Download - Radmilo Racic Denys Ma Hao Chen University of California, Davis

Transcript
Page 1: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile

Phone’s Battery

Radmilo Racic

Denys Ma

Hao Chen

University of California, Davis

Page 2: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Is it only the network?

Page 3: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Assume the network is perfect…

Page 4: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Why target the cell phone?

• Batteries are bottlenecks

• Cellular phones are poorly protected

• Cell phones attackable from the Internet

Page 5: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Why exploit a cellular network?

• Part of our critical infrastructure

• Eggshell security

• Connected to the Internet

Page 6: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Goals

1. Exhaust a cell phone’s battery

2. Attack cell phones stealthily

Page 7: Radmilo Racic Denys Ma Hao Chen University of California, Davis

“Sleep deprivation” attack

Approach:Prevent a cell phone from sleeping

Procedure:• Identify victims (utilizing MMS)• Deliver attack (utilizing GPRS)

Page 8: Radmilo Racic Denys Ma Hao Chen University of California, Davis

MMS architecture

Wireless Net

Wireless Net

Internet

Bill

George Sr.

George Jr.

MMS R/S

MMS R/S

SMTP

SMTP

SMTP

Page 9: Radmilo Racic Denys Ma Hao Chen University of California, Davis

MMS vulnerabilities

• Messages unencrypted

• Notifications unauthenticated

• Relay server unauthenticated

• Cell phone information disclosure– IP address, platform, OS, etc.– Exploited to build a hit list

Page 10: Radmilo Racic Denys Ma Hao Chen University of California, Davis

GPRS Overview• Overlay over GSM• Connected to the Internet through a gateway

(GGSN)• Each phone establishes a packet data protocol

(PDP) context before each Internet connection.• PDP context is a mapping between GPRS and

IP addresses.

Page 11: Radmilo Racic Denys Ma Hao Chen University of California, Davis

GPRS cell phone state machine

Page 12: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Prevent a cell phone from sleeping

1. Activate a PDP context• By utilizing MMS notifications

2. Send UDP packets to cell phone• Just after the READY timer expires• To tax its transceiver

Page 13: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Attack

Attacker

Attack Server

MMS Notification

HTTP Request

UDP Packets

Victim(410) 555-1980

Page 14: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Attack details

• Surreptitious to both the user and network

• Works on various phones

• Works on multiple providers

• Requires few resources– Internet connection– Less than a 100 lines of python attack code

Page 15: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Battery life under attack

0

20

40

60

80

100

120

140

160

180

Nokia 6620 Sony T610 Motorola v710

Min

ute

sNormal Use Time

Under Attack Time

Reduction: 22.3:1 8.5:1 18:1

156

6036

7 7 2

Page 16: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Attack scale

• Send a UDP packet to– a GSM phone every 3.75s, or– a CDMA phone every 5s

• Using a home DSL line (384 kbps upload) can attack simultaneously– 5625 GSM phones, or– 7000 CDMA phones

Page 17: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Attack improvements

• TCP ACK attack: force the phone to send as well as receive data– Receiver will reply with RST or empty packet

• Packets with maximum sized payload

• Attack effective through NATs and Firewalls– Because the victim’s cell phone initiates the

connection to the attack server

Page 18: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Sources of vulnerabilities

• MMS allows hit list creation

• MMS allows initiation of a PDP context

• GPRS retains the PDP context

Page 19: Radmilo Racic Denys Ma Hao Chen University of California, Davis

MMS hardening

• Authenticate messages and servers

• Hide information at WAP gateway

• Filter MMS messages

Page 20: Radmilo Racic Denys Ma Hao Chen University of California, Davis

PDP Context Management

• Implement a defense strategy at GGSN– GGSN stateful

• PDP context modification message is already present– Transparent to the end user– NAT-like behavior

Page 21: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Related works

• SMS analysis [Enck et al, CCS05]– Focuses on SMS– Attacks the network

• Mobile viruses [Bose et al, yesterday]– Propagation of worms on cellular networks

• Control channels [Agarwal, NCC04]– Capacity analysis of shared control channels

Page 22: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Conclusion

• Demonstrated an attack that drains a phone’s battery up to 22 times faster

• Can attack 5625-7000 phones using a home DSL line

• Attack is surreptitious• Attack effective on multiple phones and

networks• Suggested mitigation strategies

Page 23: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Future work

• Worm deployment strategies targeting MMS vulnerabilities

• Battery attacks initiated from cell phones

Page 24: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Thank you

http://zeus.cs.ucdavis.edu/cellSecurity

Page 25: Radmilo Racic Denys Ma Hao Chen University of California, Davis

Results

18:1236Motorola V710

8.5:1760Sony-E T610

22.3:17156Nokia 6620

Reduction Rate Under Attack (Hr)Normal (Hr)Phone

Battery Life