Mobile Security Fall 2013

Similar documents
Mobile Security Fall 2011

Bluetooth Threat Taxonomy

DEPARTMENT OF MECHANICAL ENGINEERING. Wireless Connectivity for Hilti Power Tools with Bluetooth

Mobile Security Fall 2012

Ethical Hacking and. Version 6. Module XXXVII Bluetooth Hacking

Security. Nelli Gordon and Sean Vakili May 10 th 2011

Wireless Network Security Spring 2011

22C3. December 30st 2005, Berlin, Germany. by Adam Laurie, Marcel Holtmann and Martin Herfurt. ... because infinite is sometimes not enough!

Wireless# Guide to Wireless Communications. Objectives

A Survey on Security Threats and Vulnerability attacks on Bluetooth Communication

Wireless Network Security Spring 2013

Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created

By Nick Giannaris. ZigBee

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...

Mobile Security Fall 2013

Wireless Network Security Spring 2011

Wireless Network Security Spring 2013

HACKING EXPOSED WIRELESS: WIRELESS SECURITY SECRETS & SOLUTIONS SECOND EDITION JOHNNY CACHE JOSHUA WRIGHT VINCENT LIU. Mc Graw mim

COMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2

Mobile Security Fall 2013

Seminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht

Today s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd.

Mobile Security Fall 2011

Bluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002

DEEP ARMOR. Hands-on Exploitation & Hardening of Wearable and IoT Platforms. Sumanth Naropanth & Sunil Kumar

Modulation. Propagation. Typical frequency bands

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE

Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies

Hacking challenge: steal a car!

Mobile Security Fall 2012

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Securing A Bluetooth Device

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

Wireless Network Security Spring 2014

Bluetooth. March 28, 2005 Patrick Lui

Endpoint Security - what-if analysis 1

Hacking the Bluetooth Stack for Fun, Fame and Profit

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Security Concerns in Automotive Systems. James Martin

CHAPTER 3 BLUETOOTH AND IEEE

Network Security. Thierry Sans

CTS2134 Introduction to Networking. Module 08: Network Security

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

CYBER RISK CONSULTING. Smartphone Security Issues

Computer Networks II Advanced Features (T )

Hacking the Bluetooth Stack for Fun, Fame and Profit

Guide to Wireless Communications, 3 rd Edition. Objectives

Security and Authentication

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

ADVANCED ATTACKS AGAINST MOBILE/IOT DEVICES

Bluetooth technology: security features, vulnerabilities and attacks Pasquale Stirparo Jan Loeschner Marco Cattani

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Mobile Middleware Course. Introduction and Overview Sasu Tarkoma

Ethical Hacking and Prevention

Wireless Attacks and Countermeasures

Connecting & Addressing Security Concerns of Bluetooth Technology in Current Scenario

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC

Course 831 Certified Ethical Hacker v9

Man in the Middle Attacks and Secured Communications

Wireless? What? Why? How?

Advanced Diploma on Information Security

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

802-Not-11. The Forgotten Wireless Device Threats. CONfidence 2010 RenderLab.net, Churchofwifi.org, NMRC.org

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Wireless Network Security

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

NETWORK SECURITY. Ch. 3: Network Attacks

Regulation and the Internet of Things

Inside Bluetooth Low Energy

The following chart provides the breakdown of exam as to the weight of each section of the exam.

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Studying the Security in VoIP Networks

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]


Bluetooth. Digital Communications CIM242. Amarpreet Singh Saini KINGSTON UNIVERSITY K /10/2010

Securing Internet of things Infrastructure Standard and Techniques

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

What is Eavedropping?

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

Attacks on WLAN Alessandro Redondi

CIS 700/002 : Special Topics : Bluetooth: With Low Energy comes Low Security

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came

Mobile Security / Mobile Payments

IoT Connectivity Standards

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Mobile Security Fall 2015

Worldwide Release. Your world, Secured ND-IM005. Wi-Fi Interception System

BackTrack 5 Wireless Penetration Testing

Simulating the Deployment of Battery-Sensing Intrusion Protection Systems

Wireless Network Security Spring 2016

By Ambuj Varshney & Akshat Logar

CEH: CERTIFIED ETHICAL HACKER v9

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Wireless Network Security Spring 2015

Next Generation Endpoint Security Confused?

AIR FORCE INSTITUTE OF TECHNOLOGY

Lessons Learned from Implementing a Wi-Fi and BT Stack

Transcription:

Mobile Security 14-829 Fall 2013 Patrick Tague Class #7 Personal Area Networks

Early Project Tasks Topic Survey Presentation Background summary of your topic area Not too broad, and not too specific to your project goals, but background that prepares the class to understand your project scope 20 minute presentation in class Dates available: 9/23, 9/25, 10/2, 10/7, 10/9 Up to three presentations per class day

Early Project Tasks Project Proposal Presentation of your project goals and deliverables Builds on what you presented in your survey 1 slide, 5 minute presentation in class, October 14 Your slide will be due October 13 via email We'll post a quad chart -like slide template Presentation order will be randomized

Personal Area Networks Personal area networks enable device-to-device communication without relying on the Internet The IEEE 802.15 family 802.15.1: Bluetooth 802.15.2: coexistence with other wireless systems 802.15.3: High-rate WPAN, including UWB 802.15.4: Low-rate WPAN, including ZigBee 802.15.5: mesh networking 802.15.6: body area networks (BAN) 802.15.7: visible light communication (VLC)

Bluetooth 802.15.1 provides Bluetooth PHY Short range, few devices, low power, cheap Commonly used for home, personal, office networks Bluetooth piconet is similar to WLAN (1 server, n clients) (1 master, n slaves), only no back-end

Ultra-Wideband Based on 802.15.3 standard Very high data rate (~Gbps), very low power, very short distances (10-100cm) High-rate file transfer, streaming audio/video, wireless display, wireless printing, Coexists with other wireless protocols

ZigBee Based on (and building on) 802.15.4 Designed for home automation, low-rate control systems, sensor networks, etc. ZigBee builds a full network stack on top of the 802.15.4 PHY/MAC

Body Area Networks 802.15.6 working group, standardization in prog. Data collection from and control of medical sensors and implanted medical devices Incredibly low power, esp. implanted devices

Visible Light Communication Based on 802.15 WG7 Device-to-device and device-to-infrastructure communication using visible LEDs / sensors 428-750 THz, unregulated, potential for high-rate and lowrate communication

PAN Challenges Most PAN standards specify lower layer (PHY/MAC) functionality for device-to-device communication Higher layer services are not included or needed Security in device-to-device (ad hoc) communications is notoriously difficult Bluetooth security has been a constant struggle How to improve security in ad hoc scenarios?

Case Study: Bluetooth Let's focus on the ubiquitously deployed Bluetooth protocol Almost every smartphone (and most feature phones) have Bluetooth Some people use Bluetooth every day Earpieces, sync, file transfer, etc. Some slides courtesy of L. Zoia and Y. Zhang

Stealth Bluetooth Security Discoverable / non-discoverable modes Connectible / non-connectible modes Frequency hopping 79 channels / bands used for control and data traffic, making it more difficult to eavesdrop or block Authentication & encryption Mode 1: none Mode 2: used only for specific services (e.g., transfer) Mode 3: used for all traffic Mode 4: Secure Simple Pairing service-level security

