Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2939918.2939921acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article
Open access

Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4

Published: 18 July 2016 Publication History
  • Get Citation Alerts
  • Abstract

    IEEE 802.15.4 is widely used as lower layers for not only wellknown wireless communication standards such as ZigBee, 6LoWPAN, and WirelessHART, but also customized protocols developed by manufacturers, particularly for various Internet of Things (IoT) devices. Customized protocols are not usually publicly disclosed nor standardized. Moreover, unlike textual protocols (e.g., HTTP, SMTP, POP3.), customized protocols for IoT devices provide no clues such as strings or keywords that are useful for analysis. Instead, they use bits or bytes to represent header and body information in order to save power and bandwidth. On the other hand, they often do not employ encryption, fragmentation, or authentication to save cost and effort in implementations. In other words, their security relies only on the confidentiality of the protocol itself.
    In this paper, we introduce a novel methodology to analyze and reconstruct unknown wireless customized protocols over IEEE 802.15.4. Based on this methodology, we develop an automatic analysis and spoofing tool called WPAN automatic spoofer (WASp) that can be used to understand and reconstruct customized protocols to byte-level accuracy, and to generate packets that can be used for verification of analysis results or spoofing attacks. The methodology consists of four phases: packet collection, packet grouping, protocol analysis, and packet generation. Except for the packet collection step, all steps are fully automated.
    Although the use of customized protocols is also unknown before the collecting phase, we choose two real-world target systems for evaluation: the smart plug system and platform screen door (PSD) to evaluate our methodology and WASp. In the evaluation, 7,299 and 217 packets are used as datasets for both target systems, respectively. As a result, on average, WASp is found to reduce entropy of legitimate message space by 93.77% and 88.11% for customized protocols used in smart plug and PSD systems, respectively. In addition, on average, 48.19% of automatically generated packets are successfully spoofed for the first target systems.

    References

    [1]
    J. Antunes, N. Neves, and P. Verissimo. Reverse Engineering of Protocols from Network Traces. In Proceedings of the 18th Working Conference on Reverse Engineering (WCRE), Limerick, Ireland, Oct. 2011.
    [2]
    I. Bermudez, A. Tongaonkar, M. Iliofotou, M. Mellia, and M. M. Munafo. Automatic Protocol Field Inference for Deeper Protocol Understanding. In Proceedings of the 14th IFIP Networking Conference (NETWORKING), Toulouse, France, May 2015.
    [3]
    B. Bloessl, C. Leitner, F. Dressler, and C. Sommer. A GNU Radio-based IEEE 802.15. 4 Testbed. 12. GI/ITG FACHGESPRÄCH SENSORNETZE, 2013.
    [4]
    G. Bossert, F. Guihéry, and G. Hiet. Towards Automated Protocol Reverse Engineering Using Semantic Information. In Proceedings of the 9th ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS), Kyoto, Japan, June 2014.
    [5]
    J. Caballero, P. Poosankam, C. Kreibich, and D. Song. Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), Chicago, Illinois, Nov. 2009.
    [6]
    J. Caballero, H. Yin, Z. Liang, and D. Song. Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, Oct.--Nov. 2007.
    [7]
    P. M. Comparetti, G. Wondracek, C. Kruegel, and E. Kirda. Prospex: Protocol Specification Extraction. In Proceedings of the 30th IEEE Symposium on Security and Privacy (Oakland), Oakland, CA, May 2009.
    [8]
    W. Cui, J. Kannan, and H. J. Wang. Discoverer: Automatic Protocol Reverse Engineering from Network Traces. In Proceedings of the 16th Usenix Security Symposium (Security), Boston, MA, Aug. 2007.
    [9]
    W. Cui, V. Paxson, N. C. Weaver, and R. H. Katz. Protocol-Independent Adaptive Replay of Application Dialog. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2006.
    [10]
    W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irun-Briz. Tupni: Automatic Reverse Engineering of Input Formats. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, Oct.--Nov. 2008.
    [11]
    Ettus Research. USRP N2x0 Series Device Manual. http://files.ettus.com/manual/page_usrp2.html. {Online; accessed 12-March-2016}.
    [12]
    Gerald Combs and others. Wireshark. https://www.wireshark.org/. {Online; accessed 12-March-2016}.
    [13]
    S. Gorbunov and A. Rosenbloom. AutoFuzz: Automated Network Protocol Fuzzing Framework. IJCSNS, 10(8):239, 2010.
    [14]
    Q. Huang, P. P. C. Lee, and Z. Zhang. Exploiting Intra-Packet Dependency for Fine-Grained Protocol Format Inference. In Proceedings of the 14th IFIP Networking Conference (NETWORKING), Toulouse, France, May 2015.
    [15]
    IEEE Computer Society. IEEE Standard for Local and metropolitan area networks - Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs), 2011.
    [16]
    T. Kitagawa, M. Hanaoka, and K. Kono. AspFuzz: A State-aware Protocol Fuzzer based on Application-layer Protocols. In Proceedings of the 15th IEEE symposium on Computers and Communications (ISCC), Riccione, Italy, June 2010.
    [17]
    Z. Lin, X. Jiang, D. Xu, and X. Zhang. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2008.
    [18]
    C. Năvălici. PyCRC 1.21-Python CRC Calculations Modules. https://pypi.python.org/pypi/PyCRC, 2015. {Online; accessed 12-March-2016}.
    [19]
    C. Rossow and C. J. Dietrich. ProVex: Detecting Botnets with Encrypted Command and Control Channels. In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 2013.
    [20]
    A. Tongaonkar, R. Keralapura, and A. Nucci. SANTaClass: A Self Adaptive Network Traffic Classification System. In Proceedings of the 12th IFIP Networking Conference (NETWORKING), Brooklyn, NY, May 2013.
    [21]
    P. Tsankov, M. T. Dashti, and D. Basin. SecFuzz: Fuzz-testing Security Protocols. In Proceedings of the 7th International Workshop on Automation of Software Test (AST), Zurich, Switzerland, June 2012.
    [22]
    Y. Wang, X. Yun, M. Z. Shafiq, L. Wang, A. X. Liu, Z. Zhang, D. Yao, Y. Zhang, and L. Guo. A Semantics Aware Approach to Automated Reverse Engineering Unknown Protocols. In Proceedings of the 20th IEEE International Conference on Network Protocols (ICNP), Austin, TX, Oct.--Nov. 2012.
    [23]
    Z. Wang, X. Jiang, W. Cui, X. Wang, and M. Grace. ReFormat: Automatic Reverse Engineering of Encrypted Messages. In Proceedings of the 14th European Symposium on Research in Computer Security, Saint Malo, France, Sept. 2009.
    [24]
    J. Wright. KillerBee. https://code.google.com/p/killerbee/. {Online; accessed 12-March-2016}.
    [25]
    Z. Zhang, Z. Zhang, P. P. C. Lee, Y. Liu, and G. Xie. ProWord: An Unsupervised Approach to Protocol FeatureWord Extraction. In Proceedings of the 33rd IEEE International Conference on Computer Communications (INFOCOM), Toronto, Canada, Apr. 2014.
    [26]
    J. Zhao, S. Chen, S. Liang, B. Cui, and X. Song. RFSM: A Smart Fuzzing Algorithm Based on Regression FSM. In Proceedings of the 8th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Compiegne, France, Oct. 2013.

