You dont hear me but your phones voice interface does Jos L OPES E - - PowerPoint PPT Presentation

you don t hear me but your phone s voice interface does
SMART_READER_LITE
LIVE PREVIEW

You dont hear me but your phones voice interface does Jos L OPES E - - PowerPoint PPT Presentation

You dont hear me but your phones voice interface does Jos L OPES E STEVES & Chaouki K ASMI Hack In Paris - 18/06/2015 WHO WE ARE Jos Lopes Esteves and Chaouki Kasmi ANSSI-FNISA / Wireless Security Lab Electromagnetic


slide-1
SLIDE 1

Hack In Paris - 18/06/2015

You don’t hear me but your phone’s voice interface does

José LOPES ESTEVES & Chaouki KASMI

slide-2
SLIDE 2

WHO WE ARE

ANSSI 2

José Lopes Esteves and Chaouki Kasmi

  • ANSSI-FNISA / Wireless Security Lab
  • Electromagnetic threats on information

systems

  • RF communications security
  • Embedded systems
  • Signal processing
slide-3
SLIDE 3

AGENDA

ANSSI 3

  • Voice command interpreters
  • Voice and command injection
  • Attack scenarios
  • Countermeasures
  • Conclusion
slide-4
SLIDE 4

Your phone hears…

Voice Command Interpreters

slide-5
SLIDE 5
  • Definition
  • Commands scope
  • Activation conditions
  • Process description
  • Security

VOICE COMMAND INTERPRETERS

ANSSI 5

slide-6
SLIDE 6
  • Hands-free UI
  • More and more deployed
  • Smartphones, smartwatches, IoT, cars,

desktop OS, browsers, apps…

  • Apple: Siri, VoiceControl
  • Microsoft: Speech, Cortana
  • Google: Google Voice Search
  • 3rd party apps (e.g. Samsung S-Voice)

DEFINITION

ANSSI 6

slide-7
SLIDE 7
  • Telephony: calls, SMS…
  • Internet: browsing, emails, social networking,

web searches, maps…

  • Local: launching/using apps, changing

settings, creating notes, alarms, calendar entries…

COMMANDS SCOPE

ANSSI 7

slide-8
SLIDE 8
  • Always on: keyword (OK Google, Hey Siri)
  • Via soft button: in specific applications
  • Via hard button: on phone or on headset

remote

ACTIVATION CONDITIONS

ANSSI 8

slide-9
SLIDE 9
  • Local: keyword detection, limited actions
  • Remote: voice processing and command

recognition

PROCESS

ANSSI 9 OK GOOGLE Call Mom <Cmd: Call Mom>

1 2

slide-10
SLIDE 10

SECURITY

ANSSI 10

  • Pre-auth actions (limited but still…): auth

bypass [1]

  • Cloud based: malicious server responses [2]
  • Voice processing: privacy [3], biometric data
  • Local attacks: malicious app voice sending

commands by audio front-end [4]

slide-11
SLIDE 11

SECURITY

ANSSI 11

  • Pre-auth actions (limited but still…): auth

bypass [1]

  • Cloud based: malicious server responses [2]
  • Voice processing: privacy [3], biometric data
  • Local attacks: malicious app voice sending

commands by audio front-end [4]

  • Today: Remote and Silent Voice Command

Injection by Smart IEMI

slide-12
SLIDE 12

But you don’t hear anything…

Voice and Command Injection

slide-13
SLIDE 13
  • Smartphones, headsets, FM
  • Transmission principle and field to line

coupling

  • Experimental setup
  • Results

VOICE COMMAND INJECTION

ANSSI 13

slide-14
SLIDE 14
  • Some smartphones are FM radio capable
  • Use headphones cables as an antenna
  • Remote buttons change the signal on the

MIC cable

SMARTPHONES, HEADSETS, FM

ANSSI 14

Bandpass Filter FM Demodulation Audio IN Lowpass Filter Amplification Audio IN

FM processing Voice processing

slide-15
SLIDE 15

SMARTPHONES, HEADSETS, FM

ANSSI 15

  • Some smartphones are FM radio capable
  • Use headphones cables as an antenna
  • Remote buttons change the signal on the

MIC cable

  • Headphones are good [80MHz-108MHz]

coupling interfaces

  • Maybe we can inject a signal interpreted as

sound by abusing the low-pass filter with a VHF AM signal

slide-16
SLIDE 16

SMARTPHONES, HEADSETS, FM

ANSSI 16

Lowpass Filter Amplification Audio IN

Voice processing

« OK GOOGLE » 80-100 MHz CW

AM modulation

  • PoC: Main hypothesis
slide-17
SLIDE 17
  • PoC: injecting music

EXPERIMENTAL SETUP

ANSSI 22

AM – 80-108MHz

Wi-Fi Faraday Cage Audio streaming

slide-18
SLIDE 18
  • PoC: injecting commands ?

