Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3488932.3517410acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article
Public Access

PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals

Published: 30 May 2022 Publication History

Abstract

Many IoT devices today talk to each other via Bluetooth Low Energy (BLE), a wireless communication technology often used to exchange data between a paired central and peripheral. These peripheral devices include not only firmware-defined bare-metal peripherals but also mobile application defined peripherals where a mobile app turns a smartphone into a peripheral instead of their usual central role. However, this role reversal increases the attack surface and brings vulnerabilities in bare-metal Bluetooth peripherals to mobile apps where relevant security and privacy have not been well studied. To fill this knowledge gap, this paper presents PeriScope, an automated tool to unveil the security and privacy vulnerabilities at the link layer of app-defined Bluetooth peripherals in the procedures of broadcasting, pairing, and communication by systematically analyzing their companion mobile apps. PeriScope has analyzed 1,160 Bluetooth peripheral apps from Google Play and identified 69.13% of them that broadcast device or personal identifiable information in cleartext, and, in addition, there are 95% pieces of data managed by these apps (e.g., personal health data and digital keys to unlock doors) to exchange with connected devices can be accessed without authentication. Finally, a set of guidelines for secure app-defined Bluetooth peripherals development is also provided.

Supplementary Material

MP4 File (AsiaCCS22-431.mp4)
This video is to present our work, ?PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals?. In this video, I will talk about what is an app-defined Bluetooth peripheral, what are their unique vulnerabilities, and how we design PeriScope to identify these vulnerabilities. I will also show the evaluation results, present the insights, and provide suggestions for the secure app-defined Bluetooth peripheral development.

References

[1]
Mohammad Afaneh. 2020. Bluetooth GATT: How to Design Custom Services & Characteristics. https://www.novelbits.io/bluetooth-gatt-services-characteristics/.
[2]
Nadeem Ahmed, Regio A Michelin, Wanli Xue, Sushmita Ruj, Robert Malaney, Salil S Kanhere, Aruna Seneviratne, Wen Hu, Helge Janicke, and Sanjay K Jha. 2020. A survey of covid-19 contact tracing apps. IEEE Access, Vol. 8 (2020), 134577--134601.
[3]
Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, and Yves Le Traon. 2016. AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Conference on Mining Software Repositories (MSR '16). ACM, New York, NY, USA, 468--471. https://doi.org/10.1145/2901739.2903508
[4]
Apktool. 2022. A tool for reverse engineering 3rd party, closed, binary Android apps. https://ibotpeaches.github.io/Apktool/.
[5]
Apple. 2022. iBeacon. https://developer.apple.com/ibeacon/.
[6]
Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. 2014. Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. Acm Sigplan Notices, Vol. 49, 6 (2014), 259--269.
[7]
Asilentkingdom. 2014. BLE pairing vs. bonding. https://piratecomm.wordpress.com/2014/01/19/ble-pairing-vs-bonding/.
[8]
Johannes K Becker, David Li, and David Starobinski. 2019. Tracking anonymized bluetooth devices. Proceedings on Privacy Enhancing Technologies, Vol. 2019, 3 (2019), 50--65.
[9]
Redjem Bouhenguel, Imad Mahgoub, and Mohammad Ilyas. 2008. Bluetooth security in wearable computing applications. In 2008 international symposium on high capacity optical networks and enabling technologies. IEEE, 182--186.
[10]
Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, and Yan Chen. 2015. EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. In NDSS.
[11]
Guillaume Celosia and Mathieu Cunche. 2019 a. Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute Profile. In Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things.
[12]
Guillaume Celosia and Mathieu Cunche. 2019 b. Saving private addresses: An analysis of privacy issues in the bluetooth-low-energy advertising mechanism. In Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services.
[13]
Hyunghoon Cho, Daphne Ippolito, and Yun William Yu. 2020. Contact tracing mobile apps for COVID-19: Privacy considerations and related trade-offs. arXiv preprint arXiv:2003.11511 (2020).
[14]
Hyunwoo Choi, Jeongmin Kim, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, and Dongsu Han. 2015. Extractocol: Automatic Extraction of Application-level Protocol Behaviors for Android Applications. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication (SIGCOMM '15). ACM, New York, NY, USA, 593--594. https://doi.org/10.1145/2785956.2790003
[15]
Brian Cusack, Bryce Antony, Gerard Ward, and Shaunak Mody. 2017. Assessment of security vulnerabilities in wearable devices. (2017).
[16]
Britt Cyr, Webb Horn, Daniela Miao, and Michael Specter. 2014. Security analysis of wearable fitness devices (fitbit). Massachusets Institute of Technology (2014).
[17]
Aveek K Das, Parth H Pathak, Chen-Nee Chuah, and Prasant Mohapatra. 2016. Uncovering privacy leakage in ble network traffic of wearable fitness trackers. In Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications. ACM, 99--104.
[18]
Dex2jar. 2021. Tools to work with android. dex and java. class files. https://github.com/pxb1988/dex2jar.
[19]
W. Enck, P. Gilbert, B.G. Chun, L.P. Cox, J. Jung, P. McDaniel, and A.N. Sheth. 2010. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI.
[20]
Kassem Fawaz, Kyu-Han Kim, and Kang G Shin. 2016. Protecting privacy of {BLE} device users. In 25th USENIX Security Symposium (USENIX Security 16). 1205--1221.
[21]
Earlence Fernandes, Jaeyeon Jung, and Atul Prakash. 2016. Security analysis of emerging smart home applications. In 2016 IEEE symposium on security and privacy (SP). IEEE, 636--654.
[22]
Daniel Filizzola, S. Fraser, and Nikita Samsonau. 2018. Security Analysis of Bluetooth Technology.
[23]
Google. 2021. BluetoothGattDescriptor. https://developer.android.com/reference/android/bluetooth/BluetoothGattDescriptor.
[24]
Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, and David Wagner. 2016. Smart locks: Lessons for securing commodity internet of things devices. In Proceedings of the 11th ACM on Asia conference on computer and communications security. ACM, 461--472.
[25]
Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, and Elisa Bertino. 2019. Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones. In Proceedings of the 35th Annual Computer Security Applications Conference. 529--543.
[26]
Jinfeng Li and Xinyi Guo. 2020. COVID-19 Contact-tracing Apps: A Survey on the Global Deployment and Challenges. arXiv preprint arXiv:2005.03599 (2020).
[27]
Abner Mendoza and Guofei Gu. 2018. Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies and Vulnerabilities. In Proceedings of the 39th IEEE Symposium on Security and Privacy (SP'18).
[28]
Yuhong Nan, Zhemin Yang, Xiaofeng Wang, Yuan Zhang, Donglai Zhu, and Min Yang. 2018. Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps. In Proceedings of the 2018 Network and Distributed System Security Symposium.
[29]
O'Reilly. 2022. Getting Started with Bluetooth Low Energy. https://www.oreilly.com/library/view/getting-started-with/9781491900550/ch04.html.
[30]
Mike Ryan. 2013. Bluetooth: With Low Energy Comes Low Security. In Proceedings of the 7th USENIX Conference on Offensive Technologies (WOOT'13). USENIX Association, Berkeley, CA, USA, 4-4. http://dl.acm.org/citation.cfm?id=2534748.2534754
[31]
Bluetooth SIG. 2022 a. Bluetooth Pairing Part 4. https://www.bluetooth.com/blog/bluetooth-pairing-part-4/.
[32]
Bluetooth SIG. 2022 b. Company Identifiers. https://www.bluetooth.com/specifications/assigned-numbers/company-identifiers/
[33]
Bluetooth SIG. 2022 c. A Developer's Guide To Bluetooth. https://www.bluetooth.com/blog/a-developers-guide-to-bluetooth/.
[34]
Lucy Simko, Ryan Calo, Franziska Roesner, and Tadayoshi Kohno. 2020. COVID-19 Contact Tracing and Privacy: Studying Opinion and Preferences. arXiv preprint arXiv:2005.06056 (2020).
[35]
Pallavi Sivakumaran and Jorge Blasco. 2018. A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals. In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. ACM, 152--154.
[36]
Pallavi Sivakumaran and Jorge Blasco. 2019. A study of the feasibility of co-located app attacks against BLE and a large-scale analysis of the current application-layer security landscape. In 28th USENIX Security Symposium.
[37]
Da-Zhi Sun, Yi Mu, and Willy Susilo. 2018. Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5. 0 and its countermeasure. Personal and Ubiquitous Computing, Vol. 22, 1 (2018), 55--67.
[38]
Qiang Tang. 2020. Privacy-preserving contact tracing: current solutions and open questions. arXiv preprint arXiv:2004.06818 (2020).
[39]
Bluetooth® Technology. 2020. Blood Pressure Service. https://www.bluetooth.com/xml-viewer/'src=https://www.bluetooth.com/wp-content/uploads/Sitecore-Media-Library/Gatt/Xml/Services/org.bluetooth.service.blood_pressure.xml.
[40]
Dave Jing Tian, Grant Hernandez, Joseph I Choi, Vanessa Frost, Christie Raules, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, et al. 2018.Attention spanned: Comprehensive vulnerability analysis of {AT} commands within the android ecosystem. In 27th {USENIX} Security Symposium (}USENIX} Security 18). 273--290.
[41]
Kevin Townsend. 2014. Introduction to Bluetooth Low Energy. https://learn.adafruit.com/introduction-to-bluetooth-low-energy/gap.
[42]
Michael Veale. 2020. Analysis of the NHSX Contact Tracing App ?isle of Wight'Data Protection Impact Assessment. (2020).
[43]
Nicolas Viennot, Edward Garcia, and Jason Nieh. 2014. A measurement study of google play. In ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '14, Austin, TX, USA - June 16 - 20, 2014. 221--233. https://doi.org/10.1145/2591971.2592003
[44]
Fengguo Wei, Sankardas Roy, Xinming Ou, et al. 2014. Amandroid: A precise and general inter-component data flow analysis framework for security vetting of Android apps. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1329--1341.
[45]
Haohuang Wen, Zhiqiang Lin, and Yinqian Zhang. 2020 a. FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities from Bare-Metal Firmware. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security.
[46]
Haohuang Wen, Qingchuan Zhao, Zhiqiang Lin, Dong Xuan, and Ness Shroff. 2020 b. A Study of the Privacy of COVID-19 Contact Tracing Apps. In International Conference on Security and Privacy in Communication Networks.
[47]
Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Dave Jing Tian, Antonio Bianchi, Mathias Payer, and Dongyan Xu. 2020. {BLESA}: Spoofing Attacks against Reconnections in Bluetooth Low Energy. In 14th {USENIX} Workshop on Offensive Technologies ({WOOT} 20).
[48]
Fenghao Xu, Wenrui Diao, Zhou Li, Jiongyi Chen, and Kehuan Zhang. 2019. BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals. In NDSS.
[49]
Wondimu K Zegeye. 2015. Exploiting Bluetooth low energy pairing vulnerability in telemedicine. In International Telemetering Conference Proceedings. International Foundation for Telemetering.
[50]
Qiaoyang Zhang and Zhiyao Liang. 2017. Security analysis of bluetooth low energy based smart wristbands. In Frontiers of Sensors Technologies (ICFST), 2017 2nd International Conference on. IEEE, 421--425.
[51]
Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, and Xinwen Fu. 2020. Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association. https://www.usenix.org/conference/usenixsecurity20/presentation/zhang-yue
[52]
Qingchuan Zhao, Haohuang Wen, Zhiqiang Lin, Dong Xuan, and Ness Shroff. 2020 a. On the Accuracy of Measured Proximity of Bluetooth-based Contact Tracing Apps. In International Conference on Security and Privacy in Communication Networks.
[53]
Qingchuan Zhao, Chaoshun Zuo, Brendan Dolan-Gavitt, Giancarlo Pellegrino, and Zhiqiang Lin. 2020 b. Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps. In Proceedings of the 2020 IEEE Symposium on Security and Privacy. San Francisco, CA.
[54]
Chaoshun Zuo, Zhiqiang Lin, and Yinqian Zhang. 2019 a. Why Does Your Data Leak? Uncovering the Data Leakage in Cloud From Mobile Apps. In Proceedings of the 2019 IEEE Symposium on Security and Privacy. San Francisco, CA.
[55]
Chaoshun Zuo, Haohuang Wen, Zhiqiang Lin, and Yinqian Zhang. 2019 b. Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security.

Cited By

View all
  • (2023)Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-GuuideProceedings of the 2023 ACM Asia Conference on Computer and Communications Security10.1145/3579856.3595806(1004-1015)Online publication date: 10-Jul-2023
  • (2023)IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App AnalysisProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623211(681-695)Online publication date: 15-Nov-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security
May 2022
1291 pages
ISBN:9781450391405
DOI:10.1145/3488932
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 May 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. bluetooth low energy
  2. iot security
  3. mobile app analysis

Qualifiers

  • Research-article

Funding Sources

Conference

ASIA CCS '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)216
  • Downloads (Last 6 weeks)36
Reflects downloads up to 02 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-GuuideProceedings of the 2023 ACM Asia Conference on Computer and Communications Security10.1145/3579856.3595806(1004-1015)Online publication date: 10-Jul-2023
  • (2023)IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App AnalysisProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623211(681-695)Online publication date: 15-Nov-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media