75
BurnFit: Analyzing and Exploiting Wearable Devices 2015. 08. 21. Dongkwan Kim, Suwan Park, Kibum Choi, and Yongdae Kim Korea Advanced Institute of Science and Technology System Security Lab. WISA 2015

BurnFit: Analyzing and Exploiting Wearable Devices

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: BurnFit: Analyzing and Exploiting Wearable Devices

BurnFit: Analyzing and Exploiting Wearable Devices

2015. 08. 21.Dongkwan Kim, Suwan Park, Kibum Choi, and Yongdae Kim

Korea Advanced Institute of Science and TechnologySystem Security Lab.

WISA 2015

Page 2: BurnFit: Analyzing and Exploiting Wearable Devices

Wearable Devices, a New Threat Increasing demands for wearable devices

– Experts are expecting market share reach $13 billion by 2018

Page 3: BurnFit: Analyzing and Exploiting Wearable Devices

Wearable Devices, a New Threat Increasing demands for wearable devices

– Experts are expecting market share reach $13 billion by 2018

Hacking attempts are increasing!

Page 4: BurnFit: Analyzing and Exploiting Wearable Devices

Wearable Devices, for What? On the rise in personal and business use,

Page 5: BurnFit: Analyzing and Exploiting Wearable Devices

Wearable Devices, for What? On the rise in personal and business use,

– Healthcare & Medical purpose Detecting health disorders

Page 6: BurnFit: Analyzing and Exploiting Wearable Devices

Wearable Devices, for What? On the rise in personal and business use,

– Healthcare & Medical purpose Detecting health disorders

– Professional sports Monitoring activity results Receiving real-time feedback

Page 7: BurnFit: Analyzing and Exploiting Wearable Devices

Wearable Devices, for What? On the rise in personal and business use,

– Healthcare & Medical purpose Detecting health disorders

– Professional sports Monitoring activity results Receiving real-time feedback

– Convenience (Watch)

Page 8: BurnFit: Analyzing and Exploiting Wearable Devices

Wearable Devices, for What? On the rise in personal and business use,

– Healthcare & Medical purpose Detecting health disorders

– Professional sports Monitoring activity results Receiving real-time feedback

– Convenience (Watch)– Fashion or Show-off

Page 9: BurnFit: Analyzing and Exploiting Wearable Devices

Communication Overview

Internet

Wearable Device

Computer

Smartphone

Update Server

Database Server

Page 10: BurnFit: Analyzing and Exploiting Wearable Devices

Communication Overview

Internet

Wearable Device

Computer

Smartphone

Update Server

Database ServerLow powerShort range

Page 11: BurnFit: Analyzing and Exploiting Wearable Devices

Communication Overview

Internet

Wearable Device

Computer

Smartphone

Update Server

Database ServerLow powerShort range

Page 12: BurnFit: Analyzing and Exploiting Wearable Devices

Communication Overview

Internet

Wearable Device

Computer

Smartphone

Update Server

Database ServerLow powerShort range

: Software Gateways

Page 13: BurnFit: Analyzing and Exploiting Wearable Devices

Bluetooth Low Energy (BLE) Bluetooth 4.0, Bluetooth Smart Features

– New PHY and Link layer (for low power)– Same high-level protocols (L2CAP, ATT)– 40 channels in 2.4 GHz– Smartphones, medical/sports/fitness devices

How to exploit– Ubertooth (Ossmann, M., 2012)

– Recover hop interval Sit on data channel and wait

– 6-digit temporary key (TK) takes < 1 sec to crack

5 http://www.blueradios.com/hardware_LE4.0-S2.htmRyan, M., Bluetooth: With low energy comes low security, WOOT 2013

