skip to main content
10.1145/3317549.3326321acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
demonstration

Using bluetooth low energy spoofing to dispute device details: demo

Published: 15 May 2019 Publication History

Abstract

In this demo, we will show the effects of multiple Bluetooth Low Energy spoofing attacks, including a novel cache poisoning attack. Bluetooth Low Energy (BLE) is often used for communication between devices, ranging from headphones to medical sensors. Our attacks target the BLE advertising mechanism to cause Denial of Service and Man-in-the-Middle conditions. BLE Peripheral Devices are discovered through an advertising process, in which the Peripheral broadcasts advertising packets to listening Central Devices. Such packets typically include the advertising address of the device, name of the device, and information about the connectability of the device. Peripheral Devices are generally assumed to have distinct advertising addresses. If a device advertises with the same address as another device, Central Devices need to decide which information is correct. We term the condition where advertisements contain contradictory information a "Disputed Advertisement". In the case where an advertisement contains optional information, there may be a condition where one of the packets contains maliciously included information, but is not contradicted by a legitimate packet. We call this condition an "Undisputed Advertisement", which is the basis for a novel attack that we call Bluestaking. The Bluestaking attack poisons advertising name cache on Central Devices with attacker-selected address-to-name mappings. Because BLE devices are not required to be named, an attacker can spoof a device and provide a name without any dispute from the victim device. This causes scanning Central Devices to cache the name indefinitely.

References

[1]
Sławomir Jasek. {n.d.}. GATTattacking Bluetooth Smart Devices. SecuRing Whitepaper, available http://gattack.io/whitepaper.pdf.
[2]
Hui Jun Tay, Jiaqi Tan, and Priya Narasimhan. 2016. A Survey of Security Vulnerabilities in Bluetooth Low Energy Beacons. PDL Technical Report CMU-PDL-16--109. Parallel Data Laboratory, Carnegie Mellon University, Pittsburgh, PA.
[3]
Kevin Townsend. 2014. Introduction to Bluetooth Low Energy. Adafruit Learning System, Available https://learn.adafruit.com/introduction-to-bluetooth-low-energy.

Cited By

View all
  • (2019)A Versatile Emulator of MitM for the identification of vulnerabilities of IoT devices, a case of studyProceedings of the 3rd International Conference on Future Networks and Distributed Systems10.1145/3341325.3342019(1-6)Online publication date: 1-Jul-2019

Index Terms

  1. Using bluetooth low energy spoofing to dispute device details: demo

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks
      May 2019
      359 pages
      ISBN:9781450367264
      DOI:10.1145/3317549
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 May 2019

      Check for updates

      Author Tags

      1. BLE advertisement
      2. blues-taking
      3. bluetooth low energy
      4. cache poisoning

      Qualifiers

      • Demonstration

      Conference

      WiSec '19
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 98 of 338 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)14
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 01 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2019)A Versatile Emulator of MitM for the identification of vulnerabilities of IoT devices, a case of studyProceedings of the 3rd International Conference on Future Networks and Distributed Systems10.1145/3341325.3342019(1-6)Online publication date: 1-Jul-2019

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media