vulnerability analysis and attacks on nfc-enabled mobile ... · vulnerability analysis and attacks...

22
1 Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones       1 st  IWSS Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones Collin Mulliner Fraunhofer SIT (Darmstadt, Germany) 1st International Workshop on Sensor Security March 2009 Fukuoka, Japan

Upload: others

Post on 26-Jul-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

1Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones

Collin MullinerFraunhofer SIT (Darmstadt, Germany)

1st International Workshop on Sensor SecurityMarch 2009

Fukuoka, Japan

Page 2: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

2Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Near Field Communication (NFC)

● Bidirectional proximity coupling technology– Based on 13,56Mhz RFID ISO14443 and FeliCa

● NFC devices support three modes of operation– PCD (read/write), PICC (card emu),  peer­to­peer

● Standardized data formats on tags– NFC Data Exchange Format (NDEF)

Page 3: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

3Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Introduction

● NFC phones and services are just being introduced into the public (outside of Japan!)

● NFC is designed for payment and ticketing– Security is essential

● Current devices and services use passive tags– Large scale use in the future because of low price– Our work focused on interaction with passive tags

Page 4: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

4Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Contributions

● Methods for vulnerability analysis of NFC­enabled mobile phones

● Developed tools for security testing of NFC mobile phones and NFC­services

● Multiple novel attacks against NFC mobile phones and services

Page 5: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

5Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

An NFC Mobile Phone

● Mobile phone that also integrates NFC­chip and ­antenna and possible a smart card

● NFC­system constantly scans for and reads tags– Tag data is processed by either OS functionality or 

third party application● Third party application can take control of NFC 

functionality for arbitrary use

Page 6: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

6Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

An NFC Mobile Phone

Nokia 6131 NFC

Page 7: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

7Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Analyzing an NFC Mobile Phone

● Interaction with passive tags (NDEF format)– What formats are supported, what can be attacked?

● J2ME NFC API (JSR­257)– Can the API be abused for attacks?

● System components that can be controlled through NFC– Do these components have issues that can be 

abused through the NFC interface?

Page 8: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

8Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

NDEF Security Toolkit

● Flexible implementation of the NDEF standard– Arbitrary modification of format and data

● Tag reading/writing, dumping tools– Immune against malformed data– Test lab version (use with desktop computer)– Mobile phone version for analyzing services

Page 9: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

9Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

NDEF Fuzzing

● Fuzzing is a good choice when testing without access to source code

● Fuzzing procedure required a human operator– Manually moved tag between writer and phone 

● Found multiple vulnerabilities– Tested phone crashes and resets

Page 10: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

10Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

NDEF Smart Poster

● URIs are technical and not suited for the user● Smart Poster allows to display information in 

addition to URI– Human readable text– Image (optional)

URI: sms:+436646606000?body=FahrscheinTitle: Für Fahrscheinkauf (Eur 1,70) jetzt senden!

Page 11: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

11Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Smart Poster URI Spoofing

● Smart Poster display problem– Informational text can be used to prevent the URI 

from being displayed– Text can be used to spoof the URI– Smart Poster details­view can also be manipulated

● Show innocent looking URI to trick user into opening it!

Page 12: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

12Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Smart Poster URI Spoofing Attacks

● Web Browser– Load malicious site (URL not displayed on phones)– Web­based Man­in­the­Middle attack

● Steal credentials or inject malicious content

● Mobile Telephony Service– Premium rate phone call or SMS

Page 13: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

13Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Example: Attacking  the Mobile Telephony Service

Title: Tourist Information\r08005598127634\r\r\r\r\r\r.URI:  tel:0900942234711

Page 14: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

14Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Proof­of­Concept NFC Worm

● Push registry allows registration for plain URI– App can intercept all tag read events for URI tags

● Basic idea: writable tags as transport for worm– Use URI spoofing to hide the worm­install­URL– Exploit phone's web browser vulnerabilities

● Silent/automatic install + ask user to run application

– Spreads by writing URL pointing to itself to tag– Worm is activated by phone reading plain URI tag

Page 15: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

15Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Denial­of­Service Attacks

● Destroy trust relationship between customer and the service provider– Competitor or prankster

● Sticky paper tag on top of service provider tag– Data on tag causes the NFC­phone to crash– Paper tag cannot be linked to crash since it looks 

just like a sticker● Attacks found through fuzzing

Page 16: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

16Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Security of NFC­based Services

● Survey to verify that attacks are practical today– Three services surveyed in Vienna, Austria

● All services only use built­in functionality– No additional software is installed onto user phones

● Survey was conducted using a NFC­phone running our security toolkit applications

Page 17: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

17Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Wiener Linien

● SMS­based ticketing (NDEF Smart Poster)● Phone number can be spoofed

– Victim sends SMS to premium rate number

Page 18: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

18Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Selecta Vending Machines

● Mobile phone payment via SMS● Phone number can be spoofed

– Payment can be redirect to another machine

Page 19: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

19Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Vienna ÖBB Handy­Ticket 

● Link to online ticket shop● URL spoofed for Man­in­the­Middle attack

– Steal credentials or inject malware

Page 20: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

20Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Conclusions

● We showed how NFC mobile phones and services can be analyzed for security– Non­NFC­components also need to be taken into 

account● We introduced a new set of attacks

– Attacks target both phones and services– Attacks can be utilized for fraud, worms, phishing, 

and Denial­of­Service

Page 21: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

21Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Future Work

● Improve fuzzing process through automation● Follow development of NFC

– New devices and features– More complex services

Page 22: Vulnerability Analysis and Attacks on NFC-enabled Mobile ... · Vulnerability Analysis and Attacks on NFCenabled Mobile Phones 1st IWSS Introduction NFC phones and services are just

22Vulnerability Analysis and Attacks on NFC­enabled Mobile Phones       1st IWSS

Questions?

Thank you for your attention!