bias bluetooth impersonation attacks
play

BIAS: Bluetooth Impersonation AttackS Daniele Antonioli (EPFL), Nils - PowerPoint PPT Presentation

IEEE S&P 2020 BIAS: Bluetooth Impersonation AttackS Daniele Antonioli (EPFL), Nils Tippenhauer (CISPA), Kasper Rasmussen (Oxford Univ.) Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS 1 Bluetooth standard


  1. IEEE S&P 2020 BIAS: Bluetooth Impersonation AttackS Daniele Antonioli (EPFL), Nils Tippenhauer (CISPA), Kasper Rasmussen (Oxford Univ.) Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS 1

  2. Bluetooth standard • Bluetooth standard ◮ Specifies Bluetooth Classic (BT) and Bluetooth Low Energy (BLE) ◮ 1 vulnerability in the standard = billions of exploitable devices Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Cover 2

  3. Contribution: Bluetooth Impersonation AttackS (BIAS) • Bluetooth Impersonation AttackS (BIAS) ◮ Exploiting standard-compliant vulnerabilities in Bluetooth authentication ◮ To impersonate any Bluetooth device without having to authenticate Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Cover 3

  4. Contribution: Bluetooth Impersonation AttackS (BIAS) • Bluetooth Impersonation AttackS (BIAS) ◮ Exploiting standard-compliant vulnerabilities in Bluetooth authentication ◮ To impersonate any Bluetooth device without having to authenticate Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Cover 3

  5. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  6. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  7. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  8. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  9. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  10. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  11. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  12. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  13. BIAS Attacks on Bluetooth Session Establishment Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 5

  14. BIAS Attacks on Bluetooth Session Establishment Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 5

  15. BIAS Attacks on Bluetooth Session Establishment Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 5

  16. Legacy Secure Connection (LSC) Authentication Alice (slave) Bob (master) A B B, LSC A, LSC C B R A = H(C B , A, K L ) R A check Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 6

  17. Standard-Compliant Vulnerabilities in LSC Authentication 1 LSC authentication is not used mutually for session establishment 2 A device can switch authentication role Alice (slave) Bob (master) A B B, LSC A, LSC C B R A = H(C B , A, K L ) R A check Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 7

  18. BIAS Attack on LSC: Master Impersonation Alice (slave) Charlie as Bob (master) A C B, LSC A, LSC C C R A = H(C C , A, K L ) Skip R A check Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 8

  19. BIAS Attack on LSC: Slave Impersonation Charlie as Alice (slave) Bob (master) C B B, LSC A, Role Switch, LSC Accept Role Switch Charlie is the master (verifier) C C R B = H(C C , B, K L ) Skip R B check Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 9

  20. Secure Connections (SC) Authentication Alice (slave) Bob (master) A B B, SC A, SC C B C A R B , R A = H(C B , C A , R B , R A = H(C B , C A , B, A, K L ) B, A, K L ) R A R B R B check R A check Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on SC 10

  21. Standard-Compliant Issues with SC Authentication 1 SC negotiation is not integrity-protected 2 SC support is not enforced for pairing and session establishment Alice (slave) Bob (master) A B B, SC A, SC C B C A R B , R A = H(C B , C A , R B , R A = H(C B , C A , B, A, K L ) B, A, K L ) R A R B R B check R A check Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on SC 11

  22. BIAS Attack on SC: Master Impersonation Alice (slave) Charlie as Bob (master) A C B, LSC A, SC SC downgraded to LSC BIAS master impersonation on LSC Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on SC 12

  23. BIAS Attack on SC: Slave Impersonation Charlie as Alice (slave) Bob (master) C B B, SC A, LSC SC downgraded to LSC BIAS slave impersonation on LSC Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on SC 13

  24. Very Secure Connections (VSC) ?! • Let’s define Very Secure Connections (fictional security mode) ◮ Use SC authentication (mutual) ◮ Not vulnerable to SC downgrade • Are we safe against impersonation attacks on VSC? ◮ No, VSC is vulnerable to master and slave reflection attacks ◮ See the paper for the details Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on VSC 14

  25. Implementation of the BIAS Attacks https://github.com/francozappa/bias Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Implementation 15

  26. Evaluation: BIAS Attacks on 31 Devices (28 BT Chips) Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Evaluation 16

  27. Evaluation: BIAS Attacks on 31 Devices (28 BT Chips) Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Evaluation 16

  28. BIAS + KNOB: Break Bluetooth Session Establishment Alice (master) Bob (slave) A B Phase 1: pairing key authentication Phase 2: session key negotation Phase 3: secure session Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17

  29. BIAS + KNOB: Break Bluetooth Session Establishment Alice (master) Charlie as Bob (slave) A B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation Phase 3: secure session Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17

  30. BIAS + KNOB: Break Bluetooth Session Establishment Alice (master) Charlie as Bob (slave) A B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation (KNOB attack [SEC19]) Phase 3: secure session Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17

  31. BIAS + KNOB: Break Bluetooth Session Establishment Alice (master) Charlie as Bob (slave) A B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation (KNOB attack [SEC19]) Phase 3: secure session (Charlie is Bob) Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17

  32. BIAS + KNOB: Break Bluetooth Session Establishment Charlie as Alice (master) Bob (slave) A B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation (KNOB attack [SEC19]) Phase 3: secure session (Charlie is Alice) Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17

  33. BIAS Attacks Countermeasures and Disclosure • We propose a set of countermeasures ◮ Use LSC authentication mutually during session establishment ◮ Integrity-protect session establishment with the pairing key ◮ Enforce SC support across pairing and session establishment • We disclosed the BIAS attacks, and the Bluetooth standard has been updated ◮ However, most of the devices are still vulnerable ◮ E.g., no user or device updates, no device recalls Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Conclusion 18

  34. Conclusion: Bluetooth Impersonation AttackS (BIAS) • Bluetooth Impersonation AttackS (BIAS) ◮ Exploiting standard-compliant vulnerabilities in Bluetooth authentication ◮ To impersonate any Bluetooth device without having to authenticate ◮ Website: https://francozappa.github.io/about-bias/ ◮ Code: https://github.com/francozappa/bias Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Conclusion 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend