news

PhD at SUTD Completed!

I'm glad to announce that I've completed my PhD in Computer Science at SUTD about Design, Implementation, and Evaluation of Secure Cyber-Physical and Wireless Systems. I've uploaded my thesis and the slides of my final presentation. For more information have a look here. 🎶 😆 🎶 🎶 😆 🎶

KNOB Attack Add Slave Patch for poc-internalblue

I've pushed the code to perform the KNOB attack also when the Nexus 5 is the Bluetooth slave responding to the first LMP packet. To switch between different attack modes have a look at the updated README. For more information visit knobattack.com

KNOB Attack FAQ

In this post I'm trying to address some discussion points and misconceptions about the KNOB attack. Attribution Researchers from CISPA discovered the KNOB attack Partially true. The KNOB attack was discovered by myself (Daniele Antonioli) from SUTD, Nils Ole Tippenhauer from CISPA, and Kasper Rasmussen from the University of Oxford. In particular, I've identified the vulnerability back in May 2018 while I was working with Kasper on Nearby Connections at the University of Oxford, and I wrote the first exploit in October 2018 while I was visiting Nils (my former advisor at SUTD) at CISPA.

KNOB Attack Code for E0 and Slides from SEC19 are Online

The code that we developed to validate and brute force E0 encryption keys is online. The slides of my KNOB attack SEC19 talk are also online. As we can see from the slides, the KNOB attack is not conducted while two Bluetooth devices are pairing, but when two devices are connecting (establishing a new encrypted session). Bluetooth (BR/EDR) is a technology with a pair-once connect-multiple-times paradigm. For example, you pair your smartphone with your car once, and then every day you connect the two and the devices negotiate a new (fresh) encryption key.

KNOB Attack Repository is Online

Our KNOB repository is online, and it includes our PoC. For more information visit knobattack.com

Key Negotiation Of Bluetooth (KNOB) Attack

The embargo is over! The information about The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR, including our research paper, CVE details, and media coverage, are publicly available at knobattack.com