Contact Tracing Made Un-Relay-Able

Contact Tracing Made Un-Relay-Able

Contact Tracing Made Un-relay-able Marco Casagrande Mauro Conti Eleonora Losiouk Department of Mathematics Department of Mathematics Department of Mathematics University of Padua University of Padua University of Padua Padua, Italy Padua, Italy Padua, Italy [email protected] [email protected] [email protected] Abstract—Automated contact tracing is a key solution to the virus spread. As a result, governments expressed their need control the spread of airborne transmittable diseases: it traces for Automatic Contact Tracing (ACT) solutions, which can contacts among individuals in order to alert people about help with better monitoring the spread of the virus if applied their potential risk of being infected. The current SARS-CoV- 2 pandemic put a heavy strain on the healthcare system of many together with social distancing. countries. Governments chose different approaches to face the Several ACT solutions were proposed and adopted by differ- spread of the virus and the contact tracing apps were considered ent countries according to their economical, technological and the most effective ones. In particular, by leveraging on the cultural status. The most promising tool for collecting contact Bluetooth Low-Energy technology, mobile apps allow to achieve a tracing data that concern the citizens was the smartphone, since privacy-preserving contact tracing of citizens. While researchers proposed several contact tracing approaches, each government most people own one. Tracing citizens contacts through the developed its own national contact tracing app. smartphone location (i.e., GPS signal, Wi-Fi routers, cellular In this paper, we demonstrate that many popular contact networks) seemed a feasible solution [1], which, however, tracing apps (e.g., the ones promoted by the Italian, French, introduced significant privacy issues: citizens had to partially Swiss government) are vulnerable to relay attacks. Through such give up on their privacy to protect others. As illustrated in [2], attacks people might get misleadingly diagnosed as positive to SARS-CoV-2, thus being enforced to quarantine and eventually such privacy issues could even lead to public identification of leading to a breakdown of the healthcare system. To tackle diagnosed patients or to mass surveillance. Thus, researchers this vulnerability, we propose a novel and lightweight solution proposed an alternative approach based on the Bluetooth Low- that prevents relay attacks, while providing the same privacy- Energy (BLE) technology, which is already available on most preserving features as the current approaches. To evaluate smartphones. BLE allows two devices that are close to each the feasibility of both the relay attack and our novel defence mechanism, we developed a proof of concept against the Italian other to exchange their identifiers, while requiring a limited contact tracing app (i.e., Immuni). The design of our defence amount of battery power. Several communication protocols allows it to be integrated into any contact tracing app. To have been proposed to support ACT on mobile devices: foster the adoption of our solution in contact tracing apps and BlueTrace [3], ROBust and privacy-presERving proximity encourage developers to integrate it in the future releases, we Tracing (ROBERT) [4] and Decentralized Privacy-Preserving publish the source code. Proximity Tracing (DP-3T) [5]. In addition, Google and Apple Index Terms—Contact Tracing Apps, Bluetooth Low-Energy, Relay Attacks, Android Platform designed the Google Apple Exposure Notification (GAEN) [6] protocol. GAEN enables the interoperability among devices running Android and iOS, by providing a common API in I. INTRODUCTION the underlying platform to be used by contact tracing apps. The SARS-CoV-2 pandemic caught governments and All the above-mentioned protocols follow the same workflow: healthcare systems unprepared. One of the main issues of each smartphone has its own pseudonym, shared with other the virus concerns the speed of diffusion, which is very high, smartphones when they get close to each other. After a especially in comparison to the time required to find all the while, the smartphone updates its pseudonym with a new people that have been in contact with an infected person. Thus, one, which is seemingly independent. Thus, each smartphone the very first strategy adopted by some governments was to will soon have a database of the announced pseudonyms and put citizens in a strict lockdown. However, the lockdown was a database of the received pseudonyms. When a person is only a temporary solution and governments started looking found infected, all the smartphones that have been in contact for alternative approaches aimed at the containment of the with the smartphone of the infected person should be notified, virus, which means: (i) rapid identification of the infected also receiving a risk score. By proving the unlinkability of individuals, with the consequent quarantine, (ii) identification pseudonyms, the above approach guarantees a good level of the people that have been close to an infected person in of privacy. Despite its privacy-preserving nature, the BLE- the previous days and weeks, (iii) decontamination of places based ACT approach has several limitations which reduce where the infected individual has been. Guaranteeing the the citizens consensus to adopt it. Among such limitations, containment is a difficult task, which might lead to errors, there is the resilience to security attacks. In particular, the especially if performed manually, as it happened at the start of absence of an authentication procedure in ACT apps paves the way for replay and relay attacks. Previous works [7], [8], design of ACTGuard; Section V describes our implementa- [9] designed possible solutions to defend against such attacks. tion of the relay attack against Immuni and ImmuniGuard; However, they either rely on an interactive approach and on Section VI illustrates the related work; in Section VII, we sharing contact time and location between the parties [7], or conclude the paper with a discussion about ACT apps. involve complex cryptographic schemes which might make them unfeasible in a real-world scenario [8]. Finally, all of II. BACKGROUND them [7], [8], [9] are theoretical approaches that have not been In this section, we illustrate the BLE protocol (i.e., Sec- implemented on a real ACT solution. tion II-A) and the proximity tracing protocols (i.e., Sec- In this paper, we focus on the vulnerability to relay attacks tion II-B). We focus on the Android Operating System (OS), of ACT apps and we prove that many popular ones (e.g., since both the attack and the defence target this platform. those promoted by the Italian, French, Swiss government) are not able to defend against such attacks. To tackle this A. Bluetooth security issue, we designed ACTGuard, the first solution that (i) does not require an interactive approach between the two Bluetooth protocol. The Bluetooth protocol always in- devices; (ii) does not imply the sharing of location and time volves a client and a server. Usually, the server keeps running information between the two devices; (iii) relies on a simple in discoverable mode until a client sends it an inquiry. Then, hashing function, without the need of additional cryptographic the server sends its information to the client (e.g., list of schemes; (iv) is feasible in a real-world scenario, as proven services), that attempts to read server’s data. The access to by its proof of concept implemented over a real ACT app. such data is regulated by a set of permissions: no permission ACTGuard effectively prevents relay attacks by acquiring (the client can access server’s data); authentication required the location data concerning contacts between pairs of people. (the client starts the pairing procedure); authorization required In particular, it saves on the mobile device only a hash of the (any implementation concerning the authorization is left to contact, generated by providing as the input of a hash function developers). The pairing procedure allows a device to authen- the pseudonyms of the two smartphones, the timestamp of the ticate a different one, before connecting to it, and to share contact and the location of the contact. Whenever a person is with the other device the long-term keys that will encrypt the found infected, the hashes of the contacts over the previous communication. During the authentication, the user is asked days are shared with a remote server and locally downloaded to verify the identity of the remote device. This process might by other smartphones. If the pseudonym of the infected person go through an interaction with the remote device display or has been spoofed and used in a relay attack (i.e., being re- through the input of a value into the remote device, according transmitted by the attacker in a different location than the to its features. Alternatively, the pairing procedure might also person real one), the hashes of the relay attack victims will happen through the just works mode, in case the remote mismatch the ones of the infected person due to the different device has neither a display nor an input. When the pairing is location. This way, ACTGuard will prevent the relay attack completed, the two devices go through the bonding procedure, victims from receiving a false positive alert. Moreover, by during which they exchange the long-term keys. Unless a saving and sharing only the hashes of the contacts, ACTGuard device is manually reset or unpaired, it will keep the key stored provides a privacy-preserving solution. To assess the feasibility and use it to encrypt the communication at the link layer. of the relay attack against ACT apps and the reliability of Use of Bluetooth in Android. In Android, applica- ACTGuard, we developed two proofs of concept focusing on tions willing to use the Bluetooth communication channel Immuni, the Italian contact tracing app based on GAEN. have to rely on the android.bluetooth API package, Contributions.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    13 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us