et tu alexa
play

Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial - PowerPoint PPT Presentation

Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors Yanzi Zhu * , Zhujun Xiao , Yuxin Chen, Zhijing Li * , Max Liu, Ben Y. Zhao, Heather Zheng University of Chicago, *UC Santa Barbara 1 Smart Devices are Everywhere


  1. Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors Yanzi Zhu * , Zhujun Xiao , Yuxin Chen, Zhijing Li * , Max Liu, Ben Y. Zhao, Heather Zheng University of Chicago, *UC Santa Barbara 1

  2. Smart Devices are Everywhere Smart Home Smart Factory Smart Office 2

  3. Attacks Enabled by Smart Devices Server room Router This paper A new form of attack via Internet 2.Hack the passive WiFi signal analysis network WiFi sniffer 3. network traffic 1.Hack the Meeting Private analysis device room office 3

  4. Silent Reconnaissance Attack Server room WiFi sniffer Meeting Private room office Continuous motion tracking: 13:35:00 move in server room 13:45:00 leave server room 13:55:20 leave private office 13:45:20 move in private office 4

  5. Silent Reconnaissance Attack Server room WiFi sniffer Meeting Private room office Reconnaissance attack via listening to (w/o decoding) WiFi signals 5

  6. Leveraging Two Facts (1) Smart devices are filling our (2) Smart devices transmit WiFi data home/office/factory; each room has regularly. multiple devices. Packets sent per second Device Active Idle 108 ≥ 0.5 16 2 200 6.64 TV ≥ 3.33 ≥ 2.44 257 28.6 6

  7. Human Motion is “Embedded” in Ambient WiFi Signals Server Ambient WiFi signals fluctuate room when humans move. Sniffer captures such fluctuation. Threat model: 1. Non-intrusive Meeting Private room office 2. Undetectable 7

  8. Outline Introduction Silent Reconnaissance Attack Attack Implementation & Real-world Evaluation Defense 8

  9. How is Human Motion Embedded in WiFi Signals Anchor WiFi (motion sensor) Device A Sniffer motion sniffer’s received signal of A time Large signal variation indicates human motion. 9

  10. Measure Signal Variation via CSI Our solution: leverage Channel State Information (CSI) - CSI = signal strength at different sub-frequencies σ aCSI signal 1. Compute std for amplitude each sub-frequency time … 2. Average std across sub-frequencies frequency Time Our final metric 10

  11. 𝜏 !"#$ Captures Human Motion 𝜏 !"#$ can separate with and 𝜏 !"#$ can tell human is moving without human motion. towards or away from anchor. with motion with motion moving towards moving away σ aCSI σ aCSI Time Time without motion without motion 11

  12. Our Attack: End-to-end View 1 Phase 1: bootstrapping Identify and locate static WiFi devices to their individual rooms Static Sniffer Attacker 2 Phase 2: continuous monitoring Human motion sensing by a static sniffer 12

  13. Attack Implementation & Real-world Evaluation Implementation - Modified WiFi firmware to passively collect CSI - 1 st to enable passive CSI collection of any commodity WiFi devices* Sniffer: Nexus 5 w/ modified WiFi firmware Experiments WiFi - 11 homes & offices with various floorplans Sniffer Device - 31 WiFi devices & 5 volunteers Measurements - 41 hours of data (~8 hours of human motion) Setup Example *Previous work can not collect CSI continuously on commodity devices. 13

  14. Attack is Effective T(attacker reports room has human inside ) Human detection rate = T(room has human inside ) T(room does not have human inside) False alarm rate = T(attacker reports room has human inside) 99.7% 100 80.6% 80 Percentage % Human detection rate 60 46% 40 False alarm rate 15% 10.7% 20 3.6% 0 State-of-the-art Ours Ours human sensing* (4 anchors) (1 anchor) (4 anchors) * LiFS: Low human-effort, device-free localization with fine-grained subcarrier information. MobiCom’16. 14

  15. Attack is Robust How effective is our attack at low packet rate? - Human detection rate drops only 1.5% when anchor transmits at 2 packets per second (pps), compared to full rate 11pps. How about non-human sources of motion? No Impact Distinguishable Similar to Human Fans Oscillating Fans Pets 15

  16. Defense via Corrupting Attacker’s Received Signal Observation: the effectiveness of this attack depends on quantity and quality of signals. Reducing quantity Reducing quality WiFi rate limiting Signal obfuscation by smart devices MAC randomization Signal obfuscation by AP Geofencing Our defense Ineffective and/or impractical 16

  17. Our Proposal: AP-Based Obfuscation Spatial Obfuscation Temporal Obfuscation AP sends cover traffic on behalf of AP randomly vary power over each smart device (using its MAC time. address). WiFi Device A Sniffer AP 17

  18. Our Proposal: AP-Based Obfuscation Spatial Obfuscation Temporal Obfuscation AP sends cover traffic on behalf of AP randomly vary power over each smart device (using its MAC time. address). 99.7% 47.5% With defense, human detection rate drops significantly. w/ defense w/o defense 18

  19. Conclusion Undetectable silent reconnaissance attack - No hacking needed, only passive WiFi signal analysis Effective in real-world evaluations - 11 homes/offices, 31 WiFi devices Thank you New defenses Any questions? - AP-based obfuscation is effective 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend