Florida Institute for Cybersecurity (FICS) Research
CIS 6930 - Cellular and Mobile Network Security: End-to-End Authentication
Professor Patrick Traynor 11/8/2018
(Thanks to Adam Doupé and Brad Reaves)
CIS 6930 - Cellular and Mobile Network Security: End-to-End - - PowerPoint PPT Presentation
CIS 6930 - Cellular and Mobile Network Security: End-to-End Authentication Professor Patrick Traynor 11/8/2018 (Thanks to Adam Doup and Brad Reaves) Florida Institute for Cybersecurity (FICS) Research Announcements Abstracts for Course
Florida Institute for Cybersecurity (FICS) Research
Professor Patrick Traynor 11/8/2018
(Thanks to Adam Doupé and Brad Reaves)
Florida Institute for Cybersecurity (FICS) Research
presentation for 11/29…
2
Florida Institute for Cybersecurity (FICS) Research
3
Florida Institute for Cybersecurity (FICS) Research
4
1-800-432-1000
Bank of America
1-800-432-1000
Bank of America
Florida Institute for Cybersecurity (FICS) Research
the limits…
5
Florida Institute for Cybersecurity (FICS) Research
far) is that my financial institutions, public services and government can’t call me
and figure out what comes next.
6
Florida Institute for Cybersecurity (FICS) Research
7
IP Networks PSTN Cell Network Gateway Gateway Intermediary Telco Networks Internet VOIP Carrier Web Services VOIP Proxy
Florida Institute for Cybersecurity (FICS) Research
8
Along the way:
IP Networks PSTN Cell Network Gateway Gateway Intermediary Telco Networks Internet VOIP Carrier Web Services VOIP Proxy
The only thing we can guarantee that is transmitted correctly is voice.
Florida Institute for Cybersecurity (FICS) Research
and evade ALL of these systems.
9
Florida Institute for Cybersecurity (FICS) Research
represented in 0s and 1s.
10
Florida Institute for Cybersecurity (FICS) Research
going to encode our data.
11
Florida Institute for Cybersecurity (FICS) Research
voice encoding.
Excitation - Long Term Prediction (RPE-LTP).
12 ... ...
20 msec RTP-LTP Encoder 160 Samples 260-bit frame
...
20 msec RTP-LTP Decoder 160 Samples Sender Receiver
...
Florida Institute for Cybersecurity (FICS) Research
traverses
without infrastructure modifications
13
Florida Institute for Cybersecurity (FICS) Research
− − − − − − − − − − − − − − − −PSTN
Cell Characterize Networks Call Signature (Alice) VoIP Path Traversal Signature Identify Networks
ML Classifier
14
− − − −Extract Features
Florida Institute for Cybersecurity (FICS) Research
2 2.2 2.4 2.6 2.8 3 3.2 3.4 3.6 3.8 4 10
−1010
−510 10
5STE 2 2.2 2.4 2.6 2.8 3 3.2 3.4 3.6 3.8 4 10
−1010
−510 10
5STE Time (s) 30 ms iLBC Speex 20 ms
2 2.2 2.4 2.6 2.8 3 3.2 3.4 3.6 3.8 4 −1 −0.5 0.5 1 Amplitude Packet Loss 2 2.2 2.4 2.6 2.8 3 3.2 3.4 3.6 3.8 4 10
−1010
−510 10
5Time (s) STE Packet Loss
15
Florida Institute for Cybersecurity (FICS) Research
Identifying and Characterizing PSTN and Cellular Networks
during speech activity (multiplicative noise)
quality audio
5 10 15 20 9 10 11 12 16 18 20 22 24 26 28 30 Spectral Clarity Noise Spectral Deviation Noise Spectral Range G.711 Speex iLBC G.729 GSM
16
Florida Institute for Cybersecurity (FICS) Research
characterize VoIP network
characterize PSTN and cellular networks
networks as quality degrades with networks traversed
each call sample
Extract Features PL/PLC Features Noise Features Quality Features STE/ Correlation Noise Statistics P .563 Score
Feature Vector
17
Florida Institute for Cybersecurity (FICS) Research
York mobile phone (~origin) or France landline (~distance)
Atlanta PSTN Origin Cellular Origin MagicJack Origin Skype Origin Vonage Origin MyNetPhone Origin
Accuracy = 90%
ATL-Cell DAL-LL NYC-Cell ATL-Skype ATL-LL PUN-MJack ATL-GT1 ATL-Von ATL-Skype ATL-GT2 DUB-Von BAL-MJack MEL-NFone FRA-LL LON-Cell SJC-Cell (a) ATL-Cell DAL-LL NYC-Cell ATL-Skype ATL-LL PUN-MJack ATL-GT1 ATL-Von ATL-Skype ATL-GT2 DUB-Von BAL-MJack MEL-NFone FRA-LL LON-Cell SJC-Cell
Accuracy = 97.5%
ATL-Cell DAL-LL NYC-Cell ATL-Skype ATL-LL PUN-MJack ATL-GT1 ATL-Von ATL-Skype ATL-GT2 DUB-Von BAL-MJack MEL-NFone FRA-LL LON-Cell SJC-Cell (b) ATL-Cell DAL-LL NYC-Cell ATL-Skype ATL-LL PUN-MJack ATL-GT1 ATL-Von ATL-Skype ATL-GT2 DUB-Von BAL-MJack MEL-NFone FRA-LL LON-Cell SJC-Cell
18
Florida Institute for Cybersecurity (FICS) Research
algorithms have become very popular in the literature.
