Don't Bump, Shake on It: the Exploitation of a Popular
Total Page:16
File Type:pdf, Size:1020Kb
Don’t Bump, Shake on It: The Exploitation of a Popular Accelerometer-Based Smart Phone Exchange and Its Secure Replacement Ahren Studer, Timothy Passaro, Lujo Bauer February 10, 2011 CMU-CyLab-11-011 CyLab Carnegie Mellon University Pittsburgh, PA 15213 Don’t Bump, Shake on It: The Exploitation of a Popular Accelerometer-Based Smart Phone Exchange and Its Secure Replacement Ahren Studer Timothy Passaro Lujo Bauer Carnegie Mellon University Abstract people may exchange phone numbers, email addresses, and social network identities or even use their phones to As the capabilities of smartphones increase, users are be- enable the exchange of funds via an online service (e.g., ginning to rely on these mobile and ubiquitous platforms PayPal). During these exchanges, phones typically use to perform more tasks. In addition to traditional com- the wireless channel to perform the majority of the com- puting tasks, people are beginning to use smartphones munication. The wireless channel makes exchanges eas- to interact with people they meet. Often this interac- ier for users since they do not have to carry cables to con- tion begins with an exchange, e.g., of cryptographic keys. nect the phones. However, users are unable to observe Hence, a number of protocols have been developed to fa- the endpoints of wireless communication and without a cilitate this exchange. Unfortunately, those protocols that secure protocol a malicious party can insert themselves provide strong security guarantees often suffer from us- into the exchange as part of a man-in-the-middle (MitM) ability problems, and those that are easy to use may not attack. provide the desired security guarantees. Exchange protocols for smartphones require varying In this work, we highlight the danger of relying levels of user involvement and provide different security on usable-but-perhaps-not-secure protocols by demon- guarantees. The widely deployed Bump [2] and Blue- strating an easy-to-carry-out man-in-the-middle attack tooth pairing [11] protocols represent distant points in the against Bump, the most popular exchange protocol for spectrum of user involvement and security guarantees. smartphones. We then present Shake on It (Shot), a Bump requires users to only perform a simple gesture, new exchange protocol that is both usable and provides but, as we demonstrate, is vulnerable to MitM attacks strong security properties. In Shot, the phones use vi- under realistic conditions. Bluetooth pairing [11] is resis- brators and accelerometers to exchange information in a tant to such attacks, but requires significant user involve- fashion that demonstratively identifies to the users that ment to correctly compare a checksum across phones. the two phones in physical contact are communicating. In the first part of this paper, we highlight the danger The vibrated information allows the phones to authenti- of relying on usable-but-perhaps-not-secure protocols by cate subsequent messages, which are exchanged using a demonstrating a MitM attack against Bump. Bump is server. Our implementation of Shot on DROID smart- the most popular exchange protocol for smartphones1 phones demonstrates that Shot can provide a secure ex- and claims to provide an excellent user experience while change with a similar level of execution time and user ensuring security.2 Due to the simplicity of the opera- effort as Bump. tion, Bump is used in a number of applications. For example, PayPal’s mobile app uses Bump to exchange 1 Introduction account information and send money to nearby friends 1 As the functionality and computing power of smart- Popularity is based on data from http://techcrunch.com/ 2011/01/19/iphone-ipad-top-app-downloads/ and phones increase, users are leveraging these devices to http://www.androidapps.com/ which use download count to perform more of their computing tasks. In addition to tra- determine popularity. According to the Bump blog, over 25 million ditional tasks such as email, gaming, banking, and main- users have installed Bump. 2 taining a schedule, the mobility and ubiquity of smart- According to Bump’s webpage, “With Bump *you* are in control of deciding with whom you share your information. You don’t have to phones allows people to use these devices to establish ad worry about anyone being able to get at your information unless you hoc associations with people they meet. For example, physically bump your phone with theirs.” [2] 1 [20]. Bump’s security is based on the Bump server’s Our analysis and evaluation show that Shot provides a ability to determine what phones are physically inter- secure exchange while requiring the same level of user acting based on the time, location, and the force with effort and execution time as the popular Bump protocol. which the two phones were physically bumped together. When evaluated on the DROID smartphone, Shot was Bump provides a very nice user experience, but is vul- able to reliably complete an exchange in 15.8 seconds, nerable to attack. An attacker may be able to observe on average. when and where users bump their phones together and In summary, this paper offers the following contribu- estimate the force of the bump. Without any secret in- tions: (1) demonstration of an attack on Bump under re- formation to identify the pair of phones to the server, alistic conditions; (2) a description of the Shot exchange an attacker can submit similar information about a bump protocol for smartphones, which leverages an authentic, to the server. When presented with similar information, but not secret, vibrator-to-accelerometer channel; and the server may transfer data between the wrong phones. (3) an implementation of the Shot protocol on a smart- We demonstrate how an attacker under realistic condi- phone. tions can use this approach to launch a MitM attack against Bump. In addition to Bump, other works have 2 Problem Definition also suggested using accelerometers or vibrators and ac- The goal of this work is to provide two people (users celerometers to facilitate an exchange information be- A and B) who meet in person a user-friendly mecha- tween phones [4,5,10,14,17,23]. However, our attack on nism that allows the authentic exchange of information Bump and prior work [9] demonstrate that a physically (A’s information IA and B’s information IB) using their present attacker may be able to violate the secrecy of this phones (PA and PB). After the exchange is complete, channel, requiring a new approach to ensure security. PA will have received IB and PB will have received IA, In the second part of this work, we demonstrate how or PA and PB will both detect with high probability that phones can leverage accelerometer readings to assist in an error has occurred and discard the information. the secure exchange of information while maintaining A user-friendly solution is any exchange that only re- the limited user involvement offered by Bump. We pro- quires limited user involvement and can complete exe- pose Shake on It (Shot), a protocol designed specifi- cution in a reasonable amount of time. The exchange cally for smartphones that requires little user interac- should not require the users to type several bytes worth tion. The novel idea is to use phones’ vibration func- of information into either phone or compare a check- tion and accelerometers as an authentic, but not secret, sum (e.g., a string of hex digits [11, 13, 26], a series of human-observable communication channel. The phones words [8], or a graphical image [15, 21]). User studies leverage data exchanged on this channel to verify data have shown that a redesigned interface [25] or the com- exchanged over the wireless channel. Only when the parison of words or images [12] reduce the number of two phones are in physical contact can they communi- errors, but still require non-negligible user involvement. cate via the vibration to accelerometer channel, provid- The desired level of user involvement is a simple action, ing demonstrative identification to the users of the de- such as a physical gesture, that allows the phone to de- vices exchanging information [1]. If a remote party (one termine the other phone in the exchange. Solutions exist not in physical contact) tries to inject information on the that require the user to take a photograph of the other channel, users will notice the additional vibrations (a po- phone [18], shake the two phones together [4,10,14,17], tential attack) and stop the exchange. Given attackers can or simply point the phones at each other [1], but each eavesdrop on this channel [9], the phones use symmetric solution has drawbacks that negatively impact security and asymmetric cryptography to authenticate exchanged or operation (see Section 9 for a discussion of related information and detect active attacks against the wire- work). Given the wide acceptance of Bump, we consider less channel, without users having to compare any infor- the execution time of a Bump exchange as a reasonable mation. When two people run Shot, they only have to amount of time. Depending on the platform, Bump takes perform three simple tasks: select what data is to be ex- between 9.4 and 37.8 seconds, from starting the applica- changed, hold the phones together until the phones beep tion to receiving the exchanged data. Section 8 has more to indicate completion, and cancel the exchange if they details on the execution time of Bump. feel vibrations from devices other than the two phones. During an exchange, a malicious party M may attempt We argue that Shot occupies a new point on the spec- to inject its own information (IM ) or other data into the trum of exchange protocols, providing greater security exchange such that PA or PB accept something other than comparably convenient protocols, and greater con- than IB or IA, respectively.