IEEE S&P 2020
BIAS: Bluetooth Impersonation AttackS
Daniele Antonioli (EPFL), Nils Tippenhauer (CISPA), Kasper Rasmussen (Oxford Univ.)
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS 1
BIAS: Bluetooth Impersonation AttackS Daniele Antonioli (EPFL), Nils - - PowerPoint PPT Presentation
IEEE S&P 2020 BIAS: Bluetooth Impersonation AttackS Daniele Antonioli (EPFL), Nils Tippenhauer (CISPA), Kasper Rasmussen (Oxford Univ.) Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS 1 Bluetooth standard
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS 1
◮ Specifies Bluetooth Classic (BT) and Bluetooth Low Energy (BLE) ◮ 1 vulnerability in the standard = billions of exploitable devices Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Cover 2
◮ Exploiting standard-compliant vulnerabilities in Bluetooth authentication ◮ To impersonate any Bluetooth device without having to authenticate Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Cover 3
◮ Exploiting standard-compliant vulnerabilities in Bluetooth authentication ◮ To impersonate any Bluetooth device without having to authenticate Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Cover 3
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 5
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 5
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 5
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 6
1 LSC authentication is not used mutually for session establishment 2 A device can switch authentication role
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 7
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 8
Charlie as Alice (slave) C Bob (master) B B, LSC A, Role Switch, LSC Accept Role Switch Charlie is the master (verifier) CC RB = H(CC, B, KL) Skip RB check
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 9
Alice (slave) A Bob (master) B B, SC A, SC CB CA RB, RA = H(CB, CA, B, A, KL) RB, RA = H(CB, CA, B, A, KL) RA RB RB check RA check
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on SC 10
1 SC negotiation is not integrity-protected 2 SC support is not enforced for pairing and session establishment
Alice (slave) A Bob (master) B B, SC A, SC CB CA RB, RA = H(CB, CA, B, A, KL) RB, RA = H(CB, CA, B, A, KL) RA RB RB check RA check
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on SC 11
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on SC 12
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on SC 13
◮ Use SC authentication (mutual) ◮ Not vulnerable to SC downgrade
◮ No, VSC is vulnerable to master and slave reflection attacks ◮ See the paper for the details Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on VSC 14
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Implementation 15
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Evaluation 16
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Evaluation 16
Alice (master) A Bob (slave) B Phase 1: pairing key authentication Phase 2: session key negotation Phase 3: secure session
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17
Alice (master) A Charlie as Bob (slave) B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation Phase 3: secure session
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17
Alice (master) A Charlie as Bob (slave) B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation (KNOB attack [SEC19]) Phase 3: secure session
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17
Alice (master) A Charlie as Bob (slave) B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation (KNOB attack [SEC19]) Phase 3: secure session (Charlie is Bob)
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17
Charlie as Alice (master) A Bob (slave) B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation (KNOB attack [SEC19]) Phase 3: secure session (Charlie is Alice)
Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17
◮ Use LSC authentication mutually during session establishment ◮ Integrity-protect session establishment with the pairing key ◮ Enforce SC support across pairing and session establishment
◮ However, most of the devices are still vulnerable ◮ E.g., no user or device updates, no device recalls Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Conclusion 18
◮ Exploiting standard-compliant vulnerabilities in Bluetooth authentication ◮ To impersonate any Bluetooth device without having to authenticate ◮ Website: https://francozappa.github.io/about-bias/ ◮ Code: https://github.com/francozappa/bias Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Conclusion 19