Bluetooth Threats Surveillance - Blueprinting, bt_audit, redfang, War-nibbling, Bluefish, sdptool, Bluescanner, BTScanner Range extension - BlueSniping, bluetooone, Vera-NG Obfuscation - Bdaddr, hciconfig, Spooftooph Fuzzing - BluePass, Bluetooth Stack Smasher, BlueSmack, Tanya, BlueStab Sniffing - FTS4BT, Merlin, BlueSniff, HCIDump, Wireshark, kismet DoS - Battery exhaustion, signal jamming, BlueSYN, Blueper, BlueJacking, vcardblaster Malware - BlueBag, Caribe, CommWarrior Unauthorized direct data access - Bloover, BlueBug, BlueSnarf, BlueSnarf++, BTCrack, Car Whisperer, HeloMoto, btpincrack MitM - BT-SSP-Printer-MITM, BlueSpooof, bthidproxy

Surveillance Used to acquire specific details about a user / device to assess possible vulnerabilities Blueprinting Uses / tracks the device address, available services, and related information to profile the interface, device, host OS, user, etc.

Range Extension Extending Bluetooth range (possibly against FCC regulations) allows an attacker to work from a distance Bluetooone Attaching a high-gain antenna or directional antenna can extend the range to several km

Attack Obfuscation Attackers can use obfuscation tools to achieve a level of anonymity in launching the attack Spooftooph Tool for automating spoofing or cloning Bluetooth device Name, Class, and Address

Fuzzing Bluetooth packets follow a strict formatting standard Input that doesn't follow the format can cause buffer overflow, unauthorized data access, and application / system failure Bluetooth Stack Smasher and BluePass Tools for crafting, assembling, and sending packets to a target device to test the ability of an app/service to handle standard and non-standard input

Sniffing Sniffing is the process of capturing traffic in transit, just like eavesdropping on a phone call Frontline FTS4BT and LeCroy Merlin Combine specialized hardware and software to monitor Bluetooth traffic Matching the connection's frequency hopping pattern Capturing the data transmitted along that pattern

Denial of Service DoS attacks can target communication channels or any service the device uses, including the processor, memory, disk, battery, and general system availability Blueper Designed to abuse Bluetooth file transfer on select mobile devices Floods the target with file transfer requests

Unauth. Direct Data Access UDDA attacks gather private info by penetrating devices through security loopholes BlueBug Download contacts, call lists, send / read SMS messages, etc. BTCrack Brute-force method for cracking the Bluetooth PIN Milliseconds to crack a 4-digit PIN, several thousand years for a 16-digit PIN

MitM MitM attacks in Bluetooth aim to intercept and control connections, often using obfuscation as an intermediate step Current Bluetooth implementations thwart a wide variety of MitM attack types

Popularity of Bluetooth Security Issues Why do you think all of these Bluetooth threats aren't as well-known as Internet-based attacks? What can an attacker achieve through Bluetooth-based attacks? Even though Bluetooth has been around for a while, its use in mobile devices has highlighted many of the security issues

Bluetooth Defenses Should users be responsible for their own security in Bluetooth services / apps? What about chip/radio manufacturers? Input validation testing, disabling unneeded channels, enforcing data format policies, and rigorous testing can certainly help. What about standard/specification groups? Maybe mandate stronger security, two-factor authentication, etc.?

Internet-Style Support for Enhancing PAN Security? One approach to address some of the PAN challenges is to tether to the Internet Ad hoc agreement can include a trusted 3 rd party web server, cloud service, broker, etc. Ex: Bluetooth exchanges using cloud-based key management, ID verification, etc. Hybridization of devices + Internet connectivity allows for a wider variety of services

Tethered PANs Tethering PAN devices to the Internet via some sort of gateway device allows a broader scale of device-to-device communications Ex: Sensor gateways Ex: UbiPAN [Albert et al., 2010] Extends Bluetooth networks using IP and SIP services Exercise for you: read the UbiPAN paper and think about how this helps / hurts PAN security

Other PAN-like Tech WiFi Direct, using SoftAP Sort of a half-way point between WiFi infrastructure and ad hoc modes; devices negotiate to decide which one will take the AP role, and the rest will be clients Supports WPA2 NFC Device-to-device pairing using EM-coupling Based on RFID, so it's completely different from PAN and WiFi standards More on this later.

Sept 23: NFC and Mobile Payment