Method Confusion Attack on Bluetooth Pairing
Bluetooth provides encryption, authentication, and integrity protection of its connections. These protection mechanisms require that Bluetooth devices initially establish trust on first use through a process called pairing. Throughout this process, multiple alternative pairing methods are supported....
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1347 |
---|---|
container_issue | |
container_start_page | 1332 |
container_title | |
container_volume | |
creator | von Tschirschnitz, Maximilian Peuckert, Ludwig Franzen, Fabian Grossklags, Jens |
description | Bluetooth provides encryption, authentication, and integrity protection of its connections. These protection mechanisms require that Bluetooth devices initially establish trust on first use through a process called pairing. Throughout this process, multiple alternative pairing methods are supported.In this paper, we describe a design flaw in the pairing mechanism of Bluetooth. This flaw permits two devices to perform pairing using differing methods. While successfully interacting with each other, the devices are not aware of the Method Confusion. We explain how an attacker can cause and abuse this Method Confusion to mount a Method Confusion Attack. In contrast to other attacks targeting the pairing method, our attack applies even in Bluetooth's highest security mode and cannot be mitigated in the protocol. Through the Method Confusion Attack, an adversary can infiltrate the secured connection between the victims and intercept all traffic.Our attack is successful in practically relevant scenarios. We implemented it as an end-to-end Proof of Concept for Bluetooth Low Energy and tested it with off-the-shelf smartphones, a smartwatch and a banking device. Furthermore, we performed a user study where none of the 40 participants noticed the ongoing attack, and 37 (92.5%) of the users completed the pairing process. Finally, we propose changes to the Bluetooth specification that immunize it against our attack. |
doi_str_mv | 10.1109/SP40001.2021.00013 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_RIE</sourceid><recordid>TN_cdi_ieee_primary_9519477</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9519477</ieee_id><sourcerecordid>9519477</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-cc9b9c9f97f6514a3b76ac4eed0d2d11d7dae92a052d74212c3f4b9be63cd1113</originalsourceid><addsrcrecordid>eNotjNFKwzAUQKMguE1_QF_6Aba79yZtdh9ncSpsOFCfR5qkLjobabMH_96KPp0DB44QVwgFIvD8easAAAsCwuLX5ImYoqYFLlgqPhUTkrrMkUCfi-kwvAMQSFYTcbPxaR9dVseuPQ4hdtkyJWM_stFuD0efYkz7bGtCH7q3C3HWmsPgL_85E6-ru5f6IV8_3T_Wy3UexmvKreWGLbes26pEZWSjK2OV9w4cOUSnnfFMBkpyWhGSla1quPGVtGNGORPXf9_gvd999eHT9N87LpGV1vIHw_dBzA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Method Confusion Attack on Bluetooth Pairing</title><source>IEEE Electronic Library (IEL)</source><creator>von Tschirschnitz, Maximilian ; Peuckert, Ludwig ; Franzen, Fabian ; Grossklags, Jens</creator><creatorcontrib>von Tschirschnitz, Maximilian ; Peuckert, Ludwig ; Franzen, Fabian ; Grossklags, Jens</creatorcontrib><description>Bluetooth provides encryption, authentication, and integrity protection of its connections. These protection mechanisms require that Bluetooth devices initially establish trust on first use through a process called pairing. Throughout this process, multiple alternative pairing methods are supported.In this paper, we describe a design flaw in the pairing mechanism of Bluetooth. This flaw permits two devices to perform pairing using differing methods. While successfully interacting with each other, the devices are not aware of the Method Confusion. We explain how an attacker can cause and abuse this Method Confusion to mount a Method Confusion Attack. In contrast to other attacks targeting the pairing method, our attack applies even in Bluetooth's highest security mode and cannot be mitigated in the protocol. Through the Method Confusion Attack, an adversary can infiltrate the secured connection between the victims and intercept all traffic.Our attack is successful in practically relevant scenarios. We implemented it as an end-to-end Proof of Concept for Bluetooth Low Energy and tested it with off-the-shelf smartphones, a smartwatch and a banking device. Furthermore, we performed a user study where none of the 40 participants noticed the ongoing attack, and 37 (92.5%) of the users completed the pairing process. Finally, we propose changes to the Bluetooth specification that immunize it against our attack.