Ubertooth

Page 14: BurnFit: Analyzing and Exploiting Wearable Devices

Communication Overview

Internet

Wearable Device

Computer

Smartphone

Update Server

Database Server

Page 15: BurnFit: Analyzing and Exploiting Wearable Devices

Communication Overview

Internet

Wearable Device

Computer

Smartphone

Update Server

Database Server

Connection to software gateways

Page 16: BurnFit: Analyzing and Exploiting Wearable Devices

Communication Overview

Internet

Wearable Device

Computer

Smartphone

Update Server

Database Server

Page 17: BurnFit: Analyzing and Exploiting Wearable Devices

Communication Overview

Internet

Wearable Device

Computer

Smartphone

Update Server

Database Server

Software gateway updateDevice firmware update

Page 18: BurnFit: Analyzing and Exploiting Wearable Devices

Communication Overview

Internet

Wearable Device

Computer

Smartphone

Update Server

Database Server

Software gateway updateDevice firmware update

Page 19: BurnFit: Analyzing and Exploiting Wearable Devices

Communication Overview

Internet

Wearable Device

Computer

Smartphone

Update Server

Database ServerHealth information

Other private information

Page 20: BurnFit: Analyzing and Exploiting Wearable Devices

Communication Overview

Internet

Wearable Device

Computer

Smartphone

Update Server

Database Server

1

Page 21: BurnFit: Analyzing and Exploiting Wearable Devices

Communication Overview

Internet

Wearable Device

Computer

Smartphone

Update Server

Database Server

1

2

Page 22: BurnFit: Analyzing and Exploiting Wearable Devices

Communication Overview

Internet

Wearable Device

Computer

Smartphone

Update Server

Database Server

13

2

Page 23: BurnFit: Analyzing and Exploiting Wearable Devices

Communication Overview

Internet

Wearable Device

Computer

Smartphone

Update Server

Database Server

134

2

Page 24: BurnFit: Analyzing and Exploiting Wearable Devices

Previous Studies

Internet

Wearable Device

Computer

Smartphone

Update Server

Database Server

13

2

4

Page 25: BurnFit: Analyzing and Exploiting Wearable Devices

Previous Studies

Internet

Wearable Device

Computer

Smartphone

Update Server

Database Server

13

2

4Network traffic Sniffing

Page 26: BurnFit: Analyzing and Exploiting Wearable Devices

Previous Studies

Internet

Wearable Device

Computer

Smartphone

Update Server

Database Server

13

2

4Network traffic Sniffing

BLE traffic sniffing

Page 27: BurnFit: Analyzing and Exploiting Wearable Devices

Previous Studies

Internet

Wearable Device

Computer

Smartphone

Update Server

Database Server

13

2

4Network traffic Sniffing

BLE traffic sniffing

Embedded device analysis

Page 28: BurnFit: Analyzing and Exploiting Wearable Devices

Previous Studies

Internet

Wearable Device

Computer

Smartphone

Update Server

Database Server

13

2

4

Page 29: BurnFit: Analyzing and Exploiting Wearable Devices

Threats & MethodologyUpdate Channel– Malicious software gateway app, device firmware can be installed.

8

1

Page 30: BurnFit: Analyzing and Exploiting Wearable Devices

Threats & MethodologyUpdate Channel– Malicious software gateway app, device firmware can be installed.

Data Channel– User’s private information can be exposed.– Malicious messages can be injected.

8

1

2

Page 31: BurnFit: Analyzing and Exploiting Wearable Devices

Threats & MethodologyUpdate Channel– Malicious software gateway app, device firmware can be installed.

Data Channel– User’s private information can be exposed.– Malicious messages can be injected.

BLE Channel– Health information can be leaked.– Malicious input can disable the device.

8

1

3

2

Page 32: BurnFit: Analyzing and Exploiting Wearable Devices

Threats & MethodologyUpdate Channel– Malicious software gateway app, device firmware can be installed.

Data Channel– User’s private information can be exposed.– Malicious messages can be injected.

BLE Channel– Health information can be leaked.– Malicious input can disable the device.

Device Analysis– An adversary can take over the control of the device.

