Device-to-Identity linking attack using targeted I T A N Wi-Fi - - PowerPoint PPT Presentation

device to identity linking attack using targeted
SMART_READER_LITE
LIVE PREVIEW

Device-to-Identity linking attack using targeted I T A N Wi-Fi - - PowerPoint PPT Presentation

RECHERCHE N O Y L E D S E E U Q I L P P A S E C N E I C S S E D L A N O Device-to-Identity linking attack using targeted I T A N Wi-Fi geolocation spoofing T U T I T S N I C elestin Matte -


slide-1
SLIDE 1

RECHERCHE

I N S T I T U T N A T I O N A L D E S S C I E N C E S A P P L I Q U ´ E E S D E L Y O N

Device-to-Identity linking attack using targeted Wi-Fi geolocation spoofing

C´ elestin Matte - Jagdish Achara - Mathieu Cunche ACM WiSec 2015

slide-2
SLIDE 2

2 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Outline of the talk

1 Introduction 2 Background 3 Description of the attack 4 Tests and results 5 Conclusion

slide-3
SLIDE 3

3 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Introduction

◮ Mobile devices are trackable because they emit probe

requests [2]

◮ But only through an “anonymous” identifier: the MAC

address

◮ Is it really anonymous? ◮ Problem: given a mobile device identified by a Wi-Fi MAC

address, find the identity of the owner of this device.

◮ Solution: attack on Wi-Fi-based Positioning Systems (WPS) ◮ Outcome: get personal information: identity of the device’s

  • wner → account on geotagged services (example with

Twitter)

slide-4
SLIDE 4

4 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Background

◮ Wi-Fi service discovery ◮ Wi-Fi based geolocation ◮ Spoofing geolocation

slide-5
SLIDE 5

5 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Background - Wi-Fi service discovery

◮ How do devices know which Wi-Fi access points (APs) are

present?

◮ Two methods: ◮ passive discovery: APs broadcast beacons ◮ active discovery: devices send probe requests (with or

without SSIDs), APs respond with probe responses

slide-6
SLIDE 6

6 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Background - Wi-Fi based geolocation

◮ One geolocation method uses visible access points to locate

devices

◮ Mainly used when GPS is not available or not available yet

(i.e., inside building), or to save battery

Figure: Geolocation via trilateration based on visible Wi-Fi access points.

slide-7
SLIDE 7

7 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Background - spoofing geolocation

Based on a previous work [3]

slide-8
SLIDE 8

8 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Description of the attack

◮ Targeted spoofing ◮ Description ◮ Testing WPS ◮ Implementation

slide-9
SLIDE 9

9 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Targeted spoofing

◮ Problem: original attack supposes that there is only one

device in range. What if we want to target only one device among other ones?

◮ Passive discovery: ◮ Beacons are broadcast (destination address =

ff:ff:ff:ff:ff:ff)

◮ Can it simply work without broadcast? (targeted

destination address)

◮ Active discovery: ◮ simply reply to broadcast probe requests from only one

device

slide-10
SLIDE 10

10 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Targeted spoofing

◮ Problem: original attack supposes that there is only one

device in range. What if we want to target only one device among other ones?

◮ Passive discovery: ◮ Beacons are broadcast (destination address =

ff:ff:ff:ff:ff:ff)

◮ Can it simply work without broadcast? (targeted

destination address)

◮ Yes. ◮ Active discovery: ◮ simply reply to broadcast probe requests from only one

device

slide-11
SLIDE 11

11 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Attacker model

◮ Two kind attackers: ◮ simple: physically close to the target, can only access

public information

◮ powerful: also close to the target, but can access private

information (no need to be “friend” with the target)

slide-12
SLIDE 12

12 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Description of the attack

attacker 1 2 3 4 5 6 7 8 victim 9 10

WPS

Figure: Description of the attack (dotted lines: optional)

slide-13
SLIDE 13

13 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Tests and results

◮ Testing geolocation spoofing on WPS ◮ Implementation ◮ Results - Example ◮ Results - discussion ◮ Testing the attack on different Android apps

slide-14
SLIDE 14

14 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Testing geolocation spoofing on WPS

◮ Can we avoid jamming? How do WPS react if we send AP

from different locations?

◮ Evaluation on multiple WPS: GoogleGeoloc, Navizon,

Skyhook

◮ Navizon takes history into account

0.0 0.5 1.0 1.5 2.0 2.5 20 40 60 80 100 Fake AP ratio R Fraction of successful attacks locations (%) 0.0 0.5 1.0 1.5 2.0 20 40 60 80 100 Fake AP ratio R Fraction of successful attacks locations (%)

Figure: Fraction of successful attacks: number of AP from original location over number of AP from destination location (left: Google geolocation API; right: Skyhook)

slide-15
SLIDE 15

15 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Implementation

◮ Some bash + perl + php scripts ◮ Does everything automatically ◮ Available on github [1]

slide-16
SLIDE 16

16 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Results - example

Figure: The Twitter application, before and during the attack.

slide-17
SLIDE 17

17 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Results - discussion

◮ Tested on Android and iOS ◮ Never worked on iOS ◮ No need to jam legitimate APs ◮ ...But: does not always work, mainly depending on the

number of real access points, and the distance of the fake location

slide-18
SLIDE 18

18 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Testing the attack on different Android apps

Figure: Result of the Wi-Fi geolocation spoofing on selected Android applications

slide-19
SLIDE 19

19 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Conclusion

◮ Attack on Wi-Fi-based positioning systems ◮ Contributions: jamming not necessary, targeted attack →

allow full attack

◮ Generate a fake Wi-Fi environment ◮ Get user information: account name on applications

publishing location

◮ Evaluated the attack on various WPS and Android apps

slide-20
SLIDE 20

20 / 20

Matte C´ elestin - APVP 2014 - 2014.12.05

Bibliography

Public repository of the test script. https://github.com/Perdu/geoloc_attack, consulted on 2014.04.07.

  • M. Cunche, M. A. Kaafar, and R. Boreli.

I know who you will meet this evening! linking wireless devices using wi-fi probe requests. In World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a, pages 1–9. IEEE, 2012.

  • N. O. Tippenhauer, K. B. Rasmussen, C. P¨
  • pper, and
  • S. ˇ

Capkun. Attacks on public wlan-based positioning systems. In Proceedings of the 7th international conference on Mobile systems, applications, and services, pages 29–40. ACM, 2009.