</description><identifier>EISSN: 2375-1207</identifier><identifier>EISBN: 1728189349</identifier><identifier>EISBN: 9781728189345</identifier><identifier>DOI: 10.1109/SP40001.2021.00013</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Apple ; Banking ; Bluetooth ; Encryption ; Google ; Method-Confusion ; MitM ; Pairing ; Performance evaluation ; Protocols ; Radio ; Security ; Wireless communication</subject><ispartof>2021 IEEE Symposium on Security and Privacy (SP), 2021, p.1332-1347</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9519477$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,796,23930,23931,25140,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9519477$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>von Tschirschnitz, Maximilian</creatorcontrib><creatorcontrib>Peuckert, Ludwig</creatorcontrib><creatorcontrib>Franzen, Fabian</creatorcontrib><creatorcontrib>Grossklags, Jens</creatorcontrib><title>Method Confusion Attack on Bluetooth Pairing</title><title>2021 IEEE Symposium on Security and Privacy (SP)</title><addtitle>SP</addtitle><description>Bluetooth provides encryption, authentication, and integrity protection of its connections. These protection mechanisms require that Bluetooth devices initially establish trust on first use through a process called pairing. Throughout this process, multiple alternative pairing methods are supported.In this paper, we describe a design flaw in the pairing mechanism of Bluetooth. This flaw permits two devices to perform pairing using differing methods. While successfully interacting with each other, the devices are not aware of the Method Confusion. We explain how an attacker can cause and abuse this Method Confusion to mount a Method Confusion Attack. In contrast to other attacks targeting the pairing method, our attack applies even in Bluetooth's highest security mode and cannot be mitigated in the protocol. Through the Method Confusion Attack, an adversary can infiltrate the secured connection between the victims and intercept all traffic.Our attack is successful in practically relevant scenarios. We implemented it as an end-to-end Proof of Concept for Bluetooth Low Energy and tested it with off-the-shelf smartphones, a smartwatch and a banking device. Furthermore, we performed a user study where none of the 40 participants noticed the ongoing attack, and 37 (92.5%) of the users completed the pairing process. Finally, we propose changes to the Bluetooth specification that immunize it against our attack.</description><subject>Apple</subject><subject>Banking</subject><subject>Bluetooth</subject><subject>Encryption</subject><subject>Google</subject><subject>Method-Confusion</subject><subject>MitM</subject><subject>Pairing</subject><subject>Performance evaluation</subject><subject>Protocols</subject><subject>Radio</subject><subject>Security</subject><subject>Wireless communication</subject><issn>2375-1207</issn><isbn>1728189349</isbn><isbn>9781728189345</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2021</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjNFKwzAUQKMguE1_QF_6Aba79yZtdh9ncSpsOFCfR5qkLjobabMH_96KPp0DB44QVwgFIvD8easAAAsCwuLX5ImYoqYFLlgqPhUTkrrMkUCfi-kwvAMQSFYTcbPxaR9dVseuPQ4hdtkyJWM_stFuD0efYkz7bGtCH7q3C3HWmsPgL_85E6-ru5f6IV8_3T_Wy3UexmvKreWGLbes26pEZWSjK2OV9w4cOUSnnfFMBkpyWhGSla1quPGVtGNGORPXf9_gvd999eHT9N87LpGV1vIHw_dBzA</recordid><startdate>202105</startdate><enddate>202105</enddate><creator>von Tschirschnitz, Maximilian</creator><creator>Peuckert, Ludwig</creator><creator>Franzen, Fabian</creator><creator>Grossklags, Jens</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>202105</creationdate><title>Method