device to identity linking attack using targeted
play

Device-to-Identity linking attack using targeted I T A N Wi-Fi - PowerPoint PPT Presentation

RECHERCHE N O Y L E D S E E U Q I L P P A S E C N E I C S S E D L A N O Device-to-Identity linking attack using targeted I T A N Wi-Fi geolocation spoofing T U T I T S N I C elestin Matte -


  1. RECHERCHE N O Y L E D S E ´ E U Q I L P P A S E C N E I C S S E D L A N O Device-to-Identity linking attack using targeted I T A N Wi-Fi geolocation spoofing T U T I T S N I C´ elestin Matte - Jagdish Achara - Mathieu Cunche ACM WiSec 2015

  2. Outline of the talk 1 Introduction 2 Background 3 Description of the attack 4 Tests and results 5 Conclusion 2 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  3. Introduction ◮ Mobile devices are trackable because they emit probe requests [2] ◮ But only through an “anonymous” identifier: the MAC address ◮ Is it really anonymous? ◮ Problem: given a mobile device identified by a Wi-Fi MAC address, find the identity of the owner of this device. ◮ Solution: attack on Wi-Fi-based Positioning Systems (WPS) ◮ Outcome: get personal information: identity of the device’s owner → account on geotagged services (example with Twitter) 3 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  4. Background ◮ Wi-Fi service discovery ◮ Wi-Fi based geolocation ◮ Spoofing geolocation 4 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  5. Background - Wi-Fi service discovery ◮ How do devices know which Wi-Fi access points (APs) are present? ◮ Two methods: ◮ passive discovery: APs broadcast beacons ◮ active discovery: devices send probe requests (with or without SSIDs), APs respond with probe responses 5 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  6. Background - Wi-Fi based geolocation ◮ One geolocation method uses visible access points to locate devices ◮ Mainly used when GPS is not available or not available yet (i.e., inside building), or to save battery Figure: Geolocation via trilateration based on visible Wi-Fi access points. 6 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  7. Background - spoofing geolocation Based on a previous work [3] 7 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  8. Description of the attack ◮ Targeted spoofing ◮ Description ◮ Testing WPS ◮ Implementation 8 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  9. Targeted spoofing ◮ Problem: original attack supposes that there is only one device in range. What if we want to target only one device among other ones? ◮ Passive discovery: ◮ Beacons are broadcast (destination address = ff:ff:ff:ff:ff:ff) ◮ Can it simply work without broadcast? (targeted destination address) ◮ Active discovery: ◮ simply reply to broadcast probe requests from only one device 9 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  10. Targeted spoofing ◮ Problem: original attack supposes that there is only one device in range. What if we want to target only one device among other ones? ◮ Passive discovery: ◮ Beacons are broadcast (destination address = ff:ff:ff:ff:ff:ff) ◮ Can it simply work without broadcast? (targeted destination address) ◮ Yes. ◮ Active discovery: ◮ simply reply to broadcast probe requests from only one device 10 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  11. Attacker model ◮ Two kind attackers: ◮ simple: physically close to the target, can only access public information ◮ powerful: also close to the target, but can access private information (no need to be “friend” with the target) 11 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  12. Description of the attack 7 WPS 8 3 2 6 4 victim 1 9 5 attacker 10 Figure: Description of the attack (dotted lines: optional) 12 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  13. Tests and results ◮ Testing geolocation spoofing on WPS ◮ Implementation ◮ Results - Example ◮ Results - discussion ◮ Testing the attack on different Android apps 13 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  14. Testing geolocation spoofing on WPS ◮ Can we avoid jamming? How do WPS react if we send AP from different locations? ◮ Evaluation on multiple WPS: GoogleGeoloc, Navizon, Skyhook ◮ Navizon takes history into account Fraction of successful attacks locations (%) Fraction of successful attacks locations (%) 100 100 80 80 60 60 40 40 20 20 0 0 0.0 0.5 1.0 1.5 2.0 2.5 0.0 0.5 1.0 1.5 2.0 Fake AP ratio R Fake AP ratio R Figure: Fraction of successful attacks: number of AP from original location over number of AP from destination location (left: Google geolocation API; right: Skyhook) 14 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  15. Implementation ◮ Some bash + perl + php scripts ◮ Does everything automatically ◮ Available on github [1] 15 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  16. Results - example Figure: The Twitter application, before and during the attack. 16 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  17. Results - discussion ◮ Tested on Android and iOS ◮ Never worked on iOS ◮ No need to jam legitimate APs ◮ ...But: does not always work, mainly depending on the number of real access points, and the distance of the fake location 17 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  18. Testing the attack on different Android apps Figure: Result of the Wi-Fi geolocation spoofing on selected Android applications 18 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  19. Conclusion ◮ Attack on Wi-Fi-based positioning systems ◮ Contributions: jamming not necessary, targeted attack → allow full attack ◮ Generate a fake Wi-Fi environment ◮ Get user information: account name on applications publishing location ◮ Evaluated the attack on various WPS and Android apps 19 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

  20. Bibliography Public repository of the test script. https://github.com/Perdu/geoloc_attack , consulted on 2014.04.07. M. Cunche, M. A. Kaafar, and R. Boreli. I know who you will meet this evening! linking wireless devices using wi-fi probe requests. In World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a , pages 1–9. IEEE, 2012. N. O. Tippenhauer, K. B. Rasmussen, C. P¨ opper, and S. ˇ Capkun. Attacks on public wlan-based positioning systems. In Proceedings of the 7th international conference on Mobile systems, applications, and services , pages 29–40. ACM, 2009. 20 / 20 Matte C´ elestin - APVP 2014 - 2014.12.05

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend