arXiv Analytics

Sign in

arXiv:2009.11776 [cs.CR]AbstractReferencesReviewsResources

BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy

Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen, Mathias Payer

Published 2020-09-24Version 1

The Bluetooth standard specifies two incompatible wireless transports: Bluetooth Classic (BT) for high-throughput services and Bluetooth Low Energy (BLE) for very low-power services. BT and BLE have different security architectures and threat models, but they use similar security mechanisms. In particular, pairing enables two devices to establish a long term key to secure the communication. Two devices have to pair over BT and BLE to use both transports securely. Since pairing the same devices two times is considered user-unfriendly, Bluetooth v4.2 introduced Cross-Transport Key Derivation (CTKD). CTKD allows two devices to pair once, either over BT or BLE, and generate both BT and BLE long term keys. Despite CTKD allowing traversal of the security boundary between BT and BLE, the security implications of CTKD have not yet been investigated. We present the first security analysis of CTKD and identify five cross-transport issues for BT and BLE. These issues enable, for the first time, exploitation of both BT and BLE by attacking either transport. Based on the identified issues, we demonstrate four novel cross-transport attacks resulting in device impersonation, traffic manipulation, and malicious session establishment. We refer to them as BLUR attacks, as they blur the security boundary between BT and BLE. The BLUR attacks are standard-compliant and therefore apply to all devices supporting CTKD, regardless of implementation details. We successfully demonstrate the BLUR attacks on 13 devices with 10 unique Bluetooth chips, and discuss effective countermeasures. We disclosed our findings and countermeasures to the Bluetooth SIG in May 2020.

Related articles: Most relevant | Search more
arXiv:1902.08595 [cs.CR] (Published 2019-02-22)
Penetration Tests for Bluetooth Low Energy and Zigbee using the Software-Defined Radio
arXiv:2008.00136 [cs.CR] (Published 2020-08-01)
BatNet: Data transmission between smartphones over ultrasound
arXiv:1704.05773 [cs.CR] (Published 2017-04-19)
Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling