Daniele Antonioli
https://francozappa.github.io/
Daniele Antonioli
Wowchemy (https://wowchemy.com)en-us© 2026 Daniele AntonioliThu, 16 Apr 2026 00:00:00 +0000
https://francozappa.github.io/media/icon_hufd6449924b8771808a89b636be1cd7b0_295644_512x512_fill_lanczos_center_3.png
Daniele Antonioli
https://francozappa.github.io/
-
Python basics
https://francozappa.github.io/courses/example/python/
Fri, 01 Jan 2021 00:00:00 +0000
https://francozappa.github.io/courses/example/python/
<p>Build a foundation in Python.</p>
<p>
<i class="fas fa-clock pr-1 fa-fw"></i> 1-2 hours per week, for 8 weeks</p>
<h2 id="learn">Learn</h2>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/rfscVS0vtbw" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<h2 id="quiz">Quiz</h2>
<details class="spoiler " id="spoiler-2">
<summary>What is the difference between lists and tuples?</summary>
<p><p>Lists</p>
<ul>
<li>Lists are mutable - they can be changed</li>
<li>Slower than tuples</li>
<li>Syntax: <code>a_list = [1, 2.0, 'Hello world']</code></li>
</ul>
<p>Tuples</p>
<ul>
<li>Tuples are immutable - they can’t be changed</li>
<li>Tuples are faster than lists</li>
<li>Syntax: <code>a_tuple = (1, 2.0, 'Hello world')</code></li>
</ul>
</p>
</details>
<details class="spoiler " id="spoiler-3">
<summary>Is Python case-sensitive?</summary>
<p>Yes</p>
</details>
-
Visualization
https://francozappa.github.io/courses/example/visualization/
Fri, 01 Jan 2021 00:00:00 +0000
https://francozappa.github.io/courses/example/visualization/
<p>Learn how to visualize data with Plotly.</p>
<p>
<i class="fas fa-clock pr-1 fa-fw"></i> 1-2 hours per week, for 8 weeks</p>
<h2 id="learn">Learn</h2>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/hSPmj7mK6ng" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<h2 id="quiz">Quiz</h2>
<details class="spoiler " id="spoiler-2">
<summary>When is a heatmap useful?</summary>
<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit.</p>
</details>
<details class="spoiler " id="spoiler-3">
<summary>Write Plotly code to render a bar chart</summary>
<p><pre><code class="language-python">import plotly.express as px
data_canada = px.data.gapminder().query("country == 'Canada'")
fig = px.bar(data_canada, x='year', y='pop')
fig.show()
</code></pre>
</p>
</details>
-
Statistics
https://francozappa.github.io/courses/example/stats/
Fri, 01 Jan 2021 00:00:00 +0000
https://francozappa.github.io/courses/example/stats/
<p>Introduction to statistics for data science.</p>
<p>
<i class="fas fa-clock pr-1 fa-fw"></i> 1-2 hours per week, for 8 weeks</p>
<h2 id="learn">Learn</h2>
<p>The general form of the <strong>normal</strong> probability density function is:</p>
<p>$$
f(x) = \frac{1}{\sigma \sqrt{2\pi} } e^{-\frac{1}{2}\left(\frac{x-\mu}{\sigma}\right)^2}
$$</p>
<div class="alert alert-note">
<div>
The parameter $\mu$ is the mean or expectation of the distribution.
$\sigma$ is its standard deviation.
The variance of the distribution is $\sigma^{2}$.
</div>
</div>
<h2 id="quiz">Quiz</h2>
<details class="spoiler " id="spoiler-2">
<summary>What is the parameter $\mu$?</summary>
<p>The parameter $\mu$ is the mean or expectation of the distribution.</p>
</details>
-
BlueBrothers: Three New Protocols to Secure Bluetooth
https://francozappa.github.io/publication/2026/bbro/
Thu, 16 Apr 2026 00:00:00 +0000
https://francozappa.github.io/publication/2026/bbro/
-
HardaBLE: Hardening BLE Against Software Compromise
https://francozappa.github.io/publication/2026/hardable/
Thu, 16 Apr 2026 00:00:00 +0000
https://francozappa.github.io/publication/2026/hardable/
-
MaDoS: Matter DoS Attacks via Secure Channel Status Reports
https://francozappa.github.io/publication/2026/mados/
Tue, 31 Mar 2026 00:00:00 +0000
https://francozappa.github.io/publication/2026/mados/
-
BLERP Peripheral Impersonation Attack Demo
https://francozappa.github.io/post/2026/blerp-pidemo/
Mon, 23 Mar 2026 00:00:00 +0000
https://francozappa.github.io/post/2026/blerp-pidemo/
<p>Here is Tommaso Sacchetti demonstrating the BLERP peripheral impersonation attack against a vulnerable Android 13 build (2024).
In this setup, an attacker in proximity impersonates a trusted mouse, triggers an unauthenticated re-pairing, and takes over the input channel. Recent Android versions have addressed this issue.</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/RJR83EH3pww" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
E-Trojans Black Hat USA 25 Video
https://francozappa.github.io/post/2026/etro-bhusa/
Wed, 18 Mar 2026 00:00:00 +0000
https://francozappa.github.io/post/2026/etro-bhusa/
<p>Last summer, Marco Casagrande and I talked about <em>E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Xiaomi Electric Scooters</em> at <a href="https://blackhat.com/us-25/" target="_blank" rel="noopener">Black Hat USA 2025</a>. Our presentation is online:</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/k-UsaSfndQQ" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
DCS-CI: Design for Cyber Secure Critical Infra
https://francozappa.github.io/post/2026/dcsci-cfp/
Mon, 16 Mar 2026 00:00:00 +0000
https://francozappa.github.io/post/2026/dcsci-cfp/
<p>The call for submission for the first edition of the DCS-CI conference is <a href="https://dcs-ci.github.io/call-for-submissions" target="_blank" rel="noopener">online</a>.</p>
<p>The Design of Cyber-Secure Critical Infrastructure (DCS-CI) 26 <a href="https://dcs-ci.github.io" target="_blank" rel="noopener">conference</a>
invites researchers, practitioners, and thought leaders to submit original
work that advances our collective understanding of how to design, deploy, and
maintain secure critical infrastructure systems. We welcome submissions from
diverse disciplinary perspectives, including computer science, control systems
engineering, security studies, public policy, and operations management.
