wi-fly?: detecting privacy invasion attacks by consumer...

41
Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones Simon Birnbach, Richard Baker, Ivan Martinovic 2017 NDSS

Upload: others

Post on 13-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones

Simon Birnbach, Richard Baker, Ivan Martinovic

2017 NDSS

Page 2: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 2

Let’s Talk About Drones

Page 3: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 2

Let’s Talk About Drones

Page 4: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 2

Let’s Talk About Drones

Page 5: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 2

Let’s Talk About Drones

Page 6: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 2

Let’s Talk About Drones

$399

Page 7: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 3

Why Should We Care?■ Ignore physical access restrictions ■ High-quality camera equipment ■ Spy tools in the hands of everybody ■ Privacy invasions by drones get more common

Page 8: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 4

Privacy invasion attacks

Page 9: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS

■ Various approaches Optical sensors Acoustic cameras High-frequency radar

■ Expensive hardware needed ■ Goal: Design cheap detection system

Radio Frequency

$3768

$$$

5

How to Detect?

Page 10: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 6

Adversary Model■ Unmodified consumer drone

Controlled over WiFi Streams live video

■ Objective:Capture video through window

Line-of-Sight (LOS) to window needed ■ No direct access to premises

dl

ds

OutsideInside

dl: Launch distance ds: Surveillance distance

Page 11: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 7

General Idea■ Off-the-shelf WiFi receiver ■ Placement in window

Guarantees LOS ■ Access restrictions

Drone starts further away Forces attacker to fly higher

■ Challenges Received signal strength (RSS)! noisy data Unknown flight behavior Early detection

dl

ds

OutsideInside

dl: Launch distance ds: Surveillance distance

Page 12: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 8

System Overview■ Pre-processing ■ Statistical tests

Presence ! Drone nearby

■ Attack analysis Attack phases! Approach! Surveillance! Escape Proximity! Closeness to window

Page 13: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 9

Pre-Processing

Page 14: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 10

Statistical Tests

Page 15: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 11

Statistical Tests

Attacker has to: …overcome physical access restrictions ! Drone is flying high above ground …establish LOS to the window ! changes of multipath effects ! we expect far less multipath effects due to strong LOS component (compared with ground-based transmitters)

Receiver Drone

Page 16: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 11

Statistical Tests

Attacker has to: …overcome physical access restrictions ! Drone is flying high above ground …establish LOS to the window ! changes of multipath effects ! we expect far less multipath effects due to strong LOS component (compared with ground-based transmitters)

Receiver

Ground-basedtransmitter

Page 17: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 12

Statistical Tests

Attacker has to: …overcome physical access restrictions ! Drone is flying high above ground …establish LOS to the window ! changes of multipath effects ! we expect far less multipath effects due to strong LOS component (compared with ground-based transmitters) …move towards the window ! RSS increases as drone approaches

■ Detection method based on statistical tests: Testing for flying: Closer to free-space propagation than non-flying transmitters Testing for approaching & movement: significant RSS changes as distance to receiver varies

Page 18: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 13

Statistical Tests■ Free-space propagation (FSP)

RSS depends on distance and receiver noise Only noise varies in short time frame ws (<0.1s)

■ Movement More distance variation than noise in longer interval wl (>1s)

■ Compute standard deviation of RSS measurements ■ Noise threshold t

Derived from background noise

Page 19: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 14

Statistical Tests

Page 20: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 14

Statistical Tests

Noise threshold

Page 21: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 14

Statistical Tests

FSP test

Page 22: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 14

Statistical Tests

Movementtest

Page 23: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 15

Attack Analysis

Page 24: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 16

Attack Analysis■ Approach detection

Increase in RSS difference shows drone is approaching ■ Proximity alert

User gets warned if RSS difference exceeds threshold

Page 25: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 17

System Output

Page 26: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 18

Experiment Setup■ Executed in secluded farmhouse ■ Drones: DJI Phantom 3 Standard, Parrot Bebop ■ Receiver: Raspberry Pi with WiPi stick mounted in window

Page 27: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 18

Experiment Setup■ Executed in secluded farmhouse ■ Drones: DJI Phantom 3 Standard, Parrot Bebop ■ Receiver: Raspberry Pi with WiPi stick mounted in window

$40

Page 28: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 19

System Challenges

Normal behavior

Erraticapproach

Not constantlyapproaching

EstablishesLOS very late

Page 29: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 19

System Challenges

Page 30: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20

Straight Approach

Page 31: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20

Straight Approach

Page 32: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20

Straight Approach

Page 33: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20

Straight Approach

FSP test

Page 34: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20

Straight Approach

Movementtest

Page 35: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20

Straight Approach

Noise threshold

Page 36: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20

Straight Approach

Launch

Page 37: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20

Straight Approach

Approach

Page 38: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20

Straight Approach

Surveillance

Page 39: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20

Straight Approach

Escape

Page 40: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 21

Detection Distances

Page 41: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,

Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 22

Conclusion■ Developed method to detect drone privacy invasions ■ Implemented on cheap hardware ■ Real-world experiment with variety of approach patterns

shows feasibility ■ Good performance, minimal detection distance 48m

Thank you for your attention!

Questions?

[email protected]