PHYSICAL DEVICES Introduction Lots of electronic systems - - PowerPoint PPT Presentation

physical devices introduction
SMART_READER_LITE
LIVE PREVIEW

PHYSICAL DEVICES Introduction Lots of electronic systems - - PowerPoint PPT Presentation

Dr Silvio Cesare Qualys BREAKING THE SECURITY OF PHYSICAL DEVICES Introduction Lots of electronic systems Converging with computing IT security techniques can be used Outline 1. Eavesdropping analog baby monitors 2. Disabling


slide-1
SLIDE 1

BREAKING THE SECURITY OF PHYSICAL DEVICES

Dr Silvio Cesare Qualys

slide-2
SLIDE 2

Introduction

  • Lots of electronic systems
  • Converging with computing
  • IT security techniques can be used
slide-3
SLIDE 3

Outline

  • 1. Eavesdropping analog baby monitors
  • 2. Disabling RF-based home alarm systems
  • 3. Hardware tampering a home alarm
  • 4. Defeating the keyless entry of a 2000-2005

Car

slide-4
SLIDE 4

Eavesdropping analog baby monitors

slide-5
SLIDE 5

Analog Baby monitors?

  • Buy new off Ebay and other places.
slide-6
SLIDE 6

Using Software defined radio dongles

  • RTL-SDR ($15)
  • Funcube
  • Antennas
slide-7
SLIDE 7

Using upconvertors

  • Lower frequencies not processed by SDR.
  • Upconvert frequencies.
  • Ham it up convertor shown:
slide-8
SLIDE 8

Finding the signal using spectrum analysis

  • High-end hardware is expensive (below left).
  • Cheaper hw is available (RF Explorer below).
  • 40MHz is pretty normal.
slide-9
SLIDE 9

Demodulating the signal

  • Use software spectrum analysis tools.
  • Try AM, FM demodulation.
  • Gqrx (Linux)
  • HDSDR (Windows)
slide-10
SLIDE 10

Mitigation

  • Use DECT
  • Yes.. I know DECT has been broken also.
slide-11
SLIDE 11

Disabling rf-based home alarm systems

slide-12
SLIDE 12

What home alarms use RF- remotes?

  • Heaps.. Almost everything at Big-W, K-Mart,

Bunnings etc

slide-13
SLIDE 13

Replay attacks

  • Real remote sends a “fixed code” to disable

system.

  • Attacker captures code and replays it with

USRP etc.

  • Works on almost all home alarms.
  • Alarm keyfobs generally use 315 MHz and

433.92 MHz RF.

slide-14
SLIDE 14

The Hardware

  • USRP B200 right:
  • Antennas.
slide-15
SLIDE 15

Replay attacks with GNURadio

  • Capture:

 Source is USRP, Sink is File.

  • Replay:

 Source is File, Sink is USRP.

slide-16
SLIDE 16

What is in the RF signal?

  • Generally modulated by AM and PWM.
  • If we demodulate the RF signal, we can see if

the remote code is fixed or rolling.

  • GNURadio and custom software.
slide-17
SLIDE 17

Amplitude (am) Modulation

slide-18
SLIDE 18

Pulse width modulation (pwm)

  • Square waves generated by am

demodulation.

slide-19
SLIDE 19

Using cluster analysis to determine pulse widths

  • pycluster
  • Group similar widths together
  • Find mean in each cluster
  • Mean of means is the threshold.
slide-20
SLIDE 20

Building a $50 arduino-based hacking box

  • Wireless AM rx/tx pair
slide-21
SLIDE 21

mitigation

  • Use rolling codes, or challenge-response.
  • Buy commercial alarm systems.
  • Avoid K-Mart, Big-W et al.
slide-22
SLIDE 22

Hardware tampering an alarm system

slide-23
SLIDE 23

A shop at Bunnings

slide-24
SLIDE 24

Interfacing with the microcontroller

  • Disassembly reveals labelled IC (PIC) and test

ports.

  • Solder header pins.
  • Attach PIC device programmer.
slide-25
SLIDE 25

Reading secret passcodes

  • Device programmer software.
  • Firmware protected.
  • Data is readable.
  • Reveals passcode.
slide-26
SLIDE 26

Potential attacks to read the firmware

  • Glitching?
  • Decapping the IC and changing the security

fuse with UV light?

slide-27
SLIDE 27

Mitigation

  • Don’t label ICs.
  • Assume hardware hacking.
  • Hard to stop a well resourced attacker.
slide-28
SLIDE 28

Defeating the keyless entry of a 2000-2005 Car

slide-29
SLIDE 29

Building a dataset of button pushes

slide-30
SLIDE 30

Phase space analysis of the rolling codes

  • Used 10 years ago against TCP initial

sequence numbers.

slide-31
SLIDE 31

Predicting prng (rolling) codes

  • Capture 3 codes from real remote.
  • Existing software to predict PRNG.
  • Tx with USRP.
slide-32
SLIDE 32

Increasing TX range

  • Use an amplifier.
slide-33
SLIDE 33

Testing codes

  • Capture and Replay codes.
  • How to stop the car receiving codes?
  • Use a Faraday cage:

 Aluminium Foil lined Freezer bag!

slide-34
SLIDE 34

Defeating the keyless entry

slide-35
SLIDE 35

Analysing the rolling code

  • Format

 Preamble based on remote ID.  Followed by unlock/lock/panic/trunk code.  Then 16-17 bits for security in rolling code.

  • Bits

 3 states per bit.  1, 0, or a gap.  Gaps are important.

  • Timing

 1 is twice the pulse width as a 0.  An implicit gap after every 1 or 0.  A gap is the width of a 0.

1x1x1x1x1x1x11100x11... 1x1x1x1x1x1x11101x10... 1x1x1x1x1x1x11101x00...

slide-36
SLIDE 36

Analysing more

  • The entire rolling code sequence is of a fixed

time

 all the ones, zeros, and gaps sum to a fixed

number.

  • There are fewer x’s than 1’s and 0’s.
  • An x never follows an x.
slide-37
SLIDE 37

Bruteforce?

  • Capture 1 transmission.
  • Use preamble of capture and then bruteforce

rolling code part.

  • Generate all numbers in range.
  • Exclude numbers not meeting constraints.
  • Fewer than 1 million possibilities.
slide-38
SLIDE 38

Does it work?

  • Unlocks generally in under 2 hours.
slide-39
SLIDE 39

Hmm.. What’s this – a Backdoor?

  • Some codes in bruteforce list ALWAYS unlock

the car.

  • Once known, unlocking car takes seconds not

hours.

  • Appears to be a manufacturer backdoor.
  • TODO: How to generate from 1 capture

without bruteforcing.

slide-40
SLIDE 40

Mitigation

  • Hard to mitigate without a recall.
  • Recall is never going to happen.
  • Install an aftermarket keyless entry or just

upgrade your car.

  • For car makers:

 Don’t use an algorithm to generate the rolling

codes.

 Don’t put in backdoors.

slide-41
SLIDE 41

Future work

  • Silicon analysis
  • Firmware recovery
slide-42
SLIDE 42

Conclusion

  • Hardware hacking is fun.
  • Lots of real-world devices vulnerable.
  • PRNG attacks against rolling codes have been

mostly uninvestigated.