honeyM: A Framework For Virtual Mobile Device Honeyclients

ShmooCon VI - 2010

Presented by: David Barnett, Andrew Hay, Michael Santarcangelo, Doug Wilson
Date: Saturday February 06, 2010
Time: 16:00 - 17:00
Location: Back Room
Track: Build It!

<p>This talk will discuss an implementation of a honeyclient framework for mobile devices. In wireless environments, honeypots typically mimic access points or a single protocol of a device. The authors implemented a framework that can simultaneously imitate the WiFi, Bluetooth, and GPS behavior of multiple instances of different devices. This talk focuses on the challenges associated with accurately pretending to be somebody you are not and how honeyclients can contribute to the future of mobile device security.

Links

K. Navas

<p>K. Navas is a Cadet at the U.S. Military Academy</p>

D. Brasefield

<p>D. Brasefield is a Cadet at the U.S. Military Academy</p>

N. Grunzweig

<p>N. Grunzweig is a Cadet at the U.S. Military Academy</p>

T. OConnor

<p>T. OConnor is a Faculty Advisor at the U.S. Military Academy</p><p>The members of the above team are all cadets and faculty at the United States Military Academy, wherein addition to studying wireless and mobile security they enjoy pulling guard duty, seeing who cancount to the highest prime number, and building cow-patty tables of their favorite instructor's SSIDs.They are all one year from graduating the military academy and joining the fighting force.</p>


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats