bias bluetooth impersonation attacks
play

BIAS: Bluetooth Impersonation AttackS Daniele Antonioli (EPFL), Nils - PowerPoint PPT Presentation

IEEE S&P 2020 BIAS: Bluetooth Impersonation AttackS Daniele Antonioli (EPFL), Nils Tippenhauer (CISPA), Kasper Rasmussen (Oxford Univ.) Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS 1 Bluetooth standard


  1. IEEE S&P 2020 BIAS: Bluetooth Impersonation AttackS Daniele Antonioli (EPFL), Nils Tippenhauer (CISPA), Kasper Rasmussen (Oxford Univ.) Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS 1

  2. Bluetooth standard • Bluetooth standard ◮ Specifies Bluetooth Classic (BT) and Bluetooth Low Energy (BLE) ◮ 1 vulnerability in the standard = billions of exploitable devices Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Cover 2

  3. Contribution: Bluetooth Impersonation AttackS (BIAS) • Bluetooth Impersonation AttackS (BIAS) ◮ Exploiting standard-compliant vulnerabilities in Bluetooth authentication ◮ To impersonate any Bluetooth device without having to authenticate Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Cover 3

  4. Contribution: Bluetooth Impersonation AttackS (BIAS) • Bluetooth Impersonation AttackS (BIAS) ◮ Exploiting standard-compliant vulnerabilities in Bluetooth authentication ◮ To impersonate any Bluetooth device without having to authenticate Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Cover 3

  5. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  6. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  7. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  8. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  9. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  10. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  11. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  12. Bluetooth Threat Model Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 4

  13. BIAS Attacks on Bluetooth Session Establishment Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 5

  14. BIAS Attacks on Bluetooth Session Establishment Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 5

  15. BIAS Attacks on Bluetooth Session Establishment Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS 5

  16. Legacy Secure Connection (LSC) Authentication Alice (slave) Bob (master) A B B, LSC A, LSC C B R A = H(C B , A, K L ) R A check Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 6

  17. Standard-Compliant Vulnerabilities in LSC Authentication 1 LSC authentication is not used mutually for session establishment 2 A device can switch authentication role Alice (slave) Bob (master) A B B, LSC A, LSC C B R A = H(C B , A, K L ) R A check Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 7

  18. BIAS Attack on LSC: Master Impersonation Alice (slave) Charlie as Bob (master) A C B, LSC A, LSC C C R A = H(C C , A, K L ) Skip R A check Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 8

  19. BIAS Attack on LSC: Slave Impersonation Charlie as Alice (slave) Bob (master) C B B, LSC A, Role Switch, LSC Accept Role Switch Charlie is the master (verifier) C C R B = H(C C , B, K L ) Skip R B check Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on LSC 9

  20. Secure Connections (SC) Authentication Alice (slave) Bob (master) A B B, SC A, SC C B C A R B , R A = H(C B , C A , R B , R A = H(C B , C A , B, A, K L ) B, A, K L ) R A R B R B check R A check Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on SC 10

  21. Standard-Compliant Issues with SC Authentication 1 SC negotiation is not integrity-protected 2 SC support is not enforced for pairing and session establishment Alice (slave) Bob (master) A B B, SC A, SC C B C A R B , R A = H(C B , C A , R B , R A = H(C B , C A , B, A, K L ) B, A, K L ) R A R B R B check R A check Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on SC 11

  22. BIAS Attack on SC: Master Impersonation Alice (slave) Charlie as Bob (master) A C B, LSC A, SC SC downgraded to LSC BIAS master impersonation on LSC Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on SC 12

  23. BIAS Attack on SC: Slave Impersonation Charlie as Alice (slave) Bob (master) C B B, SC A, LSC SC downgraded to LSC BIAS slave impersonation on LSC Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on SC 13

  24. Very Secure Connections (VSC) ?! • Let’s define Very Secure Connections (fictional security mode) ◮ Use SC authentication (mutual) ◮ Not vulnerable to SC downgrade • Are we safe against impersonation attacks on VSC? ◮ No, VSC is vulnerable to master and slave reflection attacks ◮ See the paper for the details Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS on VSC 14

  25. Implementation of the BIAS Attacks https://github.com/francozappa/bias Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Implementation 15

  26. Evaluation: BIAS Attacks on 31 Devices (28 BT Chips) Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Evaluation 16

  27. Evaluation: BIAS Attacks on 31 Devices (28 BT Chips) Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Evaluation 16

  28. BIAS + KNOB: Break Bluetooth Session Establishment Alice (master) Bob (slave) A B Phase 1: pairing key authentication Phase 2: session key negotation Phase 3: secure session Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17

  29. BIAS + KNOB: Break Bluetooth Session Establishment Alice (master) Charlie as Bob (slave) A B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation Phase 3: secure session Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17

  30. BIAS + KNOB: Break Bluetooth Session Establishment Alice (master) Charlie as Bob (slave) A B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation (KNOB attack [SEC19]) Phase 3: secure session Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17

  31. BIAS + KNOB: Break Bluetooth Session Establishment Alice (master) Charlie as Bob (slave) A B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation (KNOB attack [SEC19]) Phase 3: secure session (Charlie is Bob) Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17

  32. BIAS + KNOB: Break Bluetooth Session Establishment Charlie as Alice (master) Bob (slave) A B Phase 1: pairing key authentication (BIAS attack) Phase 2: session key negotation (KNOB attack [SEC19]) Phase 3: secure session (Charlie is Alice) Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS BIAS + KNOB 17

  33. BIAS Attacks Countermeasures and Disclosure • We propose a set of countermeasures ◮ Use LSC authentication mutually during session establishment ◮ Integrity-protect session establishment with the pairing key ◮ Enforce SC support across pairing and session establishment • We disclosed the BIAS attacks, and the Bluetooth standard has been updated ◮ However, most of the devices are still vulnerable ◮ E.g., no user or device updates, no device recalls Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Conclusion 18

  34. Conclusion: Bluetooth Impersonation AttackS (BIAS) • Bluetooth Impersonation AttackS (BIAS) ◮ Exploiting standard-compliant vulnerabilities in Bluetooth authentication ◮ To impersonate any Bluetooth device without having to authenticate ◮ Website: https://francozappa.github.io/about-bias/ ◮ Code: https://github.com/francozappa/bias Daniele Antonioli ( @francozappa ) BIAS: Bluetooth Impersonation AttackS Conclusion 19

Recommend


More recommend