you don t hear me but your phone s voice interface does
play

You dont hear me but your phones voice interface does Jos L OPES E - PowerPoint PPT Presentation

You dont hear me but your phones voice interface does Jos L OPES E STEVES & Chaouki K ASMI Hack In Paris - 18/06/2015 WHO WE ARE Jos Lopes Esteves and Chaouki Kasmi ANSSI-FNISA / Wireless Security Lab Electromagnetic


  1. You don’t hear me but your phone’s voice interface does José L OPES E STEVES & Chaouki K ASMI Hack In Paris - 18/06/2015

  2. WHO WE ARE José Lopes Esteves and Chaouki Kasmi  ANSSI-FNISA / Wireless Security Lab  Electromagnetic threats on information systems  RF communications security  Embedded systems  Signal processing ANSSI 2

  3. AGENDA  Voice command interpreters  Voice and command injection  Attack scenarios  Countermeasures  Conclusion ANSSI 3

  4. Voice Command Interpreters Your phone hears …

  5. VOICE COMMAND INTERPRETERS  Definition  Commands scope  Activation conditions  Process description  Security ANSSI 5

  6. DEFINITION  Hands-free UI  More and more deployed  Smartphones, smartwatches, IoT, cars, desktop OS, browsers, apps …  Apple: Siri, VoiceControl  Microsoft: Speech, Cortana  Google: Google Voice Search  3rd party apps (e.g. Samsung S-Voice) ANSSI 6

  7. COMMANDS SCOPE  Telephony : calls, SMS…  Internet: browsing, emails, social networking, web searches, maps …  Local: launching/using apps, changing settings, creating notes, alarms, calendar entries… ANSSI 7

  8. ACTIVATION CONDITIONS  Always on: keyword ( OK Google , Hey Siri )  Via soft button: in specific applications  Via hard button: on phone or on headset remote ANSSI 8

  9. PROCESS  Local: keyword detection, limited actions  Remote: voice processing and command recognition 1 OK GOOGLE 2 Call Mom <Cmd: Call Mom> ANSSI 9

  10. SECURITY  Pre-auth actions (limited but still …): auth bypass [1]  Cloud based: malicious server responses [2]  Voice processing: privacy [3], biometric data  Local attacks: malicious app voice sending commands by audio front-end [4] ANSSI 10

  11. SECURITY  Pre-auth actions (limited but still …): auth bypass [1]  Cloud based: malicious server responses [2]  Voice processing: privacy [3], biometric data  Local attacks: malicious app voice sending commands by audio front-end [4]  Today: Remote and Silent Voice Command Injection by Smart IEMI ANSSI 11

  12. Voice and Command Injection But you don’t hear anything …

  13. VOICE COMMAND INJECTION  Smartphones, headsets, FM  Transmission principle and field to line coupling  Experimental setup  Results ANSSI 13

  14. SMARTPHONES, HEADSETS, FM  Some smartphones are FM radio capable  Use headphones cables as an antenna  Remote buttons change the signal on the MIC cable FM processing Voice processing Bandpass Lowpass Filter Filter FM Amplification Demodulation Audio IN Audio IN ANSSI 14

  15. SMARTPHONES, HEADSETS, FM  Some smartphones are FM radio capable  Use headphones cables as an antenna  Remote buttons change the signal on the MIC cable  Headphones are good [80MHz-108MHz] coupling interfaces  Maybe we can inject a signal interpreted as sound by abusing the low-pass filter with a VHF AM signal ANSSI 15

  16. SMARTPHONES, HEADSETS, FM  PoC: Main hypothesis Voice processing AM modulation Lowpass Filter Amplification 80-100 MHz CW Audio IN « OK GOOGLE » ANSSI 16

  17. EXPERIMENTAL SETUP  PoC: injecting music AM – 80-108MHz Wi-Fi Audio streaming Faraday Cage ANSSI 22

  18. EXPERIMENTAL SETUP  PoC: injecting commands ? AM – 80-108MHz Wi-Fi Internet access <Cmd: Call Mom> Faraday Cage Cloud ANSSI 24

  19. RESULTS  Activation (if needed):  CW (80-108MHz), Frequency modulated signal  Exploitation:  CW (80-108MHz), Amplitude modulated CW by audio voice commands  Electric field level/range:  28V/m at 100MHz (< than the human safety limit) ANSSI 25

  20. RESULTS  Limitations 2m  Antenna size (~30cm) 5m  Emitted power  E-field level/range  28V/m at 100MHz  Power level/range  40W/2m, 200W/5m ANSSI 26