Interdisciplinary contributions that bridge theoretical innovation with
practical application are particularly encouraged.</p>
<p>Submit you research papers <a href="https://easychair.org/account/signin?l=5801184989022072166.1773657775.ecc862e0" target="_blank" rel="noopener">here</a>.</p>
-
WiSec'26 Call for Posters and Demos
https://francozappa.github.io/post/2026/wisec-pd/
Mon, 16 Mar 2026 00:00:00 +0000
https://francozappa.github.io/post/2026/wisec-pd/
<p>I am excited to chair the <a href="https://wisec26.events.cispa.de/call-for-posters-and-demos/" target="_blank" rel="noopener">WiSec Demo and Poster session</a>.</p>
<p>Please submit your great posters and demos via this <a href="https://wisec26-poster.hotcrp.com/" target="_blank" rel="noopener">HotCRP instance</a>!</p>
<p>All poster titles must be prefixed with <strong>POSTER:</strong> and all demo titles with <strong>DEMO:</strong>.</p>
<p>Deadlines:</p>
<ul>
<li>Submission: <strong>April 7, 2026 (AOE)</strong></li>
<li>Notification: <strong>April 21, 2026</strong></li>
<li>Camera-ready: <strong>May 5, 2026</strong></li>
</ul>
<p>Please also share the word!</p>
-
BLERP: BLE Re-Pairing Attacks and Defenses
https://francozappa.github.io/post/2026/blerp-ndss/
Sat, 14 Feb 2026 00:00:00 +0000
https://francozappa.github.io/post/2026/blerp-ndss/
<p>In mid 2024, <a href="https://s3.eurecom.fr/~sacchetti/" target="_blank" rel="noopener">Tom</a> and I looked at BLE re-pairing, an underlooked attack surface. We uncovered four critical re-pairing attacks and design-level vulnerabilities that allow device impersonation and MitM of arbitrary devices in BLE range. The attacks work even in the most secure BLE modes, like authenticated pairing and Secure Connections Only, and require 0-click or 1-click interactions.</p>
<p>As part of our responsible disclosure we also proposed effective countermeasures that can be adopted by implementers and by the Bluetooth SIG. AFAIK, the Bluetooth SIG is not planning to fix the BLERP attacks and vulnerabilities, although they should.</p>
<p>After almost 1.5 years, we publicly release the BLERP paper and codebase:</p>
<ul>
<li><a href="https://www.ndss-symposium.org/wp-content/uploads/2026-f121-paper.pdf" target="_blank" rel="noopener">BLERP NDSS'26 paper</a></li>
<li><a href="https://github.com/sacca97/blerp" target="_blank" rel="noopener">BLERP toolkit repo</a></li>
</ul>
-
CTRAPS on the DEF CON 33 Hackers' Almanack
https://francozappa.github.io/post/2026/defcon-almanack/
Sat, 14 Feb 2026 00:00:00 +0000
https://francozappa.github.io/post/2026/defcon-almanack/
<p>The DEF CON 33 Hackers’ Almanack just <a href="https://harris.uchicago.edu/sites/default/files/the_def_con_33_hackers_almanack.pdf" target="_blank" rel="noopener">dropped</a>. We would like to thank Paul Chang and their team for featuring <a href="https://francozappa.github.io/publication/2025/ctraps/" target="_blank" rel="noopener">CTRAPS</a> in the Right to Repair section. Read and share the Almanack!.</p>
<p>Links: CTRAPS <a href="https://francozappa.github.io/publication/2025/ctraps/paper.pdf" target="_blank" rel="noopener">paper</a> and <a href="https://www.youtube.com/watch?v=WZChYxX5i_I" target="_blank" rel="noopener">DEF CON talk</a>.</p>
-
BLERP: BLE Re-Pairing Attacks and Defenses
https://francozappa.github.io/publication/2026/blerp/
Mon, 05 Jan 2026 00:00:00 +0000
https://francozappa.github.io/publication/2026/blerp/
-
PrivacyShield: Relaying BLE Beacons to Counter Unsolicited Tracking
https://francozappa.github.io/publication/2026/pshield/
Mon, 05 Jan 2026 00:00:00 +0000
https://francozappa.github.io/publication/2026/pshield/
-
AttackDefense Framework (ADF): Enhancing IoT Devices and Lifecycles Threat Modeling
https://francozappa.github.io/publication/2025/adf/
Wed, 15 Oct 2025 00:00:00 +0000
https://francozappa.github.io/publication/2025/adf/
-
CTRAPS interview on Off By One Security
https://francozappa.github.io/post/2025/ctraps-offbyone/
Mon, 22 Sep 2025 00:00:00 +0000
https://francozappa.github.io/post/2025/ctraps-offbyone/
<p>Marco and I talked about CTRAPS with Stephen Sims from <a href="https://www.youtube.com/@OffByOneSecurity" target="_blank" rel="noopener">Off By One Security</a> about <a href="https://francozappa.github.io/publication/2025/ctraps/" target="_blank" rel="noopener">CTRAPS: CTAP Impersonation and API Confusion on FIDO2</a>.</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/07B0etOq7OM" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<p>Thank you Stephen and Randall for inviting us and keep up with the awesome content in your YouTube channel!</p>
-
CTRAPS at Euro S&P'25 and DEF CON 33
https://francozappa.github.io/post/2025/ctraps-eurosp25/
Fri, 04 Jul 2025 00:00:00 +0000
https://francozappa.github.io/post/2025/ctraps-eurosp25/
<p>This week we presented at IEEE Euro S&P'25 <a href="https://francozappa.github.io/publication/2025/ctraps/" target="_blank" rel="noopener">CTRAPS: CTAP Impersonation and API Confusion on FIDO2</a>, a paper about the security and privacy of FIDO2, a widespread standard used for single-factor and multi-factor authentication. We focus on the <em>Client to Authenticator Protocol (CTAP)</em>, an application layer protocol spoken by a FIDO2 authenticator (e.g., a YubiKey) and a client (e.g., a smartphone or a laptop). We uncover seven CTAP design issues in the FIDO2 standard, including the lack of Client to Authenticator authentication, and eleven related new attacks we call <em>CTRAPS</em>.</p>
<p>The CTRAPS attacks are effective on any CTAP compliant FIDO2 client and authenticator since they exploit design issues, i.e., millions of FIDO2 devices and users. Their effects, include deletion of discoverable and non-discoverable credentials, DoS of an authenticator, and user tracking with FIDO2 credentials. The attacks affect not only a FIDO2 authenticator but also a relying party, e.g., by deleting the master key a user loses all the related non-discoverable credentials stored on the relying parties.</p>
<p>The eleven CTRAPS attacks are grouped into two classes:</p>
<ol>
<li>four <em>Client Impersonation (CI)</em> attacks: where the attacker impersonates a client to an authenticator over CTAP to achieve several goals, like 0-click deletion of all credentials stored on the authenticator via the reset CTAP API call.</li>
<li>seven <em>API Confusion (AC)</em> attacks: where the attacker MitM a CTAP channel between a client and an authenticator and confound the authenticator by calling a different API than the one intended to be called by the client, e.g., the client thinks it has called and authorized the make credential API while the attacker calls the reset API and deletes all credentials.</li>
</ol>
<p>We also release a <a href="https://github.com/Skiti/CTrAPs" target="_blank" rel="noopener">toolkit</a> implementing the attacks. It can be used for CTAP security testing as it includes a virtual CTAP testbed to test an authenticator without having to compromise real credentials and several malicious Clients to test various attack scenarios.</p>
<p>We successfully evaluate the CTRAPS attacks on six popular FIDO2 authenticators, including (FIPS compliant) YubiKeys, Feitian, and Solo and ten popular relying parties, like apple.com, github.com, adobe.com, and facebook.com.</p>
<p>We also release five CTRAPS attacks <a href="https://www.youtube.com/@skitisec/shorts" target="_blank" rel="noopener">demos</a>.</p>
<p>Moreover, we discovered an implementation-specific vulnerability affecting Yubikeys allowing to enumerate relying parties without authorization.
Yubico promptly acknowledged the issue, see <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35311" target="_blank" rel="noopener">CVE-2024-35311</a>, and
<a href="https://www.yubico.com/support/security-advisories/ysa-2024-02/" target="_blank" rel="noopener">YSA-2024-02</a>. They released a new firmware fixing the vulnerability which is shipped with the following Yubikeys Series: 5, Security Key, Bio, FIPS,and CSPN.</p>
<p>We will also present CTRAPS at <a href="https://defcon.org/html/defcon-33/dc-33-speakers.html#content_60350" target="_blank" rel="noopener">DEF CON 33</a>.</p>
<p>More CTRAPS resources:</p>
<ul>
<li><a href="https://francozappa.github.io/publication/2025/ctraps/paper.pdf" target="_blank" rel="noopener">paper</a></li>
<li><a href="https://francozappa.github.io/publication/2025/ctraps/poster.pdf" target="_blank" rel="noopener">poster</a></li>
<li><a href="https://francozappa.github.io/publication/2025/ctraps/slides.pdf" target="_blank" rel="noopener">slides</a></li>
</ul>
-
CTRAPS: CTAP Client Impersonation and API Confusion on FIDO2
https://francozappa.github.io/talk/ctraps-ctap-client-impersonation-and-api-confusion-on-fido2/
Fri, 20 Jun 2025 00:00:00 +0000
https://francozappa.github.io/talk/ctraps-ctap-client-impersonation-and-api-confusion-on-fido2/
<p>Talk on <a href="https://francozappa.github.io/publication/2025/ctraps/" target="_blank" rel="noopener">CTRAPS attacks on FIDO2</a> as part of ETHZ ZISC seminars.</p>
-
NDSS'26 Artifact Evaluation Comitee Self-Nomination
https://francozappa.github.io/post/2025/ae-ndss26/
Fri, 13 Jun 2025 00:00:00 +0000
https://francozappa.github.io/post/2025/ae-ndss26/
<p>Mathy Vanhoef and I are co-chairing NDSS'26 <a href="https://www.ndss-symposium.org/ndss2026/submissions/call-for-artifacts/" target="_blank" rel="noopener">Artifact Evaluation (AE)</a>.</p>
<p>We are looking for motivated PhD and Postdocs to self-nominate themselves for the NDSS'26 <a href="https://secartifacts.github.io/ndss2026/organizers" target="_blank" rel="noopener">Artifact Evaluation Committee (AEC)</a>. Joining it would offer them practical experience and may ease developing artifact submissions for their papers.</p>
<p>The self nomination form is open until <em>June 25th</em> and available <a href="https://docs.google.com/forms/d/e/1FAIpQLSdQGc5NsZnYqEW7MQw4ciXOc0UIIP4cxSo82WQxJpej42qlKA/viewform" target="_blank" rel="noopener">here</a>.</p>
<p>NDSS'26 AEC call is <a href="https://secartifacts.github.io/ndss2026/aec-call" target="_blank" rel="noopener">here</a>.</p>
-
EmuOCPP: Effective and Scalable OCPP Security and Privacy Testing
https://francozappa.github.io/publication/2025/emuocpp/
Tue, 13 May 2025 00:00:00 +0000
https://francozappa.github.io/publication/2025/emuocpp/
-
SimProcess: High Fidelity Simulation of Noisy ICS Physical Processes
https://francozappa.github.io/publication/2025/simprocess/
Tue, 13 May 2025 00:00:00 +0000
https://francozappa.github.io/publication/2025/simprocess/
-
Bluetooth Security Testing with BlueToolkit: a Large-Scale Automotive Case Study
https://francozappa.github.io/publication/2025/btoolkit/
Fri, 11 Apr 2025 00:00:00 +0000
https://francozappa.github.io/publication/2025/btoolkit/
-
KNOB Attack and Crypto 101 by Alfred Menezes
https://francozappa.github.io/post/2025/crypto101-knob/
Tue, 01 Apr 2025 00:00:00 +0000
https://francozappa.github.io/post/2025/crypto101-knob/
<p>Alfred Menezes has published a fantastic online course on real-world cryptography called <a href="https://cryptography101.ca/crypto101-deployments/" target="_blank" rel="noopener">Crypto 101: Real-World Deployments</a>.</p>
<p>It is an honor to be featured in the Bluetooth Security Lecture (Lecture 4) which talks about the KNOB attack.</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/0Y5aciplnuk" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
CheckOCPP: Automatic OCPP Packet Dissection and Compliance Check
https://francozappa.github.io/publication/2025/checkocpp/
Thu, 27 Mar 2025 00:00:00 +0000
https://francozappa.github.io/publication/2025/checkocpp/
-
CTRAPS: CTAP Impersonation and API Confusion on FIDO2
https://francozappa.github.io/publication/2025/ctraps/
Thu, 27 Mar 2025 00:00:00 +0000
https://francozappa.github.io/publication/2025/ctraps/
-
FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Multi-level Entropy-based Thresholds
https://francozappa.github.io/talk/fp-tracer-fine-grained-browser-fingerprinting-detection-via-taint-tracking-and-multi-level-entropy-based-thresholds/
Tue, 18 Mar 2025 00:00:00 +0000
https://francozappa.github.io/talk/fp-tracer-fine-grained-browser-fingerprinting-detection-via-taint-tracking-and-multi-level-entropy-based-thresholds/
<p>Talk on FP-tracer and browser fingerprinting at
<a href="https://team.inria.fr/privatics/privacy-alpine-seminar-2025-aka-privaski/" target="_blank" rel="noopener">Privasky'25</a>.</p>
-
On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats
https://francozappa.github.io/talk/on-the-insecurity-of-vehicles-against-protocol-level-bluetooth-threats/
Fri, 14 Mar 2025 00:00:00 +0000
https://francozappa.github.io/talk/on-the-insecurity-of-vehicles-against-protocol-level-bluetooth-threats/
<p>Talk on Automotive Bluetooth Security at
<a href="https://conferences.cirm-math.fr/amusec-2025.html" target="_blank" rel="noopener">AMUSEC'25</a>.</p>
<p>Cars are some of the most security-critical consumer devices. On the one hand,
owners expect rich infotainment features, including audio, hands-free calls,
contact management, or navigation through their connected mobile phone. On the
other hand, the infotainment unit exposes exploitable wireless attack
surfaces. This talk focuses on protocol-level Bluetooth threats on vehicles, a
critical but unexplored wireless attack surface. These threats are crucial
because they are portable across vehicles, and they can achieve impactful
goals, such as accessing sensitive data or even taking remote control of the
vehicle. Their evaluation is novel as prior work focused on other wireless
attack surfaces, notably Bluetooth implementation bugs. Among relevant
protocol-level threats, we pick the KNOB and BIAS attacks because they provide
the most effective strategy to impersonate arbitrary Bluetooth devices and are
not yet evaluated against vehicles.</p>
-
CFP: ACSW 2025
https://francozappa.github.io/post/2025/cfp-acsw25/
Mon, 03 Feb 2025 00:00:00 +0000
https://francozappa.github.io/post/2025/cfp-acsw25/
<p>The call for papers for the 4th Workshop on Automotive Cyber Security (ACSW)
co-located with IEEE EuroS&P 2025 is closing today, Feb 3rd AoE. Please submit
your automotive security work!</p>
<p>For more information see the ACSW <a href="https://acsw.unimore.it/index.html" target="_blank" rel="noopener">website</a> and
its <a href="https://acsw.unimore.it/past.html" target="_blank" rel="noopener">past editions</a>.</p>
-
AttackDefense Framework (ADF)
https://francozappa.github.io/project/adf/
Tue, 17 Dec 2024 00:00:00 +0000
https://francozappa.github.io/project/adf/
<p>The ADF framework is described in a paper published in the ACM TECS journal in
2024 titled <a href="https://dl.acm.org/doi/abs/10.1145/3698396" target="_blank" rel="noopener">AttackDefense Framework (ADF): Enhancing IoT Devices and
Lifecycles Threat Modeling</a> and available on
<a href="https://github.com/francozappa/adf" target="_blank" rel="noopener">GitHub</a>.</p>
-
The AttackDefense Framework (ADF)
https://francozappa.github.io/post/2024/adf-release/
Tue, 17 Dec 2024 00:00:00 +0000
https://francozappa.github.io/post/2024/adf-release/
<p>We release the <em>AttackDefense Framework (ADF)</em>, a threat modeling
framework for IoT devices and their life cycles. The ADF employs a flexible
and generic threat data structure called the <em>AttackDefense (AD) object</em>. An AD can
model attack and defense aspects, like attack vectors, surfaces, models and
defense policies and mechanisms, at the same time.</p>
<p>With the ADF, we can model, among others, security, privacy, hardware, software,
firmware, and protocol threats to a <em>device</em> (e.g., a crypto wallet) and threats to the
<em>device’s life cycle</em> (e.g., supply chain attacks while implementing a device).</p>
<p>The ADF block diagram includes four components used to <em>enhance</em> threat modeling:</p>
<p>
<figure >
<div class="d-flex justify-content-center">
<div class="w-100" ><img alt="ADF block diagram" srcset="
/post/2024/adf-release/adf-bd_hu63b64d12bf1aceb22fc319946564a383_130421_594603a7097a58de1133279b7fd3318a.webp 400w,
/post/2024/adf-release/adf-bd_hu63b64d12bf1aceb22fc319946564a383_130421_032fceec1def1f36c7951522f3255487.webp 760w,
/post/2024/adf-release/adf-bd_hu63b64d12bf1aceb22fc319946564a383_130421_1200x1200_fit_q75_h2_lanczos_3.webp 1200w"
src="https://francozappa.github.io/post/2024/adf-release/adf-bd_hu63b64d12bf1aceb22fc319946564a383_130421_594603a7097a58de1133279b7fd3318a.webp"
width="760"
height="361"
loading="lazy" data-zoomable /></div>
</div></figure>
</p>
<p>For more details about the ADF, look at:</p>
<ul>
<li><a href="https://dl.acm.org/doi/abs/10.1145/3698396" target="_blank" rel="noopener">ADF paper (ACM TECS'24)</a></li>
<li><a href="https://github.com/francozappa/adf" target="_blank" rel="noopener">ADF GitHub repo</a></li>
<li><a href="https://github.com/francozappa/adf/blob/main/blogpost.md" target="_blank" rel="noopener">ADF usage example for BLE</a></li>
<li><a href="https://horizon-orshin.eu/" target="_blank" rel="noopener">ADF contributes to ORSHIN</a></li>
</ul>
<p>Let’s Threat Model All the Things!</p>
-
E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Battery-powered Embedded Systems
https://francozappa.github.io/publication/2024/etrojans/
Mon, 09 Dec 2024 00:00:00 +0000
https://francozappa.github.io/publication/2024/etrojans/
-
A Quest to Secure Standard and Proprietary Wireless Systems
https://francozappa.github.io/talk/a-quest-to-secure-standard-and-proprietary-wireless-systems/
Mon, 22 Jul 2024 00:00:00 +0000
https://francozappa.github.io/talk/a-quest-to-secure-standard-and-proprietary-wireless-systems/
<p>In this talk we will explore recent research on real world wireless security
protocols. We will cover standard protocols such as Bluetooth pairing and
session establishment and proprietary ones such as IoT application layer
protocols used to secure traffic between companion mobile applications and
electric scooters and fitness trackers.</p>
-
Information and Entertainment for Automotive Researchers
https://francozappa.github.io/talk/information-and-entertainment-for-automotive-researchers/
Mon, 08 Jul 2024 00:00:00 +0000
https://francozappa.github.io/talk/information-and-entertainment-for-automotive-researchers/
<p>Keynote given at ACSW'24 (EuroS&P Workshop) covering Automotive
Bluetooth Security and E-Spoofer.</p>
-
FP-tracer PETS'24 Paper and Artifact
https://francozappa.github.io/post/2024/fptracer-pets/
Mon, 01 Jul 2024 00:00:00 +0000
https://francozappa.github.io/post/2024/fptracer-pets/
<p>Modern websites use <em>attribute-based browser fingerprinting</em> to track us(ers) using
our browser’s JavaScript API. They can track us without cookies, and
regardless of what we click on websites’ consent banners.</p>
<p>With <a href="https://www.petsymposium.org/popets/2024/popets-2024-0092.php" target="_blank" rel="noopener">FP-tracer</a>,
we present a new and effective method to detect attribute-based browser fingerprinting using
a taint tracking aware browser, and joint entropy thresholds. With FP-tracer, we see not
only the trackers but also how much they track us. FP-tracer is available as
an <a href="https://github.com/soumboussaha/FP-tracer" target="_blank" rel="noopener">open-source artifact</a>.</p>
<p>Through FP-tracer, we assessed 80K domains. Our study found that 8% of the
domains collected enough attributes to track a browser uniquely. Sometimes, a
browser can be tracked with only two attributes, i.e., userAgent and storageEstimate.
Read the paper for more insights!</p>
<p>Soumaya Boussaha will present FP-tracer at <a href="https://www.petsymposium.org/2024/" target="_blank" rel="noopener">PETS'24</a>.</p>
<p>FP-tracer contributes to <a href="https://encopia.org/" target="_blank" rel="noopener">ENCOPIA</a>, where we are
ENabling COnnected PrIvacy Assurance.</p>
-
A Quest to Secure Proprietary and Standard Wireless Protocols
https://francozappa.github.io/talk/a-quest-to-secure-proprietary-and-standard-wireless-protocols/
Fri, 17 May 2024 00:00:00 +0000
https://francozappa.github.io/talk/a-quest-to-secure-proprietary-and-standard-wireless-protocols/
<p>Keynote given at
<a href="https://ressi2024.sciencesconf.org/" target="_blank" rel="noopener">RESSI'24</a>
covering, among others,
<a href="https://francozappa.github.io/publication/2023/bluffs/" target="_blank" rel="noopener">BLUFFS</a>,
<a href="https://francozappa.github.io/publication/2023/espoofer/" target="_blank" rel="noopener">E-Spoofer</a>, and
<a href="https://francozappa.github.io/publication/2022/breakmi/" target="_blank" rel="noopener">BreakMi</a>.</p>
-
A Quest to Secure Standard and Proprietary Wireless Protocols
https://francozappa.github.io/talk/a-quest-to-secure-standard-and-proprietary-wireless-protocols/
Tue, 14 May 2024 00:00:00 +0000
https://francozappa.github.io/talk/a-quest-to-secure-standard-and-proprietary-wireless-protocols/
<p>Talk covering, among others,
<a href="https://francozappa.github.io/publication/2023/bluffs/" target="_blank" rel="noopener">BLUFFS</a>,
<a href="https://francozappa.github.io/publication/2023/espoofer/" target="_blank" rel="noopener">E-Spoofer</a>, and
<a href="https://francozappa.github.io/publication/2022/breakmi/" target="_blank" rel="noopener">BreakMi</a>.</p>
-
BLUFFS: Breaking and fixing the Bluetooth standard. One More Time.
