Heyden, Martin Reza (2023)
Security Analysis of Samsung's Ultra-Wideband Ecosystem and the Usage of NXP Ultra-Wideband Chips.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024378
Master Thesis, Primary publication, Publisher's Version
Text
Thesis_Martin_Heyden_Final.pdf Copyright Information: CC BY 4.0 International - Creative Commons, Attribution. Download (8MB) |
Item Type: | Master Thesis | ||||
---|---|---|---|---|---|
Type of entry: | Primary publication | ||||
Title: | Security Analysis of Samsung's Ultra-Wideband Ecosystem and the Usage of NXP Ultra-Wideband Chips | ||||
Language: | English | ||||
Referees: | Hollick, Prof. Dr. Matthias ; Classen, Dr. Jiska | ||||
Date: | 2 October 2023 | ||||
Place of Publication: | Darmstadt | ||||
Collation: | xviii, 181 Seiten | ||||
DOI: | 10.26083/tuprints-00024378 | ||||
Abstract: | Ultra-Wideband (UWB) is a radio technology that uses a high bandwidth and enables use-cases for precise position estimation in close ranges. In recent years, UWB functionality found its way into many smartphones and Internet of Things (IoT) products, including devices from Samsung that use UWB chips by NXP. However, neither the security of Samsung’s UWB ecosystem entities nor the usage and communication of the integrated NXP UWB chips were publicly explored yet. Since UWB integration into smartphones and UWB chips for smartphone-related use-cases are new, only a few directly related works exist. These works analyze the chips’ physical-layer security and the integration of UWB into Apple devices, but no work addresses the firmware security of NXP’s UWB chips and the UWB integration into Samsung’s devices. Therefore, in our thesis, we analyze the security of Samsung’s UWB ecosystem entities, including NXP’s SR100T UWB chip featured on the Samsung Galaxy S21 Ultra, which we use as our test phone. We further assess the security of Samsung’s SmartTag+ that features NXP’s SR040 UWB chip and is part of the ecosystem. Our goal is to identify attack vectors and evaluate a selection of them. Furthermore, to aid our analysis and create attacks in our evaluation, we implement several utilities that help us decode the communication with NXP’s UWB chips, attack the SR100T on our Samsung phone independently of the user space, and simulate attacks against the ecosystem’s entities. In our evaluation, we find several vulnerabilities in different ecosystem entities. In addition, our findings about NXP’s UWB chips and their communication protocols provide a foundation for future research that evaluates the security of UWB chips addressable over Ultra-Wideband Command Interface (UCI) as well as the security of their integration. |
||||
Alternative Abstract: |
|
||||
Status: | Publisher's Version | ||||
URN: | urn:nbn:de:tuda-tuprints-243783 | ||||
Classification DDC: | 000 Generalities, computers, information > 004 Computer science | ||||
Divisions: | 20 Department of Computer Science > Sichere Mobile Netze | ||||
Date Deposited: | 02 Oct 2023 12:07 | ||||
Last Modified: | 05 Oct 2023 10:03 | ||||
URI: | https://tuprints.ulb.tu-darmstadt.de/id/eprint/24378 | ||||
PPN: | 512031088 | ||||
Export: |
View Item |