Information Systems Engineering in Ben Gurion University, and a member of BGU's Cyber Security Research Center. Prior to joining BGU, Yossi was a post-doctoral research scientist in the Network Security Lab at Columbia University in New York and a member of the security lab at Samsung Research Israel. He holds a Ph.D. in Electrical Engineering from Tel-Aviv University, and an M.Sc. in Computer Science from the Weizmann Institute of Science.

His research interests include implementation security (power analysis and other hardware attacks and countermeasures; low-resource cryptographic constructions for lightweight computers) and cryptography in the real world (consumer and voter privacy in the digital era; web application security).

Additional Information

In Campus Calendar
Yes
Groups

College of Computing Events, Institute for Information Security and Privacy, School of Computer Science

Invited Audience
Faculty/Staff, Graduate students
Categories
Seminar/Lecture/Colloquium
Keywords
Cybersecurity, mobile devices
Status
  • Created By: Tara La Bouff
  • Workflow Status: Published
  • Created On: Aug 24, 2017 - 9:16am
  • Last Updated: Aug 24, 2017 - 9:52am