Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are increasingly network accessible, frequently within close proximity of their users, and almost always lack mechanisms designed to prevent unauthorized microphone or camera access. In order to explore surveillance intrusion and detection methods, we present a modernized version of a microphone hijacker for Windows and Mac OS X. This attack can be executed as soon as the target connects to the Internet from anywhere in the world without requiring interaction from victimized users. As the attacker compromises additional machines they are organized into a botnet so the attacker can maintain stealthy control of the systems and launch later surveillance attacks. We then present a mechanism to detect the threat on Windows, as well as a novel method to deceive an attacker in order to permit traceback. As a result of the detection mechanism we address a missing segment of resource control, decreasing the complexity of privacy concerns as exploitable devices become more pervasive. © IFIP International Federation for Information Processing 2009.
CITATION STYLE
Farley, R., & Wang, X. (2009). Roving bugnet: Distributed surveillance threat and mitigation. In IFIP Advances in Information and Communication Technology (Vol. 297, pp. 39–50). Springer New York LLC. https://doi.org/10.1007/978-3-642-01244-0_4
Mendeley helps you to discover research relevant for your work.