论文标题

Blewhisperer:利用BLE广告进行数据剥落

BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration

论文作者

Gangwal, Ankit, Singh, Shubham, Spolaor, Riccardo, Srivastava, Abhijeet

论文摘要

蓝牙技术已实现了数十亿个设备的短程无线通信。蓝牙低能(BLE)变体旨在改善电池约束设备的功耗。启用BLE的设备通过广告广播信息(例如,作为信标)通过广告到附近的设备。不幸的是,这种功能可以成为攻击者手中的双刃剑。在本文中,我们主要展示了攻击者如何利用BLE广告来从可启用的设备中渗透信息。特别是,我们的攻击在两个设备之间建立了通信介质,而无需任何事先的身份验证或配对。我们在Android生态系统上开发了概念验证攻击框架,并通过一组彻底的实验评估其性能。我们的结果表明,尽管数据速率有限,但确实可以进行这种渗透攻击。但是,我们还展示了潜在的用例和攻击的增强,可以进一步加剧其严重性。最后,我们讨论了防止这种攻击的可能对策。

Bluetooth technology has enabled short-range wireless communication for billions of devices. Bluetooth Low-Energy (BLE) variant aims at improving power consumption on battery-constrained devices. BLE-enabled devices broadcast information (e.g., as beacons) to nearby devices via advertisements. Unfortunately, such functionality can become a double-edged sword at the hands of attackers. In this paper, we primarily show how an attacker can exploit BLE advertisements to exfiltrate information from BLE-enable devices. In particular, our attack establishes a communication medium between two devices without requiring any prior authentication or pairing. We develop a proof-of-concept attack framework on the Android ecosystem and assess its performance via a thorough set of experiments. Our results indicate that such an exfiltration attack is indeed possible though with a limited data rate. Nevertheless, we also demonstrate potential use cases and enhancements to our attack that can further its severeness. Finally, we discuss possible countermeasures to prevent such an attack.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源