https://francozappa.github.io/talk/bluffs-breaking-and-fixing-the-bluetooth-standard.-one-more-time./
Thu, 04 Apr 2024 00:00:00 +0000
https://francozappa.github.io/talk/bluffs-breaking-and-fixing-the-bluetooth-standard.-one-more-time./
<h2 id="youtube-37c3">YouTube (37c3)</h2>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/2HstGZPZpZY" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem
https://francozappa.github.io/talk/e-spoofer-attacking-and-defending-xiaomi-electric-scooter-ecosystem/
Thu, 04 Apr 2024 00:00:00 +0000
https://francozappa.github.io/talk/e-spoofer-attacking-and-defending-xiaomi-electric-scooter-ecosystem/
<h2 id="youtube-wisec23">YouTube (WiSec'23)</h2>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/yQvsoKBc304" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
E-Spoofer and BLUFFS Talks at THCON'24
https://francozappa.github.io/post/2024/thcon-talks/
Wed, 13 Mar 2024 00:00:00 +0000
https://francozappa.github.io/post/2024/thcon-talks/
<p>Salut, Marco Casagrande will talk about
<a href="https://francozappa.github.io/publication/2023/espoofer/" target="_blank" rel="noopener">E-Spoofer</a>
and I will talk about
<a href="https://francozappa.github.io/publication/2023/bluffs/" target="_blank" rel="noopener">BLUFFS</a>
at the 2024 Toulouse Hacking Convention (THCON)! Both research works are
funded by the <a href="https://horizon-orshin.eu/" target="_blank" rel="noopener">ORSHIN</a> Horizon Europe research grant.</p>
<ul>
<li>E-Spoofer talk: 4th April 2024, <em>10:15-10:45</em></li>
<li>BLUFFS talk: 4th April 2024, <em>11:15-10:45</em></li>
<li>Where: Marthe Condat auditorium, Paul Sabatier University, Toulouse</li>
<li><a href="https://thcon.party/program/" target="_blank" rel="noopener">THCON program</a></li>
</ul>
<p>See you in Toulouse 🇫🇷 at <a href="https://thcon.party/" target="_blank" rel="noopener">THCON'24</a></p>
-
FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Multi-level Entropy-based Thresholds
https://francozappa.github.io/publication/2024/fptracer/
Mon, 11 Mar 2024 00:00:00 +0000
https://francozappa.github.io/publication/2024/fptracer/
-
Bluetooth Security at NECS Winter School
https://francozappa.github.io/talk/bluetooth-security-at-necs-winter-school/
Mon, 08 Jan 2024 00:00:00 +0000
https://francozappa.github.io/talk/bluetooth-security-at-necs-winter-school/
<p>This lecture overviews recent and impactful research on Bluetooth
security and privacy. We will cover protocol-level vulnerabilities in
the Bluetooth specification affecting billions of devices, such as KNOB,
BIAS, BLUR, and BLUFFS.</p>
<p>Moreover, we will explore works about insecure
and proprietary protocols built on Bluetooth, including BreakMi
exploiting Xiaomi and Fitbit fitness tracker protocols and E-Spoofer
compromising Xiaomi’s electric scooter protocols.</p>
<p>While presenting our research works, we will also teach basic and
advanced concepts about the security and privacy of IoT protocols.</p>
-
BLUFFS: Breaking and fixing the Bluetooth standard. One More Time.
https://francozappa.github.io/talk/bluffs-breaking-and-fixing-the-bluetooth-standard.-one-more-time./
Sat, 30 Dec 2023 00:00:00 +0000
https://francozappa.github.io/talk/bluffs-breaking-and-fixing-the-bluetooth-standard.-one-more-time./
<h2 id="abstract">Abstract</h2>
<p>Ciao! We present the BLUFFS attacks (CVE-2023-24023), six novel attacks
breaking Bluetooth’s forward and future secrecy. Our attacks enable device
impersonation and machine-in-the-middle across sessions by compromising and
re-using one session key. We discuss the four vulnerabilities in the Bluetooth
specification enabling the attacks, two of which are new and related to
unilateral and repeatable session key derivation. We describe the toolkit we
developed and open-sourced to test our attacks via firmware binary patching,
our experiments where we exploited 18 heterogeneous Bluetooth devices, and the
practical and backward-compliant session key derivation protocol we built to
fix the attacks by design. We also cover related work like KNOB, BIAS, and
BLUR, and educational Bluetooth security tips and tricks.</p>
<p>Bluetooth is a pervasive technology for wireless communication.
Billions of devices use it in sensitive applications and to exchange
private data. The security of Bluetooth depends on the Bluetooth
standard and its two security mechanisms: pairing and session establishment.
No prior work, including the standard itself, analyzed the future and forward
secrecy guarantees of these mechanisms, e.g., if Bluetooth pairing and session
establishment defend past
and future sessions when the adversary compromises the current.
To address this gap, we present six novel attacks, defined as the
BLUFFS attacks, breaking Bluetooth sessions’ forward and future
secrecy. Our attacks enable device impersonation and machine-in-the-middle
across sessions by only compromising one session key. The attacks exploit two
novel vulnerabilities that we uncover in the Bluetooth standard related to
unilateral and repeatable session key derivation. As the attacks affect
Bluetooth at the architectural level, they are effective regardless of the
victim’s hardware and software details (e.g., chip, stack, version, and
security mode).</p>
<p>We also release BLUFFS, a low-cost toolkit to perform and automatically check
the effectiveness of our attacks. The toolkit employs seven original patches
to manipulate and monitor Bluetooth session key derivation by dynamically
patching a closed-source Bluetooth firmware that we reverse-engineered. We
show that our attacks have a critical and large-scale impact on the Bluetooth
ecosystem, by evaluating them on seventeen diverse Bluetooth chips (eighteen
devices) from popular hardware and software vendors and supporting the most
popular Bluetooth versions. Motivated by our empirical findings, we develop
and successfully test an enhanced key derivation function for Bluetooth that
stops by-design our six attacks and their four root causes. We show how to
effectively integrate our fix into the Bluetooth standard and discuss
alternative implementation-level mitigations. We responsibly disclosed our
