Tap n Ghost A Compilation of Novel Attack Techniques against - - PowerPoint PPT Presentation

tap n ghost
SMART_READER_LITE
LIVE PREVIEW

Tap n Ghost A Compilation of Novel Attack Techniques against - - PowerPoint PPT Presentation

Tap n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens Seita Maruyama 1 , Satohiro Wakabayashi 1 , Tatsuya Mori 1, 2 1 Waseda University, Japan 2 RIKEN AIP, Japan Tap n Ghost An attack against smartphones


slide-1
SLIDE 1

Tap ’n Ghost

A Compilation of Novel Attack Techniques against Smartphone Touchscreens

Seita Maruyama 1, Satohiro Wakabayashi 1, Tatsuya Mori 1, 2

1 Waseda University, Japan 2 RIKEN AIP, Japan

slide-2
SLIDE 2

Tap ’n Ghost

➤ An attack against smartphones ➤ The attack connects a Bluetooth device or a Wi-Fi access point to the victim's smartphone. ➤ It consists of two techniques:

▶ Attack against NFC-enabled smartphones ▶ Attack against Capacitive Touchscreens 2

slide-3
SLIDE 3

How Our Attack Works

3

External Metal Sheet NFC Card Emulator Victim’s Smartphone Table

slide-4
SLIDE 4

How Our Attack Works

4

slide-5
SLIDE 5

Demo: Overview

5

slide-6
SLIDE 6

Demo: Overview

Connected to […]

6

slide-7
SLIDE 7

Two Attack Techniques

Tag-based Adaptive Ploy:

Attack technique against NFC-enabled smartphones

Ghost Touch Generator:

Attack technique against Capacitive Touchscreens

7

slide-8
SLIDE 8

Two Attack Techniques

Tag-based Adaptive Ploy:

Attack technique against NFC-enabled smartphones

Ghost Touch Generator:

Attack technique against Capacitive Touchscreens

8

slide-9
SLIDE 9

How Touchscreens Work

➤ Capacitive touchscreens are widely used in smartphones.

9

TX electrodes (driving) RX electrodes (sensing) Finger Smartphone

slide-10
SLIDE 10

How Touchscreens Work

➤ Bringing a finger close to the intersection will decrease electrical current flowing into the RX electrode.

10

TX RX Cf C0

slide-11
SLIDE 11

Ghost Touch Generator

➤ The attacker can cause false touch events by injecting intentional noise from an external source.

11

TX RX

Cf C0

External Metal Sheet Cex

slide-12
SLIDE 12

Demo: Ghost Touch Generator

12

slide-13
SLIDE 13

Ghost Touch Generator

➤ It causes “false touches” on the 5/7 models. ➤ The characteristic frequencies vary by model.

Device Manufacture Success false touches Frequency [kHz] Nexus 7 ASUS

  • 128.2

ARROWS NX F-05F FUJITSU — Nexus 9 HTC

  • 280.9

Galaxy S6 edge SAMSUNG — Galaxy S4 SAMSUNG

  • 384.5

AQUOS ZETA SH-04F SHARP

  • 202.0

Xperia Z4 SONY

  • 218.0

13

slide-14
SLIDE 14

Summary of Ghost Touch Generator

  • 1. This attack technique scatters false touches on

touchscreens.

  • 2. The attacker needs to identify the smartphone

model in advance.

14

slide-15
SLIDE 15

Two Attack Techniques

Tag-based Adaptive Ploy:

Attack technique against NFC-enabled smartphones

Ghost Touch Generator:

Attack technique against Capacitive Touchscreens

15

slide-16
SLIDE 16

NFC

➤ NFC is a short-range (~10 cm) wireless communication technology

16 Smart Posters Credit Card Smartphones

pocketnow, https://pocketnow.com/android-nfc-app-reveals-contactless-credit-card-details-should-you-be-worried androidcentral, https://www.androidcentral.com/samsung-pay-uk-everything-you-need-know nfc Direct, https://nfcdirect.co.uk/44-social-media-nfc-smart-posters

slide-17
SLIDE 17

NFC and Android

➤ Android smartphones always look for nearby NFC tags and read it. ➤ The following operations are launched depending on the NFC tag record:

Opening a website

Connecting a Wi-Fi access point (with confirmation)

Pairing a Bluetooth device (with confirmation)

17

slide-18
SLIDE 18

Tag-based Adaptive Ploy

➤ NFC emulation enables to emulate an NFC tag, and dynamically change its content.

  • 1. Request to open an attacker’s website &

identify the smartphone model

  • 2. Request to pair an attacker’s Bluetooth device

18

slide-19
SLIDE 19

Summary of Two Attack Techniques

Tag-based Adaptive Ploy:

Attack technique against NFC-enabled smartphones

Gets info & Shows dialog box

Ghost Touch Generator:

Attack technique against Capacitive Touchscreens

Generates false touches

19

slide-20
SLIDE 20

Feasibility of the Threat

➤ The attack succeeds only if the victim uses their smartphone within the NFC communication range.

(NFC communication range < Ghost Touch Generator attack range)

➤ We conducted a deceptive study to investigate how often the victim’s smartphone came within the attack range of the Malicious Table. ➡ 15 out of the 16 participants were attackable.

20

slide-21
SLIDE 21

User Study

21

slide-22
SLIDE 22

Overall Attack Success Rate

➤ Overall attack success rate is 71%, if 30 people take a seat at the Table and the attacker can retry attack 3 times for each person.

22 # of people who take a seat at the table # of attack trials Attack Success Probability

slide-23
SLIDE 23

Countermeasures

➤ Add the user approval processes before Android OS launches every operations recorded in a NFC tag (cf. iPhone XS, XS Max, and XR) ➤ Detect the malfunction on touchscreens

▶ Add idle time to TX electrodes, and check noise

  • n RX electrodes

▶ Identify the characteristic patterns of false

touches

23

slide-24
SLIDE 24

Responsible Disclosure

➤ With the aid of JPCERT/CC, we have contacted several smartphone manufacturers. ➤ We demonstrated the attack to them and confirmed that the attack is applicable their latest model.

24

slide-25
SLIDE 25

Conclusion

➤ We presented the new attack “Tap ’n Ghost,” which exploits the NFC and the touchscreen of the victim’s smartphone. ➤ We demonstrated the attack is feasible. ➤ We provide possible countermeasures.

25

slide-26
SLIDE 26

Appendix

slide-27
SLIDE 27

Tag-based Adaptive Ploy (TAP)

web server

Device fingerprinting

4

Sends the model information

5

NFC emulator single-board computer Emulates a URL NFC tag Emulates a tag suited for attacking the model

6

Reads the emulated tag Visits the attacker’s website

2 7 3

embedded device

1

27

slide-28
SLIDE 28

User Study

28

slide-29
SLIDE 29

Attack Conditions

➤ Success rate of a single attack: 3% ➤ Following Conditions must be satisfied:

a smartphone comes with Android OS.

a smartphone is equipped with NFC.

a victim has enabled the NFC functionality.

a smartphone’s touchscreen controller is attackable with Ghost Touch Generator.

a victim has unlocked the smartphone when s/he brings it close to the Malicious Table.

Ghost Touch Generator attack has succeeded.

29

slide-30
SLIDE 30

Overall Attack Success Rate

➤ Overall attack success rate is 71%, if 30 people take a seat at the Table and the attacker can retry attack 3 times for each person.

30 # of people who take a seat at the table # of attack trials Attack Success Probability