34 research outputs found
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link
Apple Wireless Direct Link (AWDL) is a proprietary and undocumented wireless
ad hoc protocol that Apple introduced around 2014 and which is the base for
applications such as AirDrop and AirPlay. We have reverse engineered the
protocol and explain its frame format and operation in our MobiCom '18 paper
"One Billion Apples' Secret Sauce: Recipe of the Apple Wireless Direct Link Ad
hoc Protocol." AWDL builds on the IEEE 802.11 standard and implements election,
synchronization, and channel hopping mechanisms on top of it. Furthermore, AWDL
features an IPv6-based data path which enables direct communication. To
validate our own work, we implement a working prototype of AWDL on Linux-based
systems. Our implementation is written in C, runs in userspace, and makes use
of Linux's Netlink API for interactions with the system's networking stack and
the pcap library for frame injection and reception. In our demonstrator, we
show how our Linux system synchronizes to an existing AWDL cluster or takes
over the master role itself. Furthermore, it can receive data frames from and
send them to a MacBook or iPhone via AWDL. We demonstrate the data exchange via
ICMPv6 echo request and replies as well as sending and receiving data over a
TCP connection.Comment: The 24th Annual International Conference on Mobile Computing and
Networking (MobiCom '18
MagicPairing: Apple's Take on Securing Bluetooth Peripherals
Device pairing in large Internet of Things (IoT) deployments is a challenge
for device manufacturers and users. Bluetooth offers a comparably smooth trust
on first use pairing experience. Bluetooth, though, is well-known for security
flaws in the pairing process. In this paper, we analyze how Apple improves the
security of Bluetooth pairing while still maintaining its usability and
specification compliance. The proprietary protocol that resides on top of
Bluetooth is called MagicPairing. It enables the user to pair a device once
with Apple's ecosystem and then seamlessly use it with all their other Apple
devices. We analyze both, the security properties provided by this protocol, as
well as its implementations. In general, MagicPairing could be adapted by other
IoT vendors to improve Bluetooth security. Even though the overall protocol is
well-designed, we identified multiple vulnerabilities within Apple's
implementations with over-the-air and in-process fuzzing
DEMO: BTLEmap: Nmap for Bluetooth Low Energy
The market for Bluetooth Low Energy devices is booming and, at the same time,
has become an attractive target for adversaries. To improve BLE security at
large, we present BTLEmap, an auditing application for BLE environments.
BTLEmap is inspired by network discovery and security auditing tools such as
Nmap for IP-based networks. It allows for device enumeration, GATT service
discovery, and device fingerprinting. It goes even further by integrating a BLE
advertisement dissector, data exporter, and a user-friendly UI, including a
proximity view. BTLEmap currently runs on iOS and macOS using Apple's
CoreBluetooth API but also accepts alternative data inputs such as a Raspberry
Pi to overcome the restricted vendor API. The open-source project is under
active development and will provide more advanced capabilities such as
long-term device tracking (in spite of MAC address randomization) in the
future.Comment: 13th ACM Conference on Security and Privacy in Wireless and Mobile
Network
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol
Apple Wireless Direct Link (AWDL) is a proprietary and undocumented IEEE
802.11-based ad hoc protocol. Apple first introduced AWDL around 2014 and has
since integrated it into its entire product line, including iPhone and Mac.
While we have found that AWDL drives popular applications such as AirPlay and
AirDrop on more than one billion end-user devices, neither the protocol itself
nor potential security and Wi-Fi coexistence issues have been studied. In this
paper, we present the operation of the protocol as the result of binary and
runtime analysis. In short, each AWDL node announces a sequence of Availability
Windows (AWs) indicating its readiness to communicate with other AWDL nodes. An
elected master node synchronizes these sequences. Outside the AWs, nodes can
tune their Wi-Fi radio to a different channel to communicate with an access
point, or could turn it off to save energy. Based on our analysis, we conduct
experiments to study the master election process, synchronization accuracy,
channel hopping dynamics, and achievable throughput. We conduct a preliminary
security assessment and publish an open source Wireshark dissector for AWDL to
nourish future work.Comment: The 24th Annual International Conference on Mobile Computing and
Networking (MobiCom '18
Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System
Overnight, Apple has turned its hundreds-of-million-device ecosystem into the
world's largest crowd-sourced location tracking network called offline finding
(OF). OF leverages online finder devices to detect the presence of missing
offline devices using Bluetooth and report an approximate location back to the
owner via the Internet. While OF is not the first system of its kind, it is the
first to commit to strong privacy goals. In particular, OF aims to ensure
finder anonymity, untrackability of owner devices, and confidentiality of
location reports. This paper presents the first comprehensive security and
privacy analysis of OF. To this end, we recover the specifications of the
closed-source OF protocols by means of reverse engineering. We experimentally
show that unauthorized access to the location reports allows for accurate
device tracking and retrieving a user's top locations with an error in the
order of 10 meters in urban areas. While we find that OF's design achieves its
privacy goals, we discover two distinct design and implementation flaws that
can lead to a location correlation attack and unauthorized access to the
location history of the past seven days, which could deanonymize users. Apple
has partially addressed the issues following our responsible disclosure.
Finally, we make our research artifacts publicly available.Comment: Accepted at Privacy Enhancing Technologies Symposium (PETS) 202
Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System
Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world’s largest crowd-sourced location tracking network called o~ine finding (OF). OF leverages online finder devices to detect the presence of missing o~ine devices using Bluetooth and report an approximate location back to the owner via the Internet. While OF is not the first system of its kind, it is the first to commit to strong privacy goals. In particular, OF aims to ensure finder anonymity, prevent tracking of owner devices, and confidentiality of location reports. This paper presents the first comprehensive security and privacy analysis of OF. To this end, we recover the specifications of the closed-source OF protocols by means of reverse engineering. We experimentally show that unauthorized access to the location reports allows for accurate device tracking and retrieving a user’s top locations with an error in the order of 10 meters in urban areas. While we find that OF’s design achieves its privacy goals, we discover two distinct design and implementation flaws that can lead to a location correlation attack and unauthorized access to the location history of the past seven days, which could deanonymize users. Apple has partially addressed the issues following our responsible disclosure. Finally, we make our research artifacts publicly available
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Apple's offline file-sharing service AirDrop is integrated into more than 1.5 billion end-user devices worldwide. We discovered two design flaws in the underlying protocol that allow attackers to learn the phone numbers and email addresses of both sender and receiver devices. As a remediation, we study the applicability of private set intersection (PSI) to mutual authentication, which is similar to contact discovery in mobile messengers. We propose a novel optimized PSI-based protocol called PrivateDrop that addresses the specific challenges of offline resource-constrained operation and integrates seamlessly into the current AirDrop protocol stack. Using our native PrivateDrop implementation for iOS and macOS, we experimentally demonstrate that PrivateDrop preserves AirDrop's exemplary user experience with an authentication delay well below one second. We responsibly disclosed our findings to Apple and open-sourced our PrivateDrop implementation
DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop
Apple\u27s file-sharing service AirDrop leaks phone numbers and email addresses by exchanging vulnerable hash values of the user\u27s own contact identifiers during the authentication handshake with nearby devices. In a paper presented at USENIX Security\u2721, we theoretically describe two attacks to exploit these vulnerabilities and propose PrivateDrop as a privacy-preserving drop-in replacement for Apple\u27s AirDrop protocol based on private set intersection.
In this demo, we show how these vulnerabilities are efficiently exploitable via Wi-Fi and physical proximity to a target. Privacy and security implications include the possibility of conducting advanced spear phishing attacks or deploying multiple collector devices in order to build databases that map contact identifiers to specific locations. For our proof-of-concept, we leverage a custom rainbow table construction to reverse SHA-256 hashes of phone numbers in a matter of milliseconds. We discuss the trade-off between success rate and storage requirements of the rainbow table and, after following responsible disclosure with Apple, we publish our proof-of-concept implementation as AirCollect on GitHub
Cabbage and fermented vegetables : From death rate heterogeneity in countries to candidates for mitigation strategies of severe COVID-19
Large differences in COVID-19 death rates exist between countries and between regions of the same country. Some very low death rate countries such as Eastern Asia, Central Europe, or the Balkans have a common feature of eating large quantities of fermented foods. Although biases exist when examining ecological studies, fermented vegetables or cabbage have been associated with low death rates in European countries. SARS-CoV-2 binds to its receptor, the angiotensin-converting enzyme 2 (ACE2). As a result of SARS-CoV-2 binding, ACE2 downregulation enhances the angiotensin II receptor type 1 (AT(1)R) axis associated with oxidative stress. This leads to insulin resistance as well as lung and endothelial damage, two severe outcomes of COVID-19. The nuclear factor (erythroid-derived 2)-like 2 (Nrf2) is the most potent antioxidant in humans and can block in particular the AT(1)R axis. Cabbage contains precursors of sulforaphane, the most active natural activator of Nrf2. Fermented vegetables contain many lactobacilli, which are also potent Nrf2 activators. Three examples are: kimchi in Korea, westernized foods, and the slum paradox. It is proposed that fermented cabbage is a proof-of-concept of dietary manipulations that may enhance Nrf2-associated antioxidant effects, helpful in mitigating COVID-19 severity.Peer reviewe