论文标题
Blewhisperer:利用BLE广告进行数据剥落
BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration
论文作者
论文摘要
蓝牙技术已实现了数十亿个设备的短程无线通信。蓝牙低能(BLE)变体旨在改善电池约束设备的功耗。启用BLE的设备通过广告广播信息(例如,作为信标)通过广告到附近的设备。不幸的是,这种功能可以成为攻击者手中的双刃剑。在本文中,我们主要展示了攻击者如何利用BLE广告来从可启用的设备中渗透信息。特别是,我们的攻击在两个设备之间建立了通信介质,而无需任何事先的身份验证或配对。我们在Android生态系统上开发了概念验证攻击框架,并通过一组彻底的实验评估其性能。我们的结果表明,尽管数据速率有限,但确实可以进行这种渗透攻击。但是,我们还展示了潜在的用例和攻击的增强,可以进一步加剧其严重性。最后,我们讨论了防止这种攻击的可能对策。
Bluetooth technology has enabled short-range wireless communication for billions of devices. Bluetooth Low-Energy (BLE) variant aims at improving power consumption on battery-constrained devices. BLE-enabled devices broadcast information (e.g., as beacons) to nearby devices via advertisements. Unfortunately, such functionality can become a double-edged sword at the hands of attackers. In this paper, we primarily show how an attacker can exploit BLE advertisements to exfiltrate information from BLE-enable devices. In particular, our attack establishes a communication medium between two devices without requiring any prior authentication or pairing. We develop a proof-of-concept attack framework on the Android ecosystem and assess its performance via a thorough set of experiments. Our results indicate that such an exfiltration attack is indeed possible though with a limited data rate. Nevertheless, we also demonstrate potential use cases and enhancements to our attack that can further its severeness. Finally, we discuss possible countermeasures to prevent such an attack.