Method Confusion Attack on Bluetooth Pairing

Bluetooth provides encryption, authentication, and integrity protection of its connections. These protection mechanisms require that Bluetooth devices initially establish trust on first use through a process called pairing. Throughout this process, multiple alternative pairing methods are supported....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: von Tschirschnitz, Maximilian, Peuckert, Ludwig, Franzen, Fabian, Grossklags, Jens
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1347
container_issue
container_start_page 1332
container_title
container_volume
creator von Tschirschnitz, Maximilian
Peuckert, Ludwig
Franzen, Fabian
Grossklags, Jens
description Bluetooth provides encryption, authentication, and integrity protection of its connections. These protection mechanisms require that Bluetooth devices initially establish trust on first use through a process called pairing. Throughout this process, multiple alternative pairing methods are supported.In this paper, we describe a design flaw in the pairing mechanism of Bluetooth. This flaw permits two devices to perform pairing using differing methods. While successfully interacting with each other, the devices are not aware of the Method Confusion. We explain how an attacker can cause and abuse this Method Confusion to mount a Method Confusion Attack. In contrast to other attacks targeting the pairing method, our attack applies even in Bluetooth's highest security mode and cannot be mitigated in the protocol. Through the Method Confusion Attack, an adversary can infiltrate the secured connection between the victims and intercept all traffic.Our attack is successful in practically relevant scenarios. We implemented it as an end-to-end Proof of Concept for Bluetooth Low Energy and tested it with off-the-shelf smartphones, a smartwatch and a banking device. Furthermore, we performed a user study where none of the 40 participants noticed the ongoing attack, and 37 (92.5%) of the users completed the pairing process. Finally, we propose changes to the Bluetooth specification that immunize it against our attack.
doi_str_mv 10.1109/SP40001.2021.00013
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_RIE</sourceid><recordid>TN_cdi_ieee_primary_9519477</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9519477</ieee_id><sourcerecordid>9519477</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-cc9b9c9f97f6514a3b76ac4eed0d2d11d7dae92a052d74212c3f4b9be63cd1113</originalsourceid><addsrcrecordid>eNotjNFKwzAUQKMguE1_QF_6Aba79yZtdh9ncSpsOFCfR5qkLjobabMH_96KPp0DB44QVwgFIvD8easAAAsCwuLX5ImYoqYFLlgqPhUTkrrMkUCfi-kwvAMQSFYTcbPxaR9dVseuPQ4hdtkyJWM_stFuD0efYkz7bGtCH7q3C3HWmsPgL_85E6-ru5f6IV8_3T_Wy3UexmvKreWGLbes26pEZWSjK2OV9w4cOUSnnfFMBkpyWhGSla1quPGVtGNGORPXf9_gvd999eHT9N87LpGV1vIHw_dBzA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Method Confusion Attack on Bluetooth Pairing</title><source>IEEE Electronic Library (IEL)</source><creator>von Tschirschnitz, Maximilian ; Peuckert, Ludwig ; Franzen, Fabian ; Grossklags, Jens</creator><creatorcontrib>von Tschirschnitz, Maximilian ; Peuckert, Ludwig ; Franzen, Fabian ; Grossklags, Jens</creatorcontrib><description>Bluetooth provides encryption, authentication, and integrity protection of its connections. These protection mechanisms require that Bluetooth devices initially establish trust on first use through a process called pairing. Throughout this process, multiple alternative pairing methods are supported.In this paper, we describe a design flaw in the pairing mechanism of Bluetooth. This flaw permits two devices to perform pairing using differing methods. While successfully interacting with each other, the devices are not aware of the Method Confusion. We explain how an attacker can cause and abuse this Method Confusion to mount a Method Confusion Attack. In contrast to other attacks targeting the pairing method, our attack applies even in Bluetooth's highest security mode and cannot be mitigated in the protocol. Through the Method Confusion Attack, an adversary can infiltrate the secured connection between the victims and intercept all traffic.Our attack is successful in practically relevant scenarios. We implemented it as an end-to-end Proof of Concept for Bluetooth Low Energy and tested it with off-the-shelf smartphones, a smartwatch and a banking device. Furthermore, we performed a user study where none of the 40 participants noticed the ongoing attack, and 37 (92.5%) of the users completed the pairing process. Finally, we propose changes to the Bluetooth specification that immunize it against our attack.