EXPERIMENTAL SETUP

ANSSI 24

AM – 80-108MHz

Wi-Fi Internet access Faraday Cage

<Cmd: Call Mom>

Cloud

slide-19
SLIDE 19
  • Activation (if needed):

 CW (80-108MHz), Frequency modulated signal

  • Exploitation:

 CW (80-108MHz), Amplitude modulated CW by

audio voice commands

  • Electric field level/range:

 28V/m at 100MHz (< than the human safety limit)

RESULTS

ANSSI 25

slide-20
SLIDE 20
  • Limitations

 Antenna size (~30cm)  Emitted power

  • E-field level/range

 28V/m at 100MHz

  • Power level/range

 40W/2m, 200W/5m

RESULTS

ANSSI 26

2m 5m

slide-21
SLIDE 21

…Silent and Remote Command Injection

Attack scenarios

slide-22
SLIDE 22
  • Tracking
  • Eavesdropping
  • Cost abuse
  • Reputation / Phishing
  • Malicious app trigger
  • Advanced compromising

ATTACK SCENARIOS

ANSSI 28

slide-23
SLIDE 23
  • Tracking

 Activate wireless interfaces (Wi-Fi, BT)  Capture advertising packets (Probe Requests)  Use MAC addresses to identify  Use presence of packets to locate  Use Wi-Fi SSIDs to identify known locations

  • Demo: S-Voice bluetooth (de)activation

ATTACK SCENARIOS

ANSSI 29

Payload: Hi Galaxy – Bluetooth

slide-24
SLIDE 24
  • Eavesdropping

 Place a call to a monitoring phone’s number  Simply listen to the target’s sound environment

  • Demo: placing a call

ATTACK SCENARIOS

ANSSI 30

Payload: Call « Mon Compte » (« My account »)

slide-25
SLIDE 25
  • Cost abuse

 Massive attack in a crowded place  Place a call or a SMS to a paid service  Browse to some URL with ads

  • Demo: web browsing

ATTACK SCENARIOS

ANSSI 31

Payload: OK Google – Go to www.ssi.gouv.fr

slide-26
SLIDE 26
  • Reputation / Phishing

 Create malicious content (embarrassing,

phishing)

 Send by SMS, email  Or publish to social media  Web/search history poisoning

ATTACK SCENARIOS

ANSSI 32

slide-27
SLIDE 27
  • Malicious app trigger

 Launch an already installed malicious application  Use voice input to trigger a payload  Launch a critical application (e.g. Sesame)

  • Demo: launching an application

ATTACK SCENARIOS

ANSSI 33

Payload: OK Google – Open Gmail

slide-28
SLIDE 28

ATTACK SCENARIOS

ANSSI 34

  • Advanced compromising

 Use voice command injection as a way to extend

the attack surface (Interface activation, web browsing…)

 Exploit vulnerabilities to compromise the device  Ex: silent application install via a malicious web

page [5], local priviledge escalation…

 Ex: wireless interface reset, capture initial

exchange, exploit protocol weaknesses, rogue AP [6], launch an application…

slide-29
SLIDE 29

Restrict, Detect and Alert

Countermeasures

slide-30
SLIDE 30

COUNTERMEASURES

ANSSI 36

  • For

 Users  Manufacturers/editors

  • To

 Reduce attack surface  Limit impact  Increase attacker level  Detect the attack

slide-31
SLIDE 31

USERS

ANSSI 37

  • Unplug headphones when not used
  • Use mic-less headphones
  • Only enable voice command when needed
  • Personalize keyword
  • Carefully select commands available

(especially pre-auth)

  • Enable as many feedbacks as possible

(sound, vibration…)

slide-32
SLIDE 32

EDITORS

ANSSI 38

  • Limit critical commands available
  • Reduce audio front-end sensitivity
  • Voice recognition
  • Provide finer-grain settings to users
  • Detect abnormal EM activity with built-in

sensors [7]

slide-33
SLIDE 33

Conclusion

slide-34
SLIDE 34

CONCLUSION

ANSSI 40

  • Voice command interface IS critical and

shall be correctly secured

  • Users: use it wisely
  • Editors: allow users to use it wisely and

implement secure defaults

  • Researchers: take a look at it, it is a critical

and complex command input interface

slide-35
SLIDE 35

CONCLUSION

ANSSI 41

  • Smart IEMI can be an efficient attack

vector against information systems

  • Not limited to DoS
  • More and more affordable (SDR…)
  • Take it into account for risk analysis
slide-36
SLIDE 36

References

slide-37
SLIDE 37

REFERENCES

ANSSI 43

[1] N. Gonzalez, Siri exploited again – how to bypass the lock screen in iOS 8, ios.wonderhowto.com, 2014 [2] Applidium, Cracking Siri, GitHub, 2011 [3] W. Wei, Apple admits Siri voice data is being shared with third parties, www.hackernews.com, 2015 [4] W. Diao et al., Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone. SPSM 2014 [5] A. Moulu, Abusing Samsung KNOX to remotely install a malicious application, Quarkslab, 2014 [6] G. Wilkinson, The machines that betrayed their masters, BH Mobile Security Summit, 2015 [7] C. Kasmi, J. Lopes Esteves, Automated analysis of the effects induced by radio-frequency pulses on embedded systems for EMC safety, AT- RASC, URSI, 2015

slide-38
SLIDE 38

IMAGE CREDITS

ANSSI 44

dailymail.co.uk, jimmymacsupport.com, scene7.com, wonderhowto.com, eroelectronic.net, dryicons.com, webniraj.com, shopify.com, icon100.com, icon8.com, tagstation.com, wikipedia.org

slide-39
SLIDE 39

Thank You

slide-40
SLIDE 40

QUESTIONS ?

ANSSI 46

  • Jose Lopes Esteves, jose.lopes-esteves@ssi.gouv.fr
  • Chaouki Kasmi, chaouki.kasmi@ssi.gouv.fr