  21. Attack scenarios … Silent and Remote Command Injection

  22. ATTACK SCENARIOS  Tracking  Eavesdropping  Cost abuse  Reputation / Phishing  Malicious app trigger  Advanced compromising ANSSI 28

  23. ATTACK SCENARIOS  Tracking  Activate wireless interfaces (Wi-Fi, BT)  Capture advertising packets (Probe Requests)  Use MAC addresses to identify  Use presence of packets to locate  Use Wi-Fi SSIDs to identify known locations  Demo: S-Voice bluetooth (de)activation Payload: Hi Galaxy – Bluetooth ANSSI 29

  24. ATTACK SCENARIOS  Eavesdropping  Place a call to a monitoring phone’s number  Simply listen to the target’s sound environment  Demo: placing a call Payload: Call « Mon Compte » (« My account ») ANSSI 30

  25. ATTACK SCENARIOS  Cost abuse  Massive attack in a crowded place  Place a call or a SMS to a paid service  Browse to some URL with ads  Demo: web browsing Payload: OK Google – Go to www.ssi.gouv.fr ANSSI 31

  26. ATTACK SCENARIOS  Reputation / Phishing  Create malicious content (embarrassing, phishing)  Send by SMS, email  Or publish to social media  Web/search history poisoning ANSSI 32

  27. ATTACK SCENARIOS  Malicious app trigger  Launch an already installed malicious application  Use voice input to trigger a payload  Launch a critical application (e.g. Sesame)  Demo: launching an application Payload: OK Google – Open Gmail ANSSI 33

  28. ATTACK SCENARIOS  Advanced compromising  Use voice command injection as a way to extend the attack surface (Interface activation, web browsing…)  Exploit vulnerabilities to compromise the device  Ex: silent application install via a malicious web page [5], local priviledge escalation…  Ex: wireless interface reset, capture initial exchange, exploit protocol weaknesses, rogue AP [6], launch an application … ANSSI 34

  29. Countermeasures Restrict, Detect and Alert

  30. COUNTERMEASURES  For  Users  Manufacturers/editors  To  Reduce attack surface  Limit impact  Increase attacker level  Detect the attack ANSSI 36

  31. USERS  Unplug headphones when not used  Use mic-less headphones  Only enable voice command when needed  Personalize keyword  Carefully select commands available (especially pre-auth)  Enable as many feedbacks as possible (sound, vibration…) ANSSI 37

  32. EDITORS  Limit critical commands available  Reduce audio front-end sensitivity  Voice recognition  Provide finer-grain settings to users  Detect abnormal EM activity with built-in sensors [7] ANSSI 38

  33. Conclusion

  34. CONCLUSION  Voice command interface IS critical and shall be correctly secured  Users: use it wisely  Editors: allow users to use it wisely and implement secure defaults  Researchers: take a look at it, it is a critical and complex command input interface ANSSI 40

  35. CONCLUSION  Smart IEMI can be an efficient attack vector against information systems  Not limited to DoS  More and more affordable (SDR…)  Take it into account for risk analysis ANSSI 41

  36. References

  37. REFERENCES [1] N. Gonzalez, Siri exploited again – how to bypass the lock screen in iOS 8 , ios.wonderhowto.com, 2014 [2] Applidium, Cracking Siri , GitHub, 2011 [3] W. Wei, Apple admits Siri voice data is being shared with third parties , www.hackernews.com, 2015 [4] W. Diao et al., Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Ph one. SPSM 2014 [5] A. Moulu, Abusing Samsung KNOX to remotely install a malicious application , Quarkslab, 2014 [6] G. Wilkinson, The machines that betrayed their masters , BH Mobile Security Summit, 2015 [7] C. Kasmi, J. Lopes Esteves, Automated analysis of the effects induced by radio-frequency pulses on embedded systems for EMC safety , AT- RASC, URSI, 2015 ANSSI 43

  38. IMAGE CREDITS dailymail.co.uk, jimmymacsupport.com, scene7.com, wonderhowto.com, eroelectronic.net, dryicons.com, webniraj.com, shopify.com, icon100.com, icon8.com, tagstation.com, wikipedia.org ANSSI 44

  39. Thank You

  40. QUESTIONS ?  Jose Lopes Esteves, jose.lopes-esteves@ssi.gouv.fr  Chaouki Kasmi, chaouki.kasmi@ssi.gouv.fr ANSSI 46

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend