1. Method Confusion Attack on Bluetooth Pairing
- Author
-
Ludwig Peuckert, Jens Grossklags, Fabian Franzen, and Maximilian von Tschirschnitz
- Subjects
Authentication ,business.industry ,Computer science ,Encryption ,Computer security ,computer.software_genre ,law.invention ,Bluetooth ,Smartwatch ,law ,Proof of concept ,Pairing ,Wireless ,Trust on first use ,business ,computer - Abstract
Bluetooth provides encryption, authentication, and integrity protection of its connections. These protection mechanisms require that Bluetooth devices initially establish trust on first use through a process called pairing. Throughout this process, multiple alternative pairing methods are supported.In this paper, we describe a design flaw in the pairing mechanism of Bluetooth. This flaw permits two devices to perform pairing using differing methods. While successfully interacting with each other, the devices are not aware of the Method Confusion. We explain how an attacker can cause and abuse this Method Confusion to mount a Method Confusion Attack. In contrast to other attacks targeting the pairing method, our attack applies even in Bluetooth’s highest security mode and cannot be mitigated in the protocol. Through the Method Confusion Attack, an adversary can infiltrate the secured connection between the victims and intercept all traffic.Our attack is successful in practically relevant scenarios. We implemented it as an end-to-end Proof of Concept for Bluetooth Low Energy and tested it with off-the-shelf smartphones, a smartwatch and a banking device. Furthermore, we performed a user study where none of the 40 participants noticed the ongoing attack, and 37 (92.5%) of the users completed the pairing process. Finally, we propose changes to the Bluetooth specification that immunize it against our attack.
- Published
- 2021
- Full Text
- View/download PDF