</description><identifier>EISSN: 2375-1207</identifier><identifier>EISBN: 1728189349</identifier><identifier>EISBN: 9781728189345</identifier><identifier>DOI: 10.1109/SP40001.2021.00013</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Apple ; Banking ; Bluetooth ; Encryption ; Google ; Method-Confusion ; MitM ; Pairing ; Performance evaluation ; Protocols ; Radio ; Security ; Wireless communication</subject><ispartof>2021 IEEE Symposium on Security and Privacy (SP), 2021, p.1332-1347</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9519477$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,796,23930,23931,25140,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9519477$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>von Tschirschnitz, Maximilian</creatorcontrib><creatorcontrib>Peuckert, Ludwig</creatorcontrib><creatorcontrib>Franzen, Fabian</creatorcontrib><creatorcontrib>Grossklags, Jens</creatorcontrib><title>Method Confusion Attack on Bluetooth Pairing</title><title>2021 IEEE Symposium on Security and Privacy (SP)</title><addtitle>SP</addtitle><description>Bluetooth provides encryption, authentication, and integrity protection of its connections. These protection mechanisms require that Bluetooth devices initially establish trust on first use through a process called pairing. Throughout this process, multiple alternative pairing methods are supported.In this paper, we describe a design flaw in the pairing mechanism of Bluetooth. This flaw permits two devices to perform pairing using differing methods. While successfully interacting with each other, the devices are not aware of the Method Confusion. We explain how an attacker can cause and abuse this Method Confusion to mount a Method Confusion Attack. In contrast to other attacks targeting the pairing method, our attack applies even in Bluetooth's highest security mode and cannot be mitigated in the protocol. Through the Method Confusion Attack, an adversary can infiltrate the secured connection between the victims and intercept all traffic.Our attack is successful in practically relevant scenarios. We implemented it as an end-to-end Proof of Concept for Bluetooth Low Energy and tested it with off-the-shelf smartphones, a smartwatch and a banking device. Furthermore, we performed a user study where none of the 40 participants noticed the ongoing attack, and 37 (92.5%) of the users completed the pairing process. Finally, we propose changes to the Bluetooth specification that immunize it against our attack.</description><subject>Apple</subject><subject>Banking</subject><subject>Bluetooth</subject><subject>Encryption</subject><subject>Google</subject><subject>Method-Confusion</subject><subject>MitM</subject><subject>Pairing</subject><subject>Performance evaluation</subject><subject>Protocols</subject><subject>Radio</subject><subject>Security</subject><subject>Wireless communication</subject><issn>2375-1207</issn><isbn>1728189349</isbn><isbn>9781728189345</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2021</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjNFKwzAUQKMguE1_QF_6Aba79yZtdh9ncSpsOFCfR5qkLjobabMH_96KPp0DB44QVwgFIvD8easAAAsCwuLX5ImYoqYFLlgqPhUTkrrMkUCfi-kwvAMQSFYTcbPxaR9dVseuPQ4hdtkyJWM_stFuD0efYkz7bGtCH7q3C3HWmsPgL_85E6-ru5f6IV8_3T_Wy3UexmvKreWGLbes26pEZWSjK2OV9w4cOUSnnfFMBkpyWhGSla1quPGVtGNGORPXf9_gvd999eHT9N87LpGV1vIHw_dBzA</recordid><startdate>202105</startdate><enddate>202105</enddate><creator>von Tschirschnitz, Maximilian</creator><creator>Peuckert, Ludwig</creator><creator>Franzen, Fabian</creator><creator>Grossklags, Jens</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>202105</creationdate><title>Method Confusion Attack on Bluetooth Pairing</title><author>von Tschirschnitz, Maximilian ; Peuckert, Ludwig ; Franzen, Fabian ; Grossklags, Jens</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-cc9b9c9f97f6514a3b76ac4eed0d2d11d7dae92a052d74212c3f4b9be63cd1113</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Apple</topic><topic>Banking</topic><topic>Bluetooth</topic><topic>Encryption</topic><topic>Google</topic><topic>Method-Confusion</topic><topic>MitM</topic><topic>Pairing</topic><topic>Performance evaluation</topic><topic>Protocols</topic><topic>Radio</topic><topic>Security</topic><topic>Wireless communication</topic><toplevel>online_resources</toplevel><creatorcontrib>von Tschirschnitz, Maximilian</creatorcontrib><creatorcontrib>Peuckert, Ludwig</creatorcontrib><creatorcontrib>Franzen, Fabian</creatorcontrib><creatorcontrib>Grossklags, Jens</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>von Tschirschnitz, Maximilian</au><au>Peuckert, Ludwig</au><au>Franzen, Fabian</au><au>Grossklags, Jens</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Method Confusion Attack on Bluetooth Pairing</atitle><btitle>2021 IEEE Symposium on Security and Privacy (SP)</btitle><stitle>SP</stitle><date>2021-05</date><risdate>2021</risdate><spage>1332</spage><epage>1347</epage><pages>1332-1347</pages><eissn>2375-1207</eissn><eisbn>1728189349</eisbn><eisbn>9781728189345</eisbn><coden>IEEPAD</coden><abstract>Bluetooth provides encryption, authentication, and integrity protection of its connections. These protection mechanisms require that Bluetooth devices initially establish trust on first use through a process called pairing. Throughout this process, multiple alternative pairing methods are supported.In this paper, we describe a design flaw in the pairing mechanism of Bluetooth. This flaw permits two devices to perform pairing using differing methods. While successfully interacting with each other, the devices are not aware of the Method Confusion. We explain how an attacker can cause and abuse this Method Confusion to mount a Method Confusion Attack. In contrast to other attacks targeting the pairing method, our attack applies even in Bluetooth's highest security mode and cannot be mitigated in the protocol. Through the Method Confusion Attack, an adversary can infiltrate the secured connection between the victims and intercept all traffic.Our attack is successful in practically relevant scenarios. We implemented it as an end-to-end Proof of Concept for Bluetooth Low Energy and tested it with off-the-shelf smartphones, a smartwatch and a banking device. Furthermore, we performed a user study where none of the 40 participants noticed the ongoing attack, and 37 (92.5%) of the users completed the pairing process. Finally, we propose changes to the Bluetooth specification that immunize it against our attack.</abstract><pub>IEEE</pub><doi>10.1109/SP40001.2021.00013</doi><tpages>16</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2375-1207
ispartof 2021 IEEE Symposium on Security and Privacy (SP), 2021, p.1332-1347
issn 2375-1207
language eng
recordid cdi_ieee_primary_9519477
source IEEE Electronic Library (IEL)
subjects Apple
Banking
Bluetooth
Encryption
Google
Method-Confusion
MitM
Pairing
Performance evaluation
Protocols
Radio
Security
Wireless communication
title Method Confusion Attack on Bluetooth Pairing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T21%3A15%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Method%20Confusion%20Attack%20on%20Bluetooth%20Pairing&rft.btitle=2021%20IEEE%20Symposium%20on%20Security%20and%20Privacy%20(SP)&rft.au=von%20Tschirschnitz,%20Maximilian&rft.date=2021-05&rft.spage=1332&rft.epage=1347&rft.pages=1332-1347&rft.eissn=2375-1207&rft.coden=IEEPAD&rft_id=info:doi/10.1109/SP40001.2021.00013&rft_dat=%3Cieee_RIE%3E9519477%3C/ieee_RIE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1728189349&rft.eisbn_list=9781728189345&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9519477&rfr_iscdi=true