contributions to the Bluetooth SIG.</p>
<h2 id="youtube">YouTube</h2>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/2HstGZPZpZY" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<h2 id="media-ccc">Media CCC</h2>
<iframe width="512" height="288"
src="https://media.ccc.de/v/37c3-12342-bluffs_bluetooth_forward_and_future_secrecy_attacks_and_defenses/oembed"
frameborder="0" title="BLUFFS" allowfullscreen></iframe>
-
Recorded BLUFFS Talk at 37c3
https://francozappa.github.io/post/2023/bluffs-37c3-video/
Sat, 30 Dec 2023 00:00:00 +0000
https://francozappa.github.io/post/2023/bluffs-37c3-video/
<h2 id="youtube">YouTube</h2>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/2HstGZPZpZY" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<h2 id="media-ccc">Media CCC</h2>
<iframe width="512" height="288"
src="https://media.ccc.de/v/37c3-12342-bluffs_bluetooth_forward_and_future_secrecy_attacks_and_defenses/oembed"
frameborder="0" title="BLUFFS" allowfullscreen></iframe>
<h2 id="more">More</h2>
<p><a href="https://media.ccc.de/v/37c3-12342-bluffs_bluetooth_forward_and_future_secrecy_attacks_and_defenses" target="_blank" rel="noopener">here</a>.</p>
-
BLUFFS Talk at 37c3
https://francozappa.github.io/post/2023/bluffs-37c3/
Fri, 22 Dec 2023 00:00:00 +0000
https://francozappa.github.io/post/2023/bluffs-37c3/
<p>See you in Hamburg 🇩🇪 at
<a href="https://events.ccc.de/congress/2023/infos/index.html" target="_blank" rel="noopener">37c3</a></p>
<p>
<figure >
<div class="d-flex justify-content-center">
<div class="w-100" ><img src="https://francozappa.github.io/images/37c3.png" alt="Schedule" loading="lazy" data-zoomable /></div>
</div></figure>
</p>
-
BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
https://francozappa.github.io/post/2023/bluffs-ccs23/
Mon, 27 Nov 2023 00:00:00 +0000
https://francozappa.github.io/post/2023/bluffs-ccs23/
<p>Breaking and fixing the Bluetooth standard. One More Time.</p>
<ul>
<li><a href="https://dl.acm.org/doi/pdf/10.1145/3576915.3623066" target="_blank" rel="noopener">Paper</a></li>
<li><a href="https://francozappa.github.io/publication/2023/bluffs/slides.pdf" target="_blank" rel="noopener">Slides</a></li>
<li><a href="https://github.com/francozappa/bluffs" target="_blank" rel="noopener">Toolkit</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24023" target="_blank" rel="noopener">CVE-2023-24023</a></li>
<li><a href="https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/bluffs-vulnerability/" target="_blank" rel="noopener">BT SIG note</a></li>
</ul>
<p>
<figure >
<div class="d-flex justify-content-center">
<div class="w-100" ><img src="https://francozappa.github.io/images/omt.gif" alt="One More Time" loading="lazy" data-zoomable /></div>
</div></figure>
</p>
-
BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
https://francozappa.github.io/publication/2023/bluffs/
Mon, 06 Nov 2023 00:00:00 +0000
https://francozappa.github.io/publication/2023/bluffs/
-
E-Spoofer paper presentation at WiSec'23
https://francozappa.github.io/post/2023/espoofer-wisec-video/
Mon, 07 Aug 2023 00:00:00 +0000
https://francozappa.github.io/post/2023/espoofer-wisec-video/
<p>Marco Casagrande’s presentation of our <a href="https://francozappa.github.io/publication/2023/espoofer/paper.pdf" target="_blank" rel="noopener">E-Spoofer paper</a> about Xiaomi e-scooters'
security and privacy recorded at ACM WiSec'23</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/yQvsoKBc304" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
Bluetooth Security and the KNOB Attack on BLE
https://francozappa.github.io/talk/bluetooth-security-and-the-knob-attack-on-ble/
Tue, 04 Jul 2023 00:00:00 +0000
https://francozappa.github.io/talk/bluetooth-security-and-the-knob-attack-on-ble/
<p>In this lecture we cover an Introduction about Bluetooth security, its main
transports (BC, BLE), procedures (discovery, connect) and logical entities
(Host, Controller, HCI). Then we look at Bluetooth security architecture and
the specific BC/BLE algorithms and protocols. We conclude by talking about
state of the art attacks that we developed against this protocols including
KNOB, BIAS, and BLUR.</p>
<p>In this lab we cover an Introduction about Bluetooth security, its main
transports (BC, BLE), procedures (discovery, connect) and logical entities
(Host, Controller, HCI). Then we look at Bluetooth security architecture and
the specific BC/BLE algorithms and protocols. We conclude by talking about
state of the art attacks that we developed against this protocols including
KNOB, BIAS, and BLUR</p>
<p>Summer school program
<a href="https://www.s3.eurecom.fr/~aurel/summer-school-2023/program/" target="_blank" rel="noopener">here</a>.</p>
-
E-Spoofer master's thesis ranked 2nd for Italian CLUSIT Award
https://francozappa.github.io/post/2023/espoofer-clusit/
Mon, 26 Jun 2023 00:00:00 +0000
https://francozappa.github.io/post/2023/espoofer-clusit/
<p>Riccardo Cestaro’s master thesis, done at EURECOM in my group as a visiting student from UniPD,
won the <em>second prize</em> in the CLUSIT (Italian Association for Information Security) thesis
contest. CLUSIT yearly awards some of the best Information security theses in Italy.
The list of winners is available
<a href="https://tesi.clusit.it/vincitori.php" target="_blank" rel="noopener">here</a>.</p>
<p>Riccardo’s thesis contributed to the
<a href="https://francozappa.github.io/publication/2023/espoofer/paper.pdf" target="_blank" rel="noopener">E-Spoofer paper</a>
that we recently presented at WiSec'23.</p>
<p>Bravo Riccardo, and kudos to the co-supervisors.</p>
-
Hiring a postdoc interested in IIoT network security
https://francozappa.github.io/post/2023/hiring-postdoc-pepr5g/
Tue, 20 Jun 2023 00:00:00 +0000
https://francozappa.github.io/post/2023/hiring-postdoc-pepr5g/
<p>I am looking for a postdoc interested in
<strong>Industrial Internet-of-Thing (IIoT) network security and privacy</strong>. The
postdoc will be funded by the PEPR5g ANR project, work under my supervision at
and join <a href="https://www.s3.eurecom.fr/" target="_blank" rel="noopener">EURECOM’s S3 group</a>.
I can start hiring from the beginning of this summer.</p>
<p>My research revolves around <em>applied</em> system security and privacy (e.g.,
security assessment, vulnerability analysis and exploitation of deployed
systems). To get a feeling, please see my
<a href="https://francozappa.github.io/" target="_blank" rel="noopener">website</a> and
<a href="https://francozappa.github.io/publication/" target="_blank" rel="noopener">publications</a>.</p>
<p>If you are interested please send me (<a href="mailto:[email protected]">[email protected]</a>) an <em>HTML-less</em> email containing:</p>
<ul>
<li>[PEPR5G] in the email subject</li>
<li>The names and email addresses of two referrer (e.g., PhD advisors) in the email body</li>
<li>A CV with a list to publications in PDF</li>
<li>A short research statement in PDF (max 2 pages) explaining why you are interested in IIoT network security and
privacy, what you did so far and are what you planning to do in this research area</li>
</ul>
<p>Elseif you know someone that might be interested, please spread the word.</p>
<p>Grazie!</p>
-
BreakMi: Reversing, Exploiting and Fixing Xiaomi (and Fitbit) Fitness Tracking Ecosystems
https://francozappa.github.io/talk/breakmi-reversing-exploiting-and-fixing-xiaomi-and-fitbit-fitness-tracking-ecosystems/
Sat, 03 Jun 2023 00:00:00 +0000
https://francozappa.github.io/talk/breakmi-reversing-exploiting-and-fixing-xiaomi-and-fitbit-fitness-tracking-ecosystems/
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/MeLeg1sVmss" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<p>Xiaomi is the leading company in the fitness tracking industry. Successful
attacks on its fitness tracking ecosystem would result in severe consequences,
including the loss of sensitive health and personal data. Despite these
relevant risks, we know very little about the security mechanisms adopted by
Xiaomi. In this work, we uncover them and show that they are insecure. In
particular, Xiaomi protects its fitness tracking ecosystem with custom
application-layer protocols spoken over insecure Bluetooth Low-Energy (BLE)
connections (ignoring standard BLE security mechanisms already supported by
their devices) and TLS connections. We identify severe vulnerabilities
affecting such proprietary protocols, including unilateral and replayable
authentication.</p>
<p>Those issues are critical as they affect all Xiaomi trackers released since
2016 and up-to-date Xiaomi companion apps for Android and iOS. We show in
practice how to exploit the identified vulnerabilities by presenting six
impactful attacks. Four attacks enable to wirelessly impersonate any Xiaomi
fitness tracker and companion app, man-in-the-middle (MitM) them, and
eavesdrop on their communication. The other two attacks leverage a malicious
Android application to remotely eavesdrop on data from a tracker and
impersonate a Xiaomi fitness app.</p>
<p>Overall, the attacks have a high impact as they can be used to exfiltrate and
inject sensitive data from any Xiaomi tracker and compatible app. We propose
five practical and low-overhead countermeasures to mitigate the presented
vulnerabilities. Moreover, we present BreakMi, a modular toolkit that we
developed to automate our reverse-engineering process and attacks. breakmi
understands Xiaomi application-layer proprietary protocols, reimplements
Xiaomi security mechanisms, and automatically performs our attacks. We
demonstrate that our toolkit can be generalized by extending it to be
compatible with the Fitbit ecosystem. We will open-source BreakMi.</p>
<p>More <a href="https://hardwear.io/usa-2023/speakers/marco-and-daniele.php" target="_blank" rel="noopener">here</a>.</p>
-
On the (In)securities of Popular Standard and Proprietary Wireless Protocols
https://francozappa.github.io/talk/on-the-insecurities-of-popular-standard-and-proprietary-wireless-protocols/
Thu, 01 Jun 2023 00:00:00 +0000
https://francozappa.github.io/talk/on-the-insecurities-of-popular-standard-and-proprietary-wireless-protocols/
<p>This talk covers our recent research on the (in)securities of
proprietary and standard wireless security protocols used daily by
millions of devices and users. In particular, I will cover the BLUR
attacks on Bluetooth, a novel class of threats capable of exploiting
Bluetooth Classic from Bluetooth Low Energy and vice versa. Then, I
will report on our security evaluation of protocol-level Bluetooth
threats on vehicles (i.e., cars), a currently unexplored by impactful
attack surface. Next, I will shift to proprietary wireless protocols
and describe our security assessments of Xiaomi and Fitbit fitness
trackers’ proprietary protocols. Finally, I will conclude by covering
our latest work on custom Xiaomi e-scooters’ wireless protocols.</p>
-
E-Spoofer paper at WiSec'23
https://francozappa.github.io/post/2023/espoofer-wisec/
Wed, 31 May 2023 00:00:00 +0000
https://francozappa.github.io/post/2023/espoofer-wisec/
<p>Marco Casagrande presented at
<a href="https://wisec2023.surrey.ac.uk/program/" target="_blank" rel="noopener">WiSec'23</a>
our paper titled: <strong>E-Spoofer: Attacking and Defending Xiaomi Electric Scooter
Ecosystem</strong>.</p>
<p>In a nutshell, we reverse-engineered the proprietary wireless protocols used
by Xiaomi e-scooters and companions applications (i.e., Mi Home) over BLE,
found critical vulnerabilities, exploited them to get arbitrary read and
write capabilities on an e-scooter both in proximity and remotely (via a
malicious Android app), developed concrete countermeasures, released a toolkit
to reproduce our findings and tamper with the protocols, and responsibly
disclosed our results to Xiaomi.</p>
<p>Useful links:
<a href="https://francozappa.github.io/publication/2023/espoofer/paper.pdf" target="_blank" rel="noopener">Paper</a>,
<a href="https://francozappa.github.io/publication/2023/espoofer/slides.pdf" target="_blank" rel="noopener">Slides</a>,
<a href="https://github.com/Skiti/E-Spoofer" target="_blank" rel="noopener">Code</a>,
<a href="https://www.youtube.com/@ESpoofer-yv9li" target="_blank" rel="noopener">Demos</a>,
<a href="https://twitter.com/acm_wisec/status/1663184140248797184" target="_blank" rel="noopener">WiSec tweet</a>.</p>
<p>This work continues our exploration of obscure proprietary protocols used in
popular and high risk setups, including our research on
<a href="https://francozappa.github.io/publication/2022/breakmi/" target="_blank" rel="noopener">Xiaomi and Fitbit fitness trackers</a>
presented last year at CHES.</p>
<p>Shout-out to the paper’s co-authors:
Marco Casagrande, Riccardo Cestaro,
<a href="https://www.math.unipd.it/~elosiouk/" target="_blank" rel="noopener">Eleonora Losiouk</a>, and
<a href="https://www.math.unipd.it/~conti/" target="_blank" rel="noopener">Mauro Conti</a>. And the funding
partners: <a href="https://horizon-orshin.eu/" target="_blank" rel="noopener">ORSHIN (EU)</a> and the
Air Force Office of Scientific Research.</p>
-
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem
https://francozappa.github.io/publication/2023/espoofer/
Tue, 30 May 2023 00:00:00 +0000
https://francozappa.github.io/publication/2023/espoofer/
-
EURECOM Digital Security opening for an Asst. Prof.
https://francozappa.github.io/post/2023/eurecom-hiring-prof/
Wed, 03 May 2023 00:00:00 +0000
https://francozappa.github.io/post/2023/eurecom-hiring-prof/
<p>The Digital Security Department of EURECOM invites applications for a <em>tenured</em>
position at the <em>Assistant Professor</em> level in the area of <em>Digital Security</em>.
Starting date: ASAP. Full info <a href="https://www.eurecom.fr/en/job/digital-security" target="_blank" rel="noopener">here</a>.</p>
<p>Please spread the word 😄 !</p>
-
BreakMi talk at Hardwear.io USA 2023 🐞
https://francozappa.github.io/post/2023/breakmi-hwio/
Wed, 12 Apr 2023 00:00:00 +0000
https://francozappa.github.io/post/2023/breakmi-hwio/
<p>Our talk titled <strong>BreakMi: Reversing, Exploiting and Fixing Xiaomi (and Fitbit) Fitness Tracking Ecosystems</strong> has been accepted at
Hardwear.io USA'23. The talk extends and complements our paper titled
<a href="https://tches.iacr.org/index.php/TCHES/article/download/9704/9234" target="_blank" rel="noopener"><em>BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem</em></a>.
The talk covers new relevant and educational aspect about our study that we
did not have time to talk about during the
<a href="https://www.youtube.com/watch?t=3412&v=zD5EdvGs98U&feature=youtu.be" target="_blank" rel="noopener">paper presentation at CHES'22</a>.