    Cited By

    View all
    • (2023)SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network TrafficProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627179(310-323)Online publication date: 4-Dec-2023
    • (2022)Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis基于动态污点分析的工业控制系统协议自动逆向工程分析Frontiers of Information Technology & Electronic Engineering10.1631/FITEE.200070923:3(351-360)Online publication date: 26-Mar-2022
    • (2022)IntroductionSecurity in Smart Home Networks10.1007/978-3-031-24185-7_1(1-20)Online publication date: 1-Dec-2022
    • Show More Cited By

    Index Terms

    1. Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks
      July 2016
      242 pages
      ISBN:9781450342704
      DOI:10.1145/2939918
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 18 July 2016

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. automatic protocol reversing
      2. customized pan protocol
      3. wireless spoofing attacks

      Qualifiers

      • Research-article

      Funding Sources

      • National Research Foundation of Korea (NRF)

      Conference

      WiSec'16
      Sponsor:

      Acceptance Rates

      WiSec '16 Paper Acceptance Rate 13 of 51 submissions, 25%;
      Overall Acceptance Rate 98 of 338 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)87
      • Downloads (Last 6 weeks)3

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network TrafficProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627179(310-323)Online publication date: 4-Dec-2023
      • (2022)Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis基于动态污点分析的工业控制系统协议自动逆向工程分析Frontiers of Information Technology & Electronic Engineering10.1631/FITEE.200070923:3(351-360)Online publication date: 26-Mar-2022
      • (2022)IntroductionSecurity in Smart Home Networks10.1007/978-3-031-24185-7_1(1-20)Online publication date: 1-Dec-2022
      • (2021)Scrutinizing Implementations of Smart Home IntegrationsIEEE Transactions on Software Engineering10.1109/TSE.2019.296069047:12(2667-2683)Online publication date: 1-Dec-2021
      • (2021)Protocol Reverse-Engineering Methods and ToolsComputer Communications10.1016/j.comcom.2021.11.009182:C(238-254)Online publication date: 29-Dec-2021
      • (2020)An Automatic Protocol Reverse Engineering Approach from the Viewpoint of the TCP/IP Reference Model2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)10.23919/APNOMS50412.2020.9236959(43-48)Online publication date: Sep-2020
      • (2019)Automatic wireless protocol reverse engineeringProceedings of the 13th USENIX Conference on Offensive Technologies10.5555/3359043.3359059(16-16)Online publication date: 12-Aug-2019
      • (2018)A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs ViewSecurity and Communication Networks10.1155/2018/83703412018Online publication date: 20-Feb-2018
      • (2018)Unsupervised Time Series Extraction from Controller Area Network Payloads2018 IEEE 88th Vehicular Technology Conference (VTC-Fall)10.1109/VTCFall.2018.8690615(1-5)Online publication date: Aug-2018
      • (2018)Securing Consumer IoT in the Smart HomeIEEE Wireless Communications10.1109/MWC.2017.180010025:6(53-59)Online publication date: 1-Dec-2018
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media