Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats
 
conference paper

On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats

Antonioli, Daniele  
•
Payer, Mathias  
January 1, 2022
2022 43Rd Ieee Symposium On Security And Privacy Workshops (Spw 2022)
43rd IEEE Symposium on Security and Privacy (SP)

Cars are some of the most security-critical consumer devices. On the one hand, owners expect rich infotainment features, including audio, hands-free calls, contact management, or navigation through their connected mobile phone. On the other hand, the infotainment unit exposes exploitable wireless attack surfaces. This work evaluates protocol-level Bluetooth threats on vehicles, a critical but unexplored wireless attack surface. These threats are crucial because they are portable across vehicles, and they can achieve impactful goals, such as accessing sensitive data or even taking remote control of the vehicle. Their evaluation is novel as prior work focused on other wireless attack surfaces, notably Bluetooth implementation bugs. Among relevant protocol-level threats, we pick the KNOB and BIAS attacks because they provide the most effective strategy to impersonate arbitrary Bluetooth devices and are not yet evaluated against vehicles.

Testing vehicles is challenging for several reasons, and we had to design a cost-effective methodology based on hybrid lab/on the road experiments. We evaluated 5 popular infotainment units (e.g., KIA and Toyota units) in the lab and 3 recent cars (e.g., Suzuki and Skoda cars) in a controlled on-the-road environment. We describe our methodology in detail to allow other researchers to reproduce and extend our results. Our Bluetooth protocol-level security evaluation uncovers worrisome facts about the state of vehicular security. For example, all tested devices are vulnerable to BIAS and KNOB, despite the patches in the Bluetooth standard. For example, the standard mandates keys with 7 bytes of entropy, but the tested devices accept keys with 1 byte of entropy. Moreover, all tested devices employ weak and outdated Bluetooth security parameters (e.g., weak authentication protocols and ciphers).

  • Details
  • Metrics
Type
conference paper
DOI
10.1109/SPW54247.2022.9833886
Web of Science ID

WOS:000853036900036

Author(s)
Antonioli, Daniele  
Payer, Mathias  
Date Issued

2022-01-01

Publisher

IEEE COMPUTER SOC

Publisher place

Los Alamitos

Published in
2022 43Rd Ieee Symposium On Security And Privacy Workshops (Spw 2022)
ISBN of the book

978-1-6654-9643-8

Series title/Series vol.

IEEE Security and Privacy Workshops

Start page

353

End page

362

Subjects

Computer Science, Information Systems

•

Computer Science, Interdisciplinary Applications

•

Computer Science

•

the-middle attacks

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
HEXHIVE  
Event nameEvent placeEvent date
43rd IEEE Symposium on Security and Privacy (SP)

San Francisco, CA

May 23-26, 2022

Available on Infoscience
September 26, 2022
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/190976
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés