Attacks Against BLE Devices by Co-located Mobile Applications

08/11/2018
by   Pallavi Sivakumaran, et al.
0

Bluetooth Low Energy (BLE) is a fast-growing wireless technology with a large number of potential use cases, particularly in the IoT domain. With many of these use cases, the BLE device stores sensitive user data or critical device controls, which may be accessed by an augmentative Android or iOS application. Uncontrolled access to such data could violate a user's privacy, cause a device to malfunction, or even endanger lives. The BLE specification aims to solve this with network layer security mechanisms such as pairing and bonding. Unfortunately, this doesn't take into account the fact that many applications may be co-located on the same mobile device, which introduces the possibility of unauthorised applications being able to access and modify sensitive data stored on a BLE device. In this paper, we present an attack in which an unauthorised Android application can access pairing-protected data from a BLE device by exploiting the bonding relationship previously triggered by an authorised application. We discuss possible mitigation strategies, and perform an analysis over 13,500+ BLE-enabled Android applications to identify how many of them implement such strategies to avoid this attack. Our results indicate that over 60 in the form of application-layer security, and that cryptography is sometimes implemented incorrectly in those that do. This implies that the corresponding BLE devices are potentially vulnerable to unauthorised data access by malicious applications.

READ FULL TEXT

page 1

page 11

page 12

research
04/17/2022

BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration

Bluetooth technology has enabled short-range wireless communication for ...
research
12/10/2019

Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning

Demand for smartwatches has taken off in recent years with new models wh...
research
01/31/2022

Security Analysis of Mobile Banking Application in Qatar

This paper discusses the security posture of Android m-banking applicati...
research
10/12/2021

Exploiting Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices

Mobile devices often distribute measurements from a single physical sens...
research
07/07/2018

Nothing But Net: Invading Android User Privacy Using Only Network Access Patterns

We evaluate the power of simple networks side-channels to violate user p...
research
12/17/2013

Rio: A System Solution for Sharing I/O between Mobile Systems

Mobile systems are equipped with a diverse collection of I/O devices, in...
research
08/03/2018

DCert: Find the Leak in Your Pocket

Static data-flow analysis has proven its effectiveness in assessing secu...

Please sign up or login with your details

Forgot password? Click here to reset