BIAS: Bluetooth Impersonation AttackS Daniele Antonioli (EPFL), Nils - - PowerPoint PPT Presentation

bias bluetooth impersonation attacks
SMART_READER_LITE
LIVE PREVIEW

BIAS: Bluetooth Impersonation AttackS Daniele Antonioli (EPFL), Nils - - PowerPoint PPT Presentation

IEEE S&P 2020 BIAS: Bluetooth Impersonation AttackS Daniele Antonioli (EPFL), Nils Tippenhauer (CISPA), Kasper Rasmussen (Oxford Univ.) Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS 1 Bluetooth standard


slide-1
SLIDE 1

IEEE S&P 2020

BIAS: Bluetooth Impersonation AttackS

Daniele Antonioli (EPFL), Nils Tippenhauer (CISPA), Kasper Rasmussen (Oxford Univ.)

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS 1

slide-2
SLIDE 2

Bluetooth standard

  • Bluetooth standard

◮ Specifies Bluetooth Classic (BT) and Bluetooth Low Energy (BLE) ◮ 1 vulnerability in the standard = billions of exploitable devices Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Cover 2

slide-3
SLIDE 3

Contribution: Bluetooth Impersonation AttackS (BIAS)

  • Bluetooth Impersonation AttackS (BIAS)

◮ Exploiting standard-compliant vulnerabilities in Bluetooth authentication ◮ To impersonate any Bluetooth device without having to authenticate Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Cover 3

slide-4
SLIDE 4

Contribution: Bluetooth Impersonation AttackS (BIAS)

  • Bluetooth Impersonation AttackS (BIAS)

◮ Exploiting standard-compliant vulnerabilities in Bluetooth authentication ◮ To impersonate any Bluetooth device without having to authenticate Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Cover 3

slide-5
SLIDE 5

Bluetooth Threat Model

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4

slide-6
SLIDE 6

Bluetooth Threat Model

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4

slide-7
SLIDE 7

Bluetooth Threat Model

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4

slide-8
SLIDE 8

Bluetooth Threat Model

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4

slide-9
SLIDE 9

Bluetooth Threat Model

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4

slide-10
SLIDE 10

Bluetooth Threat Model

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4

slide-11
SLIDE 11

Bluetooth Threat Model

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4

slide-12
SLIDE 12

Bluetooth Threat Model

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 4

slide-13
SLIDE 13

BIAS Attacks on Bluetooth Session Establishment

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 5

slide-14
SLIDE 14

BIAS Attacks on Bluetooth Session Establishment

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 5

slide-15
SLIDE 15

BIAS Attacks on Bluetooth Session Establishment

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS 5

slide-16
SLIDE 16

Legacy Secure Connection (LSC) Authentication

Alice (slave) A Bob (master) B B, LSC A, LSC CB RA = H(CB, A, KL) RA check

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 6

slide-17
SLIDE 17

Standard-Compliant Vulnerabilities in LSC Authentication

1 LSC authentication is not used mutually for session establishment 2 A device can switch authentication role

Alice (slave) A Bob (master) B B, LSC A, LSC CB RA = H(CB, A, KL) RA check

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 7

slide-18
SLIDE 18

BIAS Attack on LSC: Master Impersonation

Alice (slave) A Charlie as Bob (master) C B, LSC A, LSC CC RA = H(CC, A, KL) Skip RA check

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 8

slide-19
SLIDE 19

BIAS Attack on LSC: Slave Impersonation

Charlie as Alice (slave) C Bob (master) B B, LSC A, Role Switch, LSC Accept Role Switch Charlie is the master (verifier) CC RB = H(CC, B, KL) Skip RB check

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 9

slide-20
SLIDE 20

Secure Connections (SC) Authentication

Alice (slave) A Bob (master) B B, SC A, SC CB CA RB, RA = H(CB, CA, B, A, KL) RB, RA = H(CB, CA, B, A, KL) RA RB RB check RA check

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on SC 10

slide-21
SLIDE 21

Standard-Compliant Issues with SC Authentication

1 SC negotiation is not integrity-protected 2 SC support is not enforced for pairing and session establishment

Alice (slave) A Bob (master) B B, SC A, SC CB CA RB, RA = H(CB, CA, B, A, KL) RB, RA = H(CB, CA, B, A, KL) RA RB RB check RA check

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on SC 11

slide-22
SLIDE 22

BIAS Attack on SC: Master Impersonation

Alice (slave) A Charlie as Bob (master) C B, LSC A, SC SC downgraded to LSC BIAS master impersonation on LSC

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on SC 12

slide-23
SLIDE 23

BIAS Attack on SC: Slave Impersonation

Charlie as Alice (slave) C Bob (master) B B, SC A, LSC SC downgraded to LSC BIAS slave impersonation on LSC

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on SC 13

slide-24
SLIDE 24

Very Secure Connections (VSC) ?!

  • Let’s define Very Secure Connections (fictional security mode)

◮ Use SC authentication (mutual) ◮ Not vulnerable to SC downgrade

  • Are we safe against impersonation attacks on VSC?

◮ No, VSC is vulnerable to master and slave reflection attacks ◮ See the paper for the details Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS on VSC 14

slide-25
SLIDE 25

Implementation of the BIAS Attacks

https://github.com/francozappa/bias

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Implementation 15

slide-26
SLIDE 26

Evaluation: BIAS Attacks on 31 Devices (28 BT Chips)

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Evaluation 16

slide-27
SLIDE 27

Evaluation: BIAS Attacks on 31 Devices (28 BT Chips)

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Evaluation 16

slide-28
SLIDE 28

BIAS + KNOB: Break Bluetooth Session Establishment

Alice (master) A Bob (slave) B Phase 1: pairing key authentication Phase 2: session key negotation Phase 3: secure session

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17

slide-29
SLIDE 29

BIAS + KNOB: Break Bluetooth Session Establishment

Alice (master) A Charlie as Bob (slave) B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation Phase 3: secure session

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17

slide-30
SLIDE 30

BIAS + KNOB: Break Bluetooth Session Establishment

Alice (master) A Charlie as Bob (slave) B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation (KNOB attack [SEC19]) Phase 3: secure session

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17

slide-31
SLIDE 31

BIAS + KNOB: Break Bluetooth Session Establishment

Alice (master) A Charlie as Bob (slave) B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation (KNOB attack [SEC19]) Phase 3: secure session (Charlie is Bob)

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17

slide-32
SLIDE 32

BIAS + KNOB: Break Bluetooth Session Establishment

Charlie as Alice (master) A Bob (slave) B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation (KNOB attack [SEC19]) Phase 3: secure session (Charlie is Alice)

Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17

slide-33
SLIDE 33

BIAS Attacks Countermeasures and Disclosure

  • We propose a set of countermeasures

◮ Use LSC authentication mutually during session establishment ◮ Integrity-protect session establishment with the pairing key ◮ Enforce SC support across pairing and session establishment

  • We disclosed the BIAS attacks, and the Bluetooth standard has been updated

◮ However, most of the devices are still vulnerable ◮ E.g., no user or device updates, no device recalls Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Conclusion 18

slide-34
SLIDE 34

Conclusion: Bluetooth Impersonation AttackS (BIAS)

  • Bluetooth Impersonation AttackS (BIAS)

◮ Exploiting standard-compliant vulnerabilities in Bluetooth authentication ◮ To impersonate any Bluetooth device without having to authenticate ◮ Website: https://francozappa.github.io/about-bias/ ◮ Code: https://github.com/francozappa/bias Daniele Antonioli (@francozappa) BIAS: Bluetooth Impersonation AttackS Conclusion 19