Logo des Repositoriums
  • English
  • Deutsch
Anmelden
Keine TU-ID? Klicken Sie hier für mehr Informationen.
  1. Startseite
  2. Publikationen
  3. Publikationen der Technischen Universität Darmstadt
  4. Zweitveröffentlichungen
  5. A Billion Open Interfaces for Eve and Mallory : MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link
 
  • Details
2019
Zweitveröffentlichung
Konferenzveröffentlichung
Verlagsversion

A Billion Open Interfaces for Eve and Mallory : MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link

File(s)
Download
Hauptpublikation
Stute et al. - 2019 - A Billion Open Interfaces for Eve and Mallory MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wi(2).pdf
CC BY 4.0 International
Format: Adobe PDF
Size: 9.85 MB
TUDa URI
tuda/6032
URN
urn:nbn:de:tuda-tuprints-132644
DOI
10.25534/tuprints-00013264
Autor:innen
Stute, Milan ORCID 0000-0003-4921-8476
Narain, Sashank
Mariotto, Alex
Heinrich, Alexander
Kreitschmann, David
Noubir, Guevara
Hollick, Matthias
Kurzbeschreibung (Abstract)

Apple Wireless Direct Link (AWDL) is a key protocol in Apple's ecosystem used by over one billion iOS and macOS devices for device-to-device communications. AWDL is a proprietary extension of the IEEE 802.11 (Wi-Fi) standard and integrates with Bluetooth Low Energy (BLE) for providing services such as Apple AirDrop. We conduct the first security and privacy analysis of AWDL and its integration with BLE. We uncover several security and privacy vulnerabilities ranging from design flaws to implementation bugs leading to a man-in-the-middle (MitM) attack enabling stealthy modification of files transmitted via AirDrop, denial-of-service (DoS) attacks preventing communication, privacy leaks that enable user identification and long-term tracking undermining MAC address randomization, and DoS attacks enabling targeted or simultaneous crashing of all neighboring devices. The flaws span across AirDrop's BLE discovery mechanism, AWDL synchronization, UI design, and Wi-Fi driver implementation. Our analysis is based on a combination of reverse engineering of protocols and code supported by analyzing patents. We provide proof-of-concept implementations and demonstrate that the attacks can be mounted using a low-cost ($20) micro:bit device and an off-the-shelf Wi-Fi card. We propose practical and effective countermeasures. While Apple was able to issue a fix for a DoS attack vulnerability after our responsible disclosure, the other security and privacy vulnerabilities require the redesign of some of their services.

Sprache
Englisch
Fachbereich/-gebiet
20 Fachbereich Informatik > Sichere Mobile Netze
Forschungsprojekte und Grants
LOEWE > LOEWE-Schwerpunkte > NICER – Vernetzte infrastrukturlose Kooperation zur Krisenbewältigung
LOEWE > LOEWE-Zentren > CRISP - Center for Research in Security and Privacy
Forschungs- und xchange Profil
Profilbereiche > Cybersicherheit (CYSEC)
DDC
000 Allgemeines, Informatik, Informationswissenschaft > 004 Informatik
Institution
Universitäts- und Landesbibliothek Darmstadt
Ort
Darmstadt
Veranstaltungstitel
28th USENIX Security Symposium (USENIX Security 19)
Veranstaltungsort
Santa Clara, USA
Startdatum der Veranstaltung
14.08.2019
Enddatum der Veranstaltung
16.08.2019
Buchtitel
Proceedings of the 28th USENIX Security Symposium
Startseite
37
Endseite
54
ISBN
978-1-939133-06-9
Verlag
USENIX Association
Ort der Erstveröffentlichung
Berkeley, CA
Publikationsjahr der Erstveröffentlichung
2019
PPN
474394581

  • TUprints Leitlinien
  • Cookie-Einstellungen
  • Impressum
  • Datenschutzbestimmungen
  • Webseitenanalyse
Diese Webseite wird von der Universitäts- und Landesbibliothek Darmstadt (ULB) betrieben.