hacking in the blind almost invisible runtime user
play

Hacking in the Blind: (Almost) Invisible Runtime User Interface - PowerPoint PPT Presentation

Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks Luka Malisa , Kari Kostiainen, Thomas Knell, David Sommer, and Srdjan Capkun {firstname.lastname}@inf.ethz.ch knellt@student.ethz.ch User Interfaces Consists of input


  1. Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks Luka Malisa , Kari Kostiainen, Thomas Knell, David Sommer, and Srdjan Capkun {firstname.lastname}@inf.ethz.ch knellt@student.ethz.ch

  2. User Interfaces • Consists of input and output User Interface Input Computer System Output • Used for daily and critical tasks 2

  3. User Interface Attacks UI Attacks are often possible 1. Brief and non-invasive 2. Bypass security features Input Output App … App Computer System 3

  4. Existing Command Injection Attacks 1. New Keyboard 2. New Mouse • Drawbacks - Registers new peripherals - Installs malware - Assume user not present 4

  5. Limitations • Observations 1. Hardened devices 2. Malware installation not possible 3. Damaging attacks possible only when user is present Can we attack without installing malware? 5

  6. Our Attack 1. Click Blocked 1. Click Blocked 2. Inject Events 2. Inject Events 3. Heart rate = 1000 !!! Heart rate = 100 • Benefits + Does not install new peripherals + Does not install malware + Assume user is present 6

  7. Our Attack !!! 7

  8. Attack Demonstration 8

  9. Attack Overview 9

  10. Mouse Location Estimator Mouse Events: Mouse Events: Mouse Events: Up 10px Up 100px Right 150px Left 10px Left 100px Down 150px 10

  11. State Tracking Username: John Doe Password: ****** Login Cancel 11

  12. State Tracking State 0 Login Cancel 1 Click outside 3 Click “Cancel” 2 Click “Login” State 0 State 1 State 2 OK Cancel Button 1 Button 2 12

  13. State Tracking • Maintain all possible options Login Cancel • Strategies to assign probabilities 1. Both buttons are equally likely 2. “Cancel” is more likely (more area) 3. “Login” is more likely (clicked more often) • Introduce expert knowledge through assumptions on probabilities 13

  14. Attack Overview 14

  15. User Interface Models Full Model Application Partial Model Text E-Banking UI Text Pay to: Amount: Button Submit Cancel Button 15

  16. Attack Applicability UI unique? Yes No Partial model App simple? Yes No Full model Not applicable 16

  17. Evaluation State Estimation Accuracy: 90% after 10 clicks Attack Success Rate: >90% Simulated Pacemaker Programmer 17

  18. Evaluation Attack Success Rate: >90% Processing Delay: 40ms 18 E-Banking

  19. Countermeasures • Preventing our attack 1. Trusted path 2. Biometrics 3. Randomized UIs (See paper for others) 19

  20. Discussion • No signs of attacks in the wild , but hardware exists • Attack device easy to minimize • Small footprint 20

  21. Conclusion • Hacking-in-the-Blind • A novel UI attack • Easy to deploy • Invisible to malware detection • Accurate and stealthy Thank you! 21

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend