Dr Silvio Cesare Qualys. Introduction  Lots of electronic systems  Converging with computing  IT security techniques can be used.

Slides:



Advertisements
Similar presentations
Gone in 360 Seconds: Hijacking with Hitag2
Advertisements

Indian Institute of Technology Hyderabad ELECTRONIC SWITCH CONTROL THROUGH RF(RADIO FREQUENCY) GROUP MEMBERS: Anil Kumar Loya ME12B1002 RITESH KUMAR CE12B1019.
COMMUNICATION SYSTEM EEEB453 Chapter 3 (III) ANGLE MODULATION
Security Options. Car Alarms Audible SoundsDoor Lock ActivatorsParking Light Flash Remote Panic Button (Optional) Starter Disable Protection (Optional)
DATA COLLECTION USING ZIGBEE NETWORK Timothy Melton Moscow, ID.
Software Defined Radio Testbed Team may11-18 Members: Alex Dolan, Mohammad Khan, Ahmet Unsal Adviser: Dr. Aditya Ramamoorthy.
Finding objects. Prepared by: Laial Al Jeans Mais Dabous Supervised by: A.Jammal Kharoshah.
RADIO FREQUENCY MODULE. Introduction  An RF module is a small electronic circuit used to transmit and receive radio signals.  As the name suggests,
SDP 11 PDR Team Goeckel Group: Adebayo Adeyemi, Joseph Hayward, Mark Kohls, Simon McAuliffe Advisor: Dennis Goeckel PDR Keeping The Secret.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Hacking Exposed 7 Network Security Secrets & Solutions
How to Build a Digital-Physical System-Lab Assegid Kidané Fall 2014.
2 Way FM Car Starter Dan Owens April 12, 2005 Instructor: Dr. Pao-Lo Liu Department of Electrical Engineering University at Buffalo Course Requirement.
MULTIPURPOSE DIGITAL CDMA FM REMOTE CONTROLLER FIRDOUS KAMAL MIZAN MIAH EE – 513 4/19/2005 COMMUNICATION ELECTRONICS.
Electronics Design Laboratory Lecture #11, Fall 2014
1 INTRUSION ALARM TECHNOLOGY WIRELESS SYSTEMS. 2 INTRUSION ALARM TECHNOLOGY Wireless systems use radio frequencies (RF) to connect sensors to the control.
Operating the JH-15 SDR radio
Data Communication and Networking 332 Hardware Components of Data Communication.
Why to Apply Digital Transmission?
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
D Star Digital Data (DD) Buddy Morgan WB4OMG Trustee KJ4ACN D Star Repeater, Lakeland, FL
December 2013 – Alexandre TRIFFAULT Alarm system Inspired by Babak Javadi presentation.
THE RADIO OF THE FUTURE Natarajan.P No. 17 S7 Electronics & Comm. PTDC College of Engineering, Thiruvananthapuram.
Wireless PHY: Modulation and Demodulation Y. Richard Yang 09/6/2012.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
High Speed Data Converter University
Software Defined Radio
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
1 Physical Layer ผศ. ดร. อนันต์ ผลเพิ่ม Asst. Prof. Anan Phonphoem, Ph.D. Computer Engineering Department.
Network Coding Testbed Jeremy Bergan, Ben Green, Alex Lee.
The GNU in RADIO Shravan Rayanchu. SDR Getting the code close to the antenna –Software defines the waveform –Replace analog signal processing with Digital.
Developing a SDR Testbed Alex Dolan Mohammad Khan Ahmet Unsal Project Advisor Dr. Aditya Ramamoorthy.
WIRELESS Communication Automation Control. Wireless = Efficiency Performance: Performance: –Space Efficiency: Efficiency. = #receptors / box area –Unlimited.
Securing Wireless Medical Implants Shyamnath Gollakota Haitham Hassanieh Benjamin Ransford Dina Katabi Kevin Fu.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
HiSeasNet Modems 1SIO Aug '09. Spectrum analyzers  aka “SpecAn”  Measure energy in a given frequency bands  Axes are frequency (x-axis) and RF energy.
Wireless Transmission Professor: Dr. Miguel Alonso Jr.
Technician License Course Chapter 2 Lesson Plan Module 3 – Modulation and Bandwidth.
Software Defined Radio Testbed Alex Dolan Mohammad Khan Ahmet Unsal Jihyung Ha.
Agenda Last class: Network Protocols Today: Wireless Technology –How do computers talk to each other… with no wire connecting them?
CS434/534: Mobile Computing and Wireless Networks Y. Richard Yang 08/30/2012.
science/internet-intro
Final Year Project(EPT4046) Development of an internet controlled Surveillance Mobile Robot By Mimi Madihah Bt Mohd Idris Id: BACHELOR OF ENGINEERING.
Mini-GPS2 and Canopy GPS Synchronization
PWM: Pulse Width Modulation © 2014 Project Lead The Way, Inc.Digital Electronics.
Guide Presented by Mr.M Cheenya V.Abhinav Kumar 11E31A0422 Asst.Professor K.Shiva Kumar 11E31A0423 K.Rajashekhar 11E31A0424 K.Chaithanya Sree 11E31A0428.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Layer One challenge Biró László Miklós HA5YAR
Hardware Attack Vectors Yashin Mehaboobe Security Researcher.
SUBMITTED BY EDGEFX TEAM PORTABLE CODED WIRELESS MESSAGE COMMUNICATION BETWEEN TWO PARTIES SECRETLY WITH LCD DISPLAY.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Modulation and Multiplexing Broadband Transmission – A carrier is a high frequency signal that is modulated by audio, video, or data. – A radio-frequency.
Operating the JH-15 SDR radio
Welcome to Arduino A Microcontroller.
By: Brian Johnson, AB6UI 20 Sept 2017
SUBMITTED BY EDGEFX TEAM
OBJECTIVE AND FEATURES:
Arduino Part 1 Topics: Microcontrollers Programming Basics
RAILWAY TRACK SNAP NOTIFICATION
Keypad Lockout - Available June 15, 2015
Project name: Traffic Guide using Wireless Radio
PSK31 Without a PC Lyle Johnson – KK7P.
Denial-of-Service Jammer Detector Training Course Worldsensing
Manual Robotics ..
Thornbury & South Gloucestershire Amateur Radio Club
Health IT Workforce Curriculum Version 1.0/Fall 2010
The bios.
Hardware Graduation Project (2) Seminar
Introduction to arduino
Presentation transcript:

