+ All Categories
Home > Documents > Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren ([email protected])...

Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren ([email protected])...

Date post: 05-Aug-2020
Category:
Upload: others
View: 4 times
Download: 0 times
Share this document with a friend
27
Omer Shwartz ([email protected]) Amir Cohen ([email protected]) Dr. Asaf Shabtai ([email protected]) Dr. Yossi Oren ([email protected]) Ben-Gurion University of the Negev, Israel 1
Transcript
Page 1: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Omer Shwartz ([email protected])Amir Cohen ([email protected])Dr. Asaf Shabtai ([email protected])Dr. Yossi Oren ([email protected])

Ben-Gurion University of the Negev, Israel

1

Page 2: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Overview ● Motivation● Attack surface● Vulnerability discovery and demo● Discussion, conclusions and

questions

2

Page 3: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Motivation

3

Page 4: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Motivation ● Smartphone components often break.● Many replacements are counterfeit.● “Street corner phone repair shops”

available everywhere.

Image from: Wikimedia 4

Page 5: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Research Question

What if a smartphone peripheral was malicious?

Could it attack the stock driver?

Would it affect the user’s privacy?

5

Page 6: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Attack model

6

Page 7: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Attack surface survey

Shwartz, O., Shitrit, G., Shabtai, A., Oren, Y. (2017) “From smashed screens to smashed stacks: Attacking mobile phones using malicious aftermarket parts”, Workshop on Security for Embedded and Mobile Systems (SEMS 2017).

7

Page 8: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Attack surface survey

● We started by doing a semi-automated analysis of the source code of 26 android smartphones.

● Drivers were catalogued to vendor and version.

● 89 different driver versions were evaluated.

8

Page 9: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Peripheral diversity

9

Page 10: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Attack surface survey results

● Only three drivers were used in two phone models.

● Only two drivers were used on three or more phone models.

● Most of the drivers were unique to their respective device.

10

Page 11: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Attack surface survey results

Percentage of Driver related android CVEs is on the rise.

11

Page 12: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Attack surface survey insights

● A codebase that diverse is ought to contain bugs and vulnerabilities.

● Bugs are easy to find (more ahead…)

12

Page 13: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Bug Hunting ● We started looking for device driver bugs that may be exploited by the component.

● In less than two hours (!), we found exploitable buffer and heap overflows in a touchscreen module.

● Further analysis revealed dozens more potential issues in multiple drivers.

● The issues found were reported, acknowledged (CVE-2017-0650 ) and patched by Google.

13

Page 14: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Actual Exploitation

14

Page 16: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Workbench

16

Page 17: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

CVE-2017-0650

17

Page 18: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

CVE-2017-0650

18

Get data from device.......

Page 19: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

ARM64 ROP Attack

19

Page 20: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

ARM64 ROP Attack

20

Page 21: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Vulnerabilities ● Vulnerabilities such as CVE-2017-0650 are easy to find!

● Another vulnerability was found in a different touchscreen driver by another manufacturer. This vulnerability was proved in a POC level. (Pending Responsible Disclosure)

21

Page 22: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Touch Logging & Touch Injection

● In addition to exploiting the kernel, the touchscreen can abuse its known capabilities.

● The touchscreen or a component on the touchscreen bus can record user touches.

● Injection of touch events can also be done without any user interaction.

22

Page 23: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Proofs of Concept

● Malicious Software Installationhttps://youtu.be/83VMVrcEOCM

● Take Picture and Send Via Emailhttps://youtu.be/WS4NChPjaaY

● Replace URL with Phishing URLhttps://youtu.be/XZujd42eYek

● Log and Exfiltrate Screen Unlock Patternhttps://youtu.be/fY58zoadqMA

● Complete Phone Compromisehttps://youtu.be/sDfD5fJfiNc

23

Page 25: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Discussion ● In smartphones, device drivers are very diverse, leading to many potential vulnerabilities.

● The device drivers are trusted by the kernel, and the peripherals are trusted by the drivers.

● We showed how a peripheral may exploit that trust.

● Detection of attacks may be impossible with current tools and design.

25

Page 26: Ben-Gurion University of the Negev, Israel Dr. Yossi Oren ... · Dr. Yossi Oren (yos@bgu.ac.il) Ben-Gurion University of the Negev, Israel 1. Overview Motivation Attack surface Vulnerability

Conclusions ● Attacks of this sort are practical and may be highly effective.

● Consumers have no tools to help them detect such attacks.

● Countermeasures, such as a physical interface firewall may prove effective.

● There is much more left to explore in the field of malicious hardware components.

26


Recommended