Confusion Attack on Bluetooth Pairing</title><author>von Tschirschnitz, Maximilian ; Peuckert, Ludwig ; Franzen, Fabian ; Grossklags, Jens</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-cc9b9c9f97f6514a3b76ac4eed0d2d11d7dae92a052d74212c3f4b9be63cd1113</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Apple</topic><topic>Banking</topic><topic>Bluetooth</topic><topic>Encryption</topic><topic>Google</topic><topic>Method-Confusion</topic><topic>MitM</topic><topic>Pairing</topic><topic>Performance evaluation</topic><topic>Protocols</topic><topic>Radio</topic><topic>Security</topic><topic>Wireless communication</topic><toplevel>online_resources</toplevel><creatorcontrib>von Tschirschnitz, Maximilian</creatorcontrib><creatorcontrib>Peuckert, Ludwig</creatorcontrib><creatorcontrib>Franzen, Fabian</creatorcontrib><creatorcontrib>Grossklags, Jens</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>von Tschirschnitz, Maximilian</au><au>Peuckert, Ludwig</au><au>Franzen, Fabian</au><au>Grossklags, Jens</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Method Confusion Attack on Bluetooth Pairing</atitle><btitle>2021 IEEE Symposium on Security and Privacy (SP)</btitle><stitle>SP</stitle><date>2021-05</date><risdate>2021</risdate><spage>1332</spage><epage>1347</epage><pages>1332-1347</pages><eissn>2375-1207</eissn><eisbn>1728189349</eisbn><eisbn>9781728189345</eisbn><coden>IEEPAD</coden><abstract>Bluetooth provides encryption, authentication, and integrity protection of its connections. These protection mechanisms require that Bluetooth devices initially establish trust on first use through a process called pairing. Throughout this process, multiple alternative pairing methods are supported.In this paper, we describe a design flaw in the pairing mechanism of Bluetooth. This flaw permits two devices to perform pairing using differing methods. While successfully interacting with each other, the devices are not aware of the Method Confusion. We explain how an attacker can cause and abuse this Method Confusion to mount a Method Confusion Attack. In contrast to other attacks targeting the pairing method, our attack applies even in Bluetooth's highest security mode and cannot be mitigated in the protocol. Through the Method Confusion Attack, an adversary can infiltrate the secured connection between the victims and intercept all traffic.Our attack is successful in practically relevant scenarios. We implemented it as an end-to-end Proof of Concept for Bluetooth Low Energy and tested it with off-the-shelf smartphones, a smartwatch and a banking device. Furthermore, we performed a user study where none of the 40 participants noticed the ongoing attack, and 37 (92.5%) of the users completed the pairing process. Finally, we propose changes to the Bluetooth specification that immunize it against our attack.</abstract><pub>IEEE</pub><doi>10.1109/SP40001.2021.00013</doi><tpages>16</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2375-1207 |
ispartof | 2021 IEEE Symposium on Security and Privacy (SP), 2021, p.1332-1347 |
issn | 2375-1207 |
language | eng |
recordid | cdi_ieee_primary_9519477 |
source | IEEE Electronic Library (IEL) |
subjects | Apple Banking Bluetooth Encryption Method-Confusion MitM Pairing Performance evaluation Protocols Radio Security Wireless communication |
title | Method Confusion Attack on Bluetooth Pairing |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T21%3A15%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Method%20Confusion%20Attack%20on%20Bluetooth%20Pairing&rft.btitle=2021%20IEEE%20Symposium%20on%20Security%20and%20Privacy%20(SP)&rft.au=von%20Tschirschnitz,%20Maximilian&rft.date=2021-05&rft.spage=1332&rft.epage=1347&rft.pages=1332-1347&rft.eissn=2375-1207&rft.coden=IEEPAD&rft_id=info:doi/10.1109/SP40001.2021.00013&rft_dat=%3Cieee_RIE%3E9519477%3C/ieee_RIE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1728189349&rft.eisbn_list=9781728189345&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9519477&rfr_iscdi=true |