The code that we developed to validate and brute force E0 encryption keys is online.
The slides of my KNOB attack SEC19 talk are also online. As we can see from the slides, the KNOB attack is not conducted while two Bluetooth devices are pairing, but when two devices are connecting (establishing a new encrypted session). Bluetooth (BR/EDR) is a technology with a pair-once connect-multiple-times paradigm. For example, you pair your smartphone with your car once, and then every day you connect the two and the devices negotiate a new (fresh) encryption key.
The embargo is over! The information about The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR, including our research paper, CVE details, and media coverage, are publicly available at knobattack.com
This week I’ve been in San Diego CA for the The Network and Distributed System Security Symposium (NDSS) 2019 conference.
I’ve presented our paper about Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android.
Recently, I’ve accepted the invitation to join the IEEE CPS-SEC workshop TPC. CPS-SEC is co-located with the IEEE CNS conference . From the official website:
The IEEE International Workshop on Cyber-Physical Systems Security (CPS-Sec) will be held in conjunction with the IEEE Conference on Communications and Network Security (CNS) 2019 in Washington, D.C., USA, on 10-12 June, 2019.
The camera-ready version of Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google’s “Nearby Connections” on Android is available here
We also released a proof of concept code to perform the Soft AP manipulation attack. The code was previously disclosed to Google. In summary, the attack allows a malicious Nearby Connections server (advertiser) to redirect a client to a malicious Internet connected access point. As a result the attacker can reconfigure the wireless network interface of the victim via DHCP and gets access to all the Wi-Fi traffic (even traffic from non Nearby Connections applications).
Recently gcushen updated
Academic (the theme that I’m using
to build this website with hugo
)
with two useful features that I recommend to use: day_night
and search
.
day_night
allows the reader to toggle light and dark color themes for the website.
If you look at the top navigation bar on the right you should spot an icon
with either a moon (to switch to a dark theme) or a sun (to switch to a light
theme).
I’m very happy to announce that our paper titled Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google’s “Nearby Connections” on Android has been accepted for the The Network and Distributed System Security Symposium (NDSS). Here you can download a pre-print. Here is the list of accepted papers for NDSS 2019 Soon I’ll update more material such an exploit PoC code.