Logo des Repositoriums
  • English
  • Deutsch
Anmelden
Keine TU-ID? Klicken Sie hier für mehr Informationen.
  1. Startseite
  2. Publikationen
  3. Publikationen der Technischen Universität Darmstadt
  4. Zweitveröffentlichungen
  5. Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi
 
  • Details
2022
Zweitveröffentlichung
Konferenzveröffentlichung
Verlagsversion

Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi

File(s)
Download

sec21_slides_stute-milan.pdf
CC BY 4.0 International
Format: Adobe PDF
Size: 3.65 MB
Download

sec21-stute.pdf
CC BY 4.0 International
Format: Adobe PDF
Size: 6.26 MB
TUDa URI
tuda/8120
URN
urn:nbn:de:tuda-tuprints-206039
DOI
10.26083/tuprints-00020603
Autor:innen
Stute, Milan ORCID 0000-0003-4921-8476
Heinrich, Alexander ORCID 0000-0002-1150-1922
Lorenz, Jannik
Hollick, Matthias ORCID 0000-0002-9163-5989
Kurzbeschreibung (Abstract)

Apple controls one of the largest mobile ecosystems, with 1.5 billion active devices worldwide, and offers twelve proprietary wireless Continuity services. Previous works have unveiled several security and privacy issues in the involved protocols. These works extensively studied AirDrop while the coverage of the remaining vast Continuity service space is still low. To facilitate the cumbersome reverse-engineering process, we describe the first guide on how to approach a structured analysis of the involved protocols using several vantage points available on macOS. Also, we develop a toolkit to automate parts of this otherwise manual process. Based on this guide, we analyze the full protocol stacks involved in three Continuity services, in particular, Handoff (HO), Universal Clipboard (UC), and Wi-Fi Password Sharing (PWS). We discover several vulnerabilities spanning from Bluetooth Low Energy (BLE) advertisements to Apple's proprietary authentication protocols. These flaws allow for device tracking via HO's mDNS responses, a denial-of-service (DoS) attack on HO and UC, a DoS attack on PWS that prevents Wi-Fi password entry, and a machine-in-the-middle (MitM) attack on PWS that connects a target to an attacker-controlled Wi-Fi network. Our PoC implementations demonstrate that the attacks can be mounted using affordable off-the-shelf hardware ($20 micro:bit and a Wi-Fi card). Finally, we suggest practical mitigations and share our findings with Apple, who have started to release fixes through iOS and macOS updates.

Sprache
Englisch
Fachbereich/-gebiet
20 Fachbereich Informatik > Sichere Mobile Netze
Forschungsprojekte und Grants
LOEWE > LOEWE-Zentren > emergenCITY
Forschungs- und xchange Profil
Profilbereiche > Cybersicherheit (CYSEC)
DDC
000 Allgemeines, Informatik, Informationswissenschaft > 004 Informatik
Institution
Universitäts- und Landesbibliothek Darmstadt
Ort
Darmstadt
Veranstaltungstitel
30th USENIX Security Symposium (USENIX Security 21)
Veranstaltungsort
Virtual event
Startdatum der Veranstaltung
11.08.2021
Enddatum der Veranstaltung
13.08.2021
Buchtitel
Proceedings of the 30th USENIX Security Symposium
Startseite
3917
Endseite
3934
ISBN
978-1-939133-24-3
Verlag
USENIX Association
Publikationsjahr der Erstveröffentlichung
2022
PPN
496563394
Zusätzliche Infomationen
Presentation: 27 slides
Zusätzliche Links (Organisation)
https://www.usenix.org/conference/usenixsecurity21

  • TUprints Leitlinien
  • Cookie-Einstellungen
  • Impressum
  • Datenschutzbestimmungen
  • Webseitenanalyse
Diese Webseite wird von der Universitäts- und Landesbibliothek Darmstadt (ULB) betrieben.