
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps Lars Baumgärtner∗, Alexandra Dmitrienkoz, Bernd Freislebeny, Alexander Gruler∗, Jonas Höchst∗y, Joshua Kühlberg∗, Mira Mezini∗, Richard Mitev∗, Markus Miettinen∗, Anel Muhamedagic∗, Thien Duc Nguyen∗, Alvar Penningy, Dermot Pustelnik∗, Filipp Roosz, Ahmad-Reza Sadeghi∗, Michael Schwarzy, Christian Uhly ∗ Technische Universität Darmstadt, Germany E-mail: {baumgaertner, mezini, markus.miettinen, ducthien.nguyen, ahmad.sadeghi}@cs.tu-darmstadt.de y Philipps-Universität Marburg, Germany E-mail: {hoechst, freisleb, penning, schwarzx, uhlc}@informatik.uni-marburg.de z Julius-Maximilians-Universität Würzburg, Germany E-mail: {alexandra.dmitrienko, filipp.roos}@uni-wuerzburg.de Abstract—Google and Apple have jointly provided an API corresponding apps, published in GitHub repositories, or de- for exposure notification in order to implement decentralized ployed in countries such as China, South Korea, Singapore, contract tracing apps using Bluetooth Low Energy, the so-called Taiwan, Austria, Australia, France, Italy, Switzerland, UK, and "Google/Apple Proposal", which we abbreviate by "GAP". We demonstrate that in real-world scenarios the current GAP design Germany. For an overview and a comparison of contact tracing is vulnerable to (i) profiling and possibly de-anonymizing infected apps, we refer to Miettinen et al. [2]. persons, and (ii) relay-based wormhole attacks that basically can Basically, contact tracing apps differ in (a) the technology generate fake contacts with the potential of affecting the accuracy used to measure proximity, and (b) the approach of where and of an app-based contact tracing system. For both types of attack, how contacts are stored and processed. For example, some we have built tools that can easily be used on mobile phones or Raspberry Pis (e.g., Bluetooth sniffers). The goal of our work is approaches are based on tracking the GPS location of partic- to perform a reality check towards possibly providing empirical ipating users [3], [4], while other proposals rely on recording real-world evidence for these two privacy and security risks. We proximity identifiers exchanged by Bluetooth Low Energy hope that our findings provide valuable input for developing (BLE) technology. Location information, e.g., GPS in an urban secure and privacy-preserving digital contact tracing systems. environment, is often inaccurate [5] and mostly useless in Index Terms—contact tracing apps, exposure notification API indoor situations where BLE contact tracing is supposed to show its value: examples are department stores, restaurants, trade fairs, conference venues, concert halls, indoor sports I. INTRODUCTION events, airports, and airplanes. However, Leith and Farrell Caused by coronavirus SARS-CoV-2, the COVID-19 dis- [6]–[8] indicate that BLE received signal strength can vary ease spreads particularly through direct contact between peo- substantially depending on the relative orientation of handsets, ple. Health authorities face the challenge of identifying and on absorption by the human body, reflection/absorption of isolating infection chains to prevent the pandemic from spread- radio signals in buildings, busses, and trams. In particular, the ing further. This task usually involves manual effort and relies authors demonstrate that BLE signal strength in a bus can be on contact information that is voluntarily provided by infected higher between phones that are far apart than phones close people. Hence, infection chains have to be reconstructed by the together, making reliable proximity detection based on signal arXiv:2006.05914v2 [cs.CR] 6 Nov 2020 health authorities with an enormous amount of work for each strength difficult. individual case, but nevertheless they are not always accurate Furthermore, there are centralized and decentralized con- or complete. tact tracing approaches. Centralized approaches, such as the Using digital contact tracing apps on mobile devices can TraceTogether app used in Singapore [9] or the CovidSafe help to reduce the manual effort and increase the tracing accu- app used in Australia [10], as well as the PEPP-PT model racy. This has already been demonstrated in several countries. originally planned to be deployed in Germany [11], and the Even if - for understandable reasons - there is still a lack of StopCovid app in France [12], are based on the principle empirical evidence about the effectiveness of contract tracing that a centralized back-end server system assigns a unique apps in fighting the pandemic [1] compared to other measures, identifier (a pseudonym) to each user’s mobile app, from which such as massive testing and manual tracing, contact tracing frequently-changing pseudonymous proximity identifiers are apps became urgent in the rest of the world that was hit by derived and broadcast over BLE to other nearby devices. The the pandemic later. weakness of this approach is that the back-end server system The recent "arms race" on providing contact tracing apps can associate all proximity identifiers of all users with the has created various mobile contact tracing approaches and unique pseudonym of each user. This in turn allows operators of the back-end server system to perform comprehensive Tracing Server monitoring of all users of the system. Temporary Due to these severe weaknesses, contact tracing apps should Exposure Key of be based on decentralized identification of contacts. In the infected users decentralized approach, the back-end server system does not have information about proximity identifiers of users and Temporary Exposure Key therefore cannot associate them with individual users. Indeed, Temporary Bluetooth LE RPls of all due to the fundamental problems associated with the cen- Exposure Key of contacts tralized approach and the huge resistance of the scientific infected users community1, the Federal Government of Germany decided to abandon the centralized approach of the PEPP-PT consortium Rolling Proximity Identifiers (RPls) that it initially highly supported, and decided to switch to a compare decentralized approach. Apart from proposals made by academia, IT enterprises such as Microsoft, Apple, and Google work on contact tracing RPIs of infected user apps. In an unprecedented joint effort, Google and Apple Infected User Other Users have provided an Application Programming Interface (API) Fig. 1: Overview of the GAP contact tracing approach for exposure notification at the mobile operating system level in order to implement decentralized contract tracing apps using BLE. We call this the Google/Apple Proposal [13], abbreviated II. GAP OVERVIEW by GAP in the rest of the paper. The GAP contact tracing approach [13] is based on Several researchers have pointed out the possibility of frequently-changing random pseudonyms, so-called Rolling profiling infected persons in the GAP approach [14], [15], as Proximity Identifiers (RPI). An overview of the approach is well as the possibility to perform relay attacks [14], [16]–[19]. shown in Fig. 1. Each app generates these RPIs from a The goal of our work is to perform a reality check towards Temporary Exposure Key (TEK) (formerly known as Daily possibly providing empirical real-world evidence for these two Tracing Key (DTK) in version 1.0 of the GAP specification) privacy and security risks discussed in the literature. and beacons them into their surroundings using BLE. Apps on We selected the GAP approach for the following reasons. other devices in close proximity can observe these RPIs and First, GAP will be broadly adopted, since several European store them locally as a record of contact with the device bea- contact tracing apps, such as the Swiss SwissCOVID, the coning the RPI. This dataset also includes additional metadata Italian Immuni, and the German Corona-Warn-App, are based like the received signal strength. on the GAP API. Second, the GAP API is already opt-in for Should a user be tested positive for SARS-CoV-2, a user iOS and Android devices, hence, it will potentially stay with can decide to upload TEKs of the last x days using an app us for a long time. to a central server (currently x = 14). The server accumulates We demonstrate that in real-world scenarios the current the received TEKs of infected persons and offers them to GAP design is vulnerable to (i) profiling and possibly de- be downloaded by other users’ apps. Apps in devices of anonymizing infected persons, and (ii) relay-based wormhole participating users regularly check the server for updates and attacks that can generate fake contacts with the potential download any new TEKs. Each app then uses the downloaded of affecting the accuracy of an app-based contact tracing TEKs to calculate the corresponding RPI pseudonyms used system. For both types of attack, we have built tools that by the infected persons’ apps in the recent past. The operating can be easily used on mobile phones or Raspberry Pis (e.g., system / corresponding system service then compares these Bluetooth sniffers). We hope that our findings provide valuable infected persons’ RPIs to the RPIs stored locally on the device. input in the process of testing and certifying contact tracing If matching RPIs are found, the metadata, e.g., signal strength apps, ultimately guiding improvements for secure and privacy- or duration of the encounters, related to these matching RPIs preserving design and implementation of digital contact trac- are used to calculate a risk score that is used to determine ing systems. whether a warning should be displayed to the user or not. The paper is organized as follows. Section II briefly explains the GAP approach. In Section III, we present our (profiling) III. MIND THE PRIVACY GAP attack on the privacy of the GAP scheme. Section IV describes In this section, we present our real-world attack on the our (relay-based wormhole) attack on the security of GAP. privacy of the GAP scheme based on its specification [13]. Section V concludes the paper and outlines areas for future The possibility of profiling infected persons in the GAP has work. already been pointed out by other researchers [14], [15].
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages10 Page
-
File Size-