Abstract
In this paper, we investigate video-based vulnerabilities in 3G Smartphones. Particularly, we design a new video-based spyware, called Stealthy Video Capturer (SVC). SVC can secretly record video information for the third party, greatly compromising Smartphone users' privacy. We implement the spyware and conduct extensive experiments on real world 3G Smartphones. Our experimental results show that the spyware can capture private video information with unremarkable power consumption, CPU and memory occupancy, hence being stealthy to Smartphone users. Moreover, SVC can naturally be resistant to almost all commercial anti-virus tools, like McAfee, Kaspersky and F-Secure mobile version. To the best of our knowledge, our work is the first one to address video-based vulnerabilities in 3G Smartphones. We expect our work will prompt serious attentions on this issue. Copyright 2009 ACM.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09 |
| Pages | 69-78 |
| DOIs | |
| Publication status | Published - 2009 |
| Event | 2nd ACM Conference on Wireless Network Security, WiSec'09 - Zurich, Switzerland Duration: 16 Mar 2009 → 18 Mar 2009 |
Conference
| Conference | 2nd ACM Conference on Wireless Network Security, WiSec'09 |
|---|---|
| Place | Switzerland |
| City | Zurich |
| Period | 16/03/09 → 18/03/09 |
Research Keywords
- 3G Smartphones
- Privacy
- Security
- Spyware