For instance we will cover in detail:</p>
<ul>
<li>Our reverse engineering methodology that the community can adopt to
tackle similar problems.</li>
<li>BreakMi’s implementation details and attack demos from the <a href="https://github.com/Skiti/BreakMi" target="_blank" rel="noopener">BreakMi repository</a></li>
<li>The Fitbit fitness tracker ecosystem (owned by Google) and how BreakMi can be
used to evaluate and exploit Fitbit fitness trackers</li>
<li>Responsible disclosure insights with Google and Xiaomi</li>
</ul>
<p>Shout-out to our collaborators
<a href="https://www.math.unipd.it/~elosiouk/" target="_blank" rel="noopener">Eleonora Losiouk</a>,
<a href="https://www.math.unipd.it/~conti/" target="_blank" rel="noopener">Mauro Conti</a>, and
<a href="https://nebelwelt.net/" target="_blank" rel="noopener">Mathias Payer</a>!</p>
<p>Other relevant links: <a href="https://hardwear.io/usa-2023/speakers/marco-and-daniele.php" target="_blank" rel="noopener">Hardwear.io</a>,
<a href="https://twitter.com/hardwear_io/status/1645486885219827714" target="_blank" rel="noopener">Twitter</a>,
<a href="https://www.linkedin.com/feed/update/urn:li:activity:7051287921869385728/" target="_blank" rel="noopener">LinkedIn</a>.</p>
-
BreakMI Poster Presentation at EURECOM SC
https://francozappa.github.io/post/2023/breakmi-poster/
Mon, 06 Feb 2023 00:00:00 +0000
https://francozappa.github.io/post/2023/breakmi-poster/
<p>Marco Casagrande presented his excellent
<a href="https://francozappa.github.io/publication/2022/breakmi/poster.pdf" target="_blank" rel="noopener">poster</a>
about <a href="https://tches.iacr.org/index.php/TCHES/article/download/9704/9234" target="_blank" rel="noopener">BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem</a>
during EURECOM’s Scientific Council (SC).</p>
<p>
<figure >
<div class="d-flex justify-content-center">
<div class="w-100" ><img alt="Image alt" srcset="
/post/2023/breakmi-poster/images/poster_hu71f71713b931b7aeee0ba9752f154afd_934076_d9f19a8ccdd4fc3f9d33b4dcdc0af9cc.webp 400w,
/post/2023/breakmi-poster/images/poster_hu71f71713b931b7aeee0ba9752f154afd_934076_28579351d3ce547cbebdd64164fdbc1a.webp 760w,
/post/2023/breakmi-poster/images/poster_hu71f71713b931b7aeee0ba9752f154afd_934076_1200x1200_fit_q75_h2_lanczos.webp 1200w"
src="https://francozappa.github.io/post/2023/breakmi-poster/images/poster_hu71f71713b931b7aeee0ba9752f154afd_934076_d9f19a8ccdd4fc3f9d33b4dcdc0af9cc.webp"
width="534"
height="760"
loading="lazy" data-zoomable /></div>
</div></figure>
</p>
<p>For more info see at the paper’s presentation starting around min 56:</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/zD5EdvGs98U" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
ENCOPIA
https://francozappa.github.io/project/encopia/
Thu, 26 Jan 2023 00:00:00 +0000
https://francozappa.github.io/project/encopia/
<h2 id="contacts">Contacts</h2>
<p><a href="https://encopia.org/" target="_blank" rel="noopener">Website</a></p>
<h2 id="core-concept-and-innovation">Core Concept and Innovation</h2>
<p>Today’s IoT devices collect huge amounts of data and share them with cloud
services. In turn, Big Data analytics are used to analyze this data to provide
new services such as predictive maintenance, more efficient routing and
targeted advertisement. As the world becomes pervasively sentient with sensors
placed in all kinds of daily devices, opting out is no longer possible.
Devices like autonomous cars, smart screens and smart glasses will record
personal information of all passersby, resulting in a conflict between
individual privacy rights and the interest of making the benefits of big data
analytics available to society as a whole.</p>
<p>To ensure both goals are achievable, great care in the design and development
of the complete IoT system from the device to the cloud service is necessary.
This project aims at automating the verification of privacy goals of IoT
services, from sensor devices all the way into the cloud services — during
development and after deployment.</p>
<h2 id="scientific-and-technological-goals">Scientific and Technological Goals</h2>
<p>We propose to use binary analysis methods to make privacy goals testable in an
automated fashion for the complete life cycle of sensitive information. Tools
developed in this project will ensure that sensitive data can be tracked
through programs and services by analyzing the software used and tracking data
flows within them. Automated privacy analysis tools do not exist today. Yet
binary analysis has made great strides in the last years. With a combination
of binary-level function detection and information flow tracking, data can be
traced through applications along its life cycle, tracking its usage and
detecting potential privacy breaches when they occur. By combining
state-of-the-art binary analysis with dynamic data flow tracking in the cloud
through JIT compiler instrumentation, we achieve an end-to-end privacy
tracking of sensitive data.</p>
<h2 id="future-outlook">Future Outlook</h2>
<p>The wide availability and sharing of vast amounts of data is necessary to
drive digital innovation and leverage the powerful tools of big data and
machine learning for the future knowledge society. The proposed tools will
enable developers, third-party providers and users to ensure that data is used
as intended and that protective mechanisms such as pseudonymization,
encryption or differential privacy are applied. The researched methods can
also be applied in certification schemes, which are currently under
development under the European Cybersecurity Act.</p>
<h2 id="consortium">Consortium</h2>
<ul>
<li>Langlauf Security Automation GmbH</li>
<li>Siemens AG</li>
<li>SAP Labs France</li>
<li>EURECOM, Software and System Security Group</li>
<li>University of Lübeck, Institute for IT Security</li>
</ul>
-
Open-source ReSilient Hardware and software for Internet of thiNgs (ORSHIN)
https://francozappa.github.io/project/orshin/
Thu, 26 Jan 2023 00:00:00 +0000
https://francozappa.github.io/project/orshin/
<h2 id="contacts">Contacts</h2>
<p><a href="https://horizon-orshin.eu/" target="_blank" rel="noopener">Website</a>,
<a href="https://twitter.com/ORSHIN_HE" target="_blank" rel="noopener">Twitter</a>,
<a href="https://www.linkedin.com/company/orshin-horizon-europe-project-101070008/" target="_blank" rel="noopener">LinkedIn</a>,
<a href="https://vimeo.com/technikon" target="_blank" rel="noopener">Vimeo</a></p>
<h2 id="about">About</h2>
<p>It is common wisdom that cyber security is only as strong as the weakest link
in a chain. Therefore, the main challenge is to identify the critical points
of IoT infrastructure. To address this issue, ORSHIN is creating the first
generic and integrated methodology, called trusted lifecycle, to develop
secure network devices based on open-source components while managing their
entire lifecycle. ORSHIN’s trustworthy lifecycle consists of different phases
(design, implementation, evaluation, installation, maintenance and retirement)
that form a chain of trust. This lifecycle defines how the safety objectives
are translated into policies for defined phases. Using this holistic view,
ORSHIN will address critical links, reduce threats and improve security of
open-source devices.</p>
<h2 id="vision">Vision</h2>
<p>The open-source initiative represents a significant shift in the industry,
providing the opportunity to share knowledge between industry and research and
enabling rapid time-to-market for solutions, but there is still much room for
improvement - particularly with a view to cyber security. Therefore, the
ORSHIN project team will step together and develop a new approach that will
improve cyber security, manage the entire lifecycle of trustworthy network and
create a secure infrastructure for connected devices. To meet this challenge
ORSHIN will work on building a trusted open-source hardware and software that
will significantly reduce the risks associated with IoT devices - from design
to its retirement, as a chain of trust called the trusted lifecycle.</p>
<h2 id="consortium">Consortium</h2>
<p>The ORSHIN consortium consists of seven partners from six European countries.
It consists of a well-balanced mixture between academic and industrial players, from large
semiconductor to small SMEs.</p>
<ul>
<li>Technikon (Austria)</li>
<li>KU Leuven (Belgium)</li>
<li>EURECOM (France)</li>
<li>NXP (Germany)</li>
<li>Security