in what they can achieve.
19
Florida Institute for Cybersecurity (FICS) Research
authentication to all phone calls
20
Florida Institute for Cybersecurity (FICS) Research
signature using the Caller ID Certificate
request
21
Florida Institute for Cybersecurity (FICS) Research
callers.
22 Parameter Type Length (octets) UTC Timestamp Optional Part 4-? Signature Algorithm Optional Part 1-? Signature Optional Part 16-? Caller Identity Certificate Optional Part 32-?
Florida Institute for Cybersecurity (FICS) Research
existing phone network through the voice channel
, but they only authenticate VoIP calls
23
Florida Institute for Cybersecurity (FICS) Research
24
Florida Institute for Cybersecurity (FICS) Research
completely unreliable
25
a) 1-second chirp sweep from 300 - 3300 Hz before AMR-NB encoding b) 1-second chirp sweep from 300 - 3300 Hz after AMR-NB encoding
Florida Institute for Cybersecurity (FICS) Research
3000 Hz).
codec effects.
26
Header Footer 17 data bits
Punchline: approximately 500 bps goodput in the best case
Florida Institute for Cybersecurity (FICS) Research
27
IDLE (START) SEND ERROR FRAME SEND STANDARD FRAME RECEIVE STANDARD FRAME RECEIVE OTHER FRAME AWAIT ACK SEND ACK SEND REPEAT FRAMES SEND ERROR MESSAGE NACKs>0 Timeout / Error NACKs==0 AWAIT REPEAT BLOCKS SEND ERROR FRAME ANY STATE RECIEVE ERROR FRAME Timeout Receive Repeat Blocks NACKs >0 NACKs==0
Florida Institute for Cybersecurity (FICS) Research
28
Site Name Total Bits Transmission Time at 500 bps Facebook 41,544 83.088 s Google 42,856 85.712 s Bank of America 53,144 106.288 s Yahoo 57,920 115.840 s Average 48,688 97.232 s
Florida Institute for Cybersecurity (FICS) Research
29
Mobile (Verifier) Call Center (Prover) (1) V, NV (2) P, NP, CP,D(KP
(3) E(KP +,S), H(k,'VRFY', #1, #2) (4) H(k,'PROV', #1, #2) (0) Initiate Call C: Certificate D: Digital Signature H: HMAC K+,-: Public/Private Key k: Symmetric Key N: Nonce P: Prover S: Pre-Master Secret V: Verifier ... (n-1) V, NV+1 (n) P, NP+1
Florida Institute for Cybersecurity (FICS) Research
moments of a call.
30
Codec Cached Certificate Certificate Exchanged G.711 4.463 s 8.279 s AMR-NB 5.608 s 10.374 s Speex 4.427 s 8.279 s Average 4.844 s 8.977 s
Florida Institute for Cybersecurity (FICS) Research
Numbering Plan (NANPA).
allocated blocks of numbers, so assignments are based on authority.
in ~100 KiB.
certificate chains!
31
bankof america.com Symantec Verisign Root (800) 432-1000 Bank of America AT&T (NPA/NXX Administrator) NANPA Root AddTrust Root Entrust Root xyz.bankof america.com Current Internet PKI Proposed TPKI Stored at Endpoint. . .
Stored at EndpointFlorida Institute for Cybersecurity (FICS) Research
attacker.
solve the problem.
32
Florida Institute for Cybersecurity (FICS) Research
33
Cellular: 2G, 3G, 4G data VoIP: Inherent data Landline: Ubiquitous WiFi
Florida Institute for Cybersecurity (FICS) Research
content end-to-end for regular phone calls through an auxiliary data channel
experience similar to what users already do
34
Florida Institute for Cybersecurity (FICS) Research
authenticate users
actually owns the phone number
CA model
35
Client (C) CA Server (SCA)
Data Channel Audio Channel
(1)
ID(C), PhNum(C), ID(SCA), K+
C
NNet, ID(C), PhNum(C), ID(SCA), PhNum(SCA), TS
(2)
NAudio
(3)
NAudio, NNet, ID(C), PhNum(C)ID(SCA), TS, Signk−
C
(4)
Cert(ID(C), PhNum(C), K+
C , SignK−
SCA)
(5)
Florida Institute for Cybersecurity (FICS) Research
36
Handshake complete Both sides authenticated Information to establish a key end-to-end securely in presence of adversary Normal Voice Call Can Proceed
Server (S) Caller (R) Callee (E)
(1)
Call PhNum(E) E ∈ AuthentiCall Users Incoming call from R
(2) (3)
ID(E), PhNum(E), ID(R), PhNum(R) Cert(E), TS2, NE, DHE, SignK−
E(4a) (4b)
ID(R), PhNum(R), ID(E), PhNum(E) Cert(R), TS1, NR, DHR, SignK−
RHMACKER1 (msg4a, msg4b, “Caller”) HMACKER2 (msg4a, msg4b, “Callee”)
(5a) (5b) TLS to Server Voice Call Message via Server TLS
Florida Institute for Cybersecurity (FICS) Research
authenticate a phone call”
set up with high variance
negligible 1-1.4 additional seconds for call establishment
37
Florida Institute for Cybersecurity (FICS) Research 38
But what about this one?
Telephony Core Telephony Core HI CC#? Content Injection
The Handshake deals with this attack:
Telephony Core Caller ID Spoofing Bank
FBI Telephony Core Call Race Condition Bank AuthentiCall
Or this one?
FBI
Florida Institute for Cybersecurity (FICS) Research
content integrity
39
Florida Institute for Cybersecurity (FICS) Research
10110101 SHA256 SHA256 “Mr. Watson: come here.”
Phone Network
“Mr. Watson: come here.” 11011110
Phone Network
is legitimately modified in transit
here!
audio semantics while ignoring legitimate modifications
can change in unknown ways is hard
40
11010110 Digest Digest
Florida Institute for Cybersecurity (FICS) Research
41
1 Second of Audio
r0,0 r0,1 r1,0 r0,10 … r200,0 . . … r200,10
DCT DCT
>
8 8 8 Digest Bits Index l1 Index l2 Audio Features (once per second) Compression Function (64 times per second)
.
Index l1 + w Index l2 + w
Matrix L
B1 B2
RSH compresses 1 second of audio into 512 bits Audio differences can be measured with bit error
Signal Processing Letters, vol. 16, no. 9, pp. 818–821, Sep. 2009.
Florida Institute for Cybersecurity (FICS) Research
literature
42
Florida Institute for Cybersecurity (FICS) Research
43
Legitimate changes to audio result in small changes to digests while substituting content results in large changes Making adversaries easy to detect
Difference in digests between different sentences of audio Average case: 48% error Change in digests before and after network transmission Average case: 10-20% of bits
Florida Institute for Cybersecurity (FICS) Research
detection (false positives: 0.58%, or 1 every 3 minutes)
single FP roughly every 6 years) This ensures both users are on the correct call (channel binding) and that call audio is unmodified
44
Florida Institute for Cybersecurity (FICS) Research
before answering — mitigating fraud and unwanted robocalls while increasing trust in the phone system
modification
experience!
45
(b) (a)
Florida Institute for Cybersecurity (FICS) Research
mobile devices.
each day you receive scam calls.
46