8

1

3

4

2

Page 33: BurnFit: Analyzing and Exploiting Wearable Devices

Analysis ResultChannel Attacks A-fit B-fit C-fit

Update Channel

No obfuscation on app ● ▲ ●

DNS spoofing ● ● ●

App substitution ● X ●

Firmware substitution X X ●

Data Channel Plaintext data transfer ● X X

BLE ChannelSniffing ● ● -

Plaintext data transfer ● ● -

Device Analysis

No obfuscation on firmware X X ●

Hidden function X X ●

Hidden protocol X X ●

Hardare debug point X X X

Page 34: BurnFit: Analyzing and Exploiting Wearable Devices

Update Channel – A-Fit

10

Page 35: BurnFit: Analyzing and Exploiting Wearable Devices

Update Channel – A-Fit

10

Check update version

Page 36: BurnFit: Analyzing and Exploiting Wearable Devices

Update Channel – A-Fit

10

Check update version

Download update file

Page 37: BurnFit: Analyzing and Exploiting Wearable Devices

Update Channel – A-Fit

10

Check update version

Download update file

Page 38: BurnFit: Analyzing and Exploiting Wearable Devices

Update Channel – A-Fit

10

Check update version

Download update file

No obfuscation

Page 39: BurnFit: Analyzing and Exploiting Wearable Devices

Update Channel – A-Fit

10

Check update version

Download update file

Hardcoded HTTP URL

No obfuscation

Page 40: BurnFit: Analyzing and Exploiting Wearable Devices

Update Channel – C-Fit

11

Page 41: BurnFit: Analyzing and Exploiting Wearable Devices

Update Channel – C-Fit

11

Check update version

Page 42: BurnFit: Analyzing and Exploiting Wearable Devices

Update Channel – C-Fit

11

Check update version

Download update file

Page 43: BurnFit: Analyzing and Exploiting Wearable Devices

Update Channel – C-Fit

11

Check update version

Download update file

Page 44: BurnFit: Analyzing and Exploiting Wearable Devices

Update Channel – C-Fit

11

Check update version

Download update file

No obfuscation

Page 45: BurnFit: Analyzing and Exploiting Wearable Devices

Data Channel Analysis

12

Page 46: BurnFit: Analyzing and Exploiting Wearable Devices

Data Channel Analysis

12

Base64 encoded data

Page 47: BurnFit: Analyzing and Exploiting Wearable Devices

Data Channel Analysis

12

Base64 encoded data

OS, browser

AgePhone typeHeight

GenderGoal weight

Page 48: BurnFit: Analyzing and Exploiting Wearable Devices

BLE Channel Analysis BLE key brute force attack

– Successfully received BLE packets– No encryption -> possible to map meaning of each byte

13

Page 49: BurnFit: Analyzing and Exploiting Wearable Devices

BLE Channel Analysis BLE key brute force attack

– Successfully received BLE packets– No encryption -> possible to map meaning of each byte

13

No encryptionNo authentication

Page 50: BurnFit: Analyzing and Exploiting Wearable Devices

Device Analysis Hidden function

– Device configuration– Firmware update

Hidden protocol– AT command– Found BOF vuln.– Crashed with ‘Hardware Fault’ message

Page 51: BurnFit: Analyzing and Exploiting Wearable Devices

Exploitation Successfully exploited A-fit and C-fit

Internet

Wearable Device

Computer

Smartphone

Update Server

Download Server

Page 52: BurnFit: Analyzing and Exploiting Wearable Devices

Exploitation Successfully exploited A-fit and C-fit

Internet

Wearable Device

Computer

Smartphone

Update Server

Download Server

Attacker

Page 53: BurnFit: Analyzing and Exploiting Wearable Devices

Exploitation Successfully exploited A-fit and C-fit

Internet

Wearable Device

Computer

Smartphone

Update Server

Download Server

Update Request

Attacker

Page 54: BurnFit: Analyzing and Exploiting Wearable Devices

Exploitation Successfully exploited A-fit and C-fit

Internet

Wearable Device

Computer

Smartphone

Update Server

Download Server

Attacker

Page 55: BurnFit: Analyzing and Exploiting Wearable Devices

Exploitation Successfully exploited A-fit and C-fit

Internet

Wearable Device

Computer

Smartphone

Update Server

Download Server

Attacker

Page 56: BurnFit: Analyzing and Exploiting Wearable Devices

Exploitation Successfully exploited A-fit and C-fit

Internet

Wearable Device

Computer

Smartphone

Update Server

Download Server

Attacker

Page 57: BurnFit: Analyzing and Exploiting Wearable Devices

Demo

16

Page 58: BurnFit: Analyzing and Exploiting Wearable Devices

Failure to Debug Hardware Tried to find hardware debug points, but,

JTAGulator

Logic Analyzer J-link• JTAG• SWD

B-Fit Body

Page 59: BurnFit: Analyzing and Exploiting Wearable Devices

Failure to Debug Hardware Tried to find hardware debug points, but,

JTAGulator

Logic Analyzer J-link• JTAG• SWD

B-Fit Body

Page 60: BurnFit: Analyzing and Exploiting Wearable Devices

Failure to Debug Hardware Tried to find hardware debug points, but,

JTAGulator

Logic Analyzer J-link• JTAG• SWD

B-Fit Body

Page 61: BurnFit: Analyzing and Exploiting Wearable Devices

Failure to Debug Hardware Tried to find hardware debug points, but,

JTAGulator

Logic Analyzer J-link• JTAG• SWD

B-Fit Body

Page 62: BurnFit: Analyzing and Exploiting Wearable Devices

Failure to Debug Hardware Tried to find hardware debug points, but,

JTAGulator

Logic Analyzer J-link• JTAG• SWD

B-Fit Body• Pins were too small• No datasheets for some chips

Page 63: BurnFit: Analyzing and Exploiting Wearable Devices

Secure Device for IoT Devices

18

Page 64: BurnFit: Analyzing and Exploiting Wearable Devices

Secure Device for IoT Devices

18

Page 65: BurnFit: Analyzing and Exploiting Wearable Devices

Secure Device for IoT Devices

18

App as a software gateway

Page 66: BurnFit: Analyzing and Exploiting Wearable Devices

Secure Device for IoT Devices

18

App as a software gateway

Page 67: BurnFit: Analyzing and Exploiting Wearable Devices

Secure Device for IoT Devices If software gateway is compromised, all other IoT devices are in danger.

– Modifying or stealing user data are possible.– Adversaries can send malicious commands.

18

App as a software gateway

Page 68: BurnFit: Analyzing and Exploiting Wearable Devices

Secure Device for IoT Devices If software gateway is compromised, all other IoT devices are in danger.

– Modifying or stealing user data are possible.– Adversaries can send malicious commands.

Even, smartphone itself have multiple vulnerabilities.– Compromised smartphone can manipulate all IoT devices.

18

App as a software gateway

Page 69: BurnFit: Analyzing and Exploiting Wearable Devices

Countermeasure For communication

– Use SSL/TLS with proper certificate verification– Encryption before data transmission

Page 70: BurnFit: Analyzing and Exploiting Wearable Devices

Countermeasure For communication

– Use SSL/TLS with proper certificate verification– Encryption before data transmission

For software gateways/devices,– Server authentication– Integrity check before app/firmware update– Use TruztZone/secure-boot for tamper-proof integrity check

Page 71: BurnFit: Analyzing and Exploiting Wearable Devices

Countermeasure For communication

– Use SSL/TLS with proper certificate verification– Encryption before data transmission

For software gateways/devices,– Server authentication– Integrity check before app/firmware update– Use TruztZone/secure-boot for tamper-proof integrity check

For BLE,– Bluetooth 4.2 support secure simple pairing (SSP) to prevent MitM– Need low-power yet continuous update technique– Make devices up-to-date

Page 72: BurnFit: Analyzing and Exploiting Wearable Devices

Conclusion Analyzing rising wearable devices,

– Classified possible attack vectors– Found 17 vulnerabilities from three popular fitness trackers– Successfully exploited two of them

Future work– Designing a secure IoT communication paltform– Implementing automatic vulnerability analysis framework for embedded

devices

Page 73: BurnFit: Analyzing and Exploiting Wearable Devices

Conclusion Analyzing rising wearable devices,

– Classified possible attack vectors– Found 17 vulnerabilities from three popular fitness trackers– Successfully exploited two of them– Emphasized the necessity for secure design of IoT devices

Future work– Designing a secure IoT communication paltform– Implementing automatic vulnerability analysis framework for embedded

devices

Page 74: BurnFit: Analyzing and Exploiting Wearable Devices

Conclusion Analyzing rising wearable devices,

– Classified possible attack vectors– Found 17 vulnerabilities from three popular fitness trackers– Successfully exploited two of them– Emphasized the necessity for secure design of IoT devices

Future work– Designing a secure IoT communication paltform– Implementing automatic vulnerability analysis framework for embedded

devices

Software gateways should be investigated seriously(Not only its usability, but also its security)