Dr Silvio Cesare Qualys

Introduction  Lots of electronic systems  Converging with computing  IT security techniques can be used

Outline 1. Eavesdropping analog baby monitors 2. Disabling RF-based home alarm systems 3. Hardware tampering a home alarm 4. Defeating the keyless entry of a Car

Eavesdropping analog baby monitors

Analog Baby monitors?  Buy new off Ebay and other places.

Using Software defined radio dongles  RTL-SDR ($15)  Funcube  Antennas

Using upconvertors  Lower frequencies not processed by SDR.  Upconvert frequencies.  Ham it up convertor shown:

Finding the signal using spectrum analysis  High-end hardware is expensive (below left).  Cheaper hw is available (RF Explorer below).  40MHz is pretty normal.

Demodulating the signal  Use software spectrum analysis tools.  Try AM, FM demodulation.  Gqrx (Linux)  HDSDR (Windows)

Mitigation  Use DECT  Yes.. I know DECT has been broken also.

Disabling rf-based home alarm systems

What home alarms use RF- remotes?  Heaps.. Almost everything at Big-W, K-Mart, Bunnings etc

Replay attacks  Real remote sends a “fixed code” to disable system.  Attacker captures code and replays it with USRP etc.  Works on almost all home alarms.  Alarm keyfobs generally use 315 MHz and MHz RF.

The Hardware  USRP B200 right:  Antennas.

Replay attacks with GNURadio  Capture:  Source is USRP, Sink is File.  Replay:  Source is File, Sink is USRP.

What is in the RF signal?  Generally modulated by AM and PWM.  If we demodulate the RF signal, we can see if the remote code is fixed or rolling.  GNURadio and custom software.

Amplitude (am) Modulation

Pulse width modulation (pwm)  Square waves generated by am demodulation.

Using cluster analysis to determine pulse widths  pycluster  Group similar widths together  Find mean in each cluster  Mean of means is the threshold.

Building a $50 arduino-based hacking box  Wireless AM rx/tx pair

mitigation  Use rolling codes, or challenge-response.  Buy commercial alarm systems.  Avoid K-Mart, Big-W et al.

Hardware tampering an alarm system

A shop at Bunnings

Interfacing with the microcontroller  Disassembly reveals labelled IC (PIC) and test ports.  Solder header pins.  Attach PIC device programmer.

Reading secret passcodes  Device programmer software.  Firmware protected.  Data is readable.  Reveals passcode.

Potential attacks to read the firmware  Glitching?  Decapping the IC and changing the security fuse with UV light?

Mitigation  Don’t label ICs.  Assume hardware hacking.  Hard to stop a well resourced attacker.

Defeating the keyless entry of a Car

Building a dataset of button pushes

Phase space analysis of the rolling codes  Used 10 years ago against TCP initial sequence numbers.

Predicting prng (rolling) codes  Capture 3 codes from real remote.  Existing software to predict PRNG.  Tx with USRP.

Increasing TX range  Use an amplifier.

Testing codes  Capture and Replay codes.  How to stop the car receiving codes?  Use a Faraday cage:  Aluminium Foil lined Freezer bag!

Defeating the keyless entry

Analysing the rolling code  Format  Preamble based on remote ID.  Followed by unlock/lock/panic/trunk code.  Then bits for security in rolling code.  Bits  3 states per bit.  1, 0, or a gap.  Gaps are important.  Timing  1 is twice the pulse width as a 0.  An implicit gap after every 1 or 0.  A gap is the width of a 0. 1x1x1x1x1x1x11100x x1x1x1x1x1x11101x x1x1x1x1x1x11101x00...

Analysing more  The entire rolling code sequence is of a fixed time  all the ones, zeros, and gaps sum to a fixed number.  There are fewer x’s than 1’s and 0’s.  An x never follows an x.

Bruteforce?  Capture 1 transmission.  Use preamble of capture and then bruteforce rolling code part.  Generate all numbers in range.  Exclude numbers not meeting constraints.  Fewer than 1 million possibilities.

Does it work?  Unlocks generally in under 2 hours.

Hmm.. What’s this – a Backdoor?  Some codes in bruteforce list ALWAYS unlock the car.  Once known, unlocking car takes seconds not hours.  Appears to be a manufacturer backdoor.  TODO: How to generate from 1 capture without bruteforcing.

Mitigation  Hard to mitigate without a recall.  Recall is never going to happen.  Install an aftermarket keyless entry or just upgrade your car.  For car makers:  Don’t use an algorithm to generate the rolling codes.  Don’t put in backdoors.

Future work  Silicon analysis  Firmware recovery

Conclusion  Hardware hacking is fun.  Lots of real-world devices vulnerable.  PRNG attacks against rolling codes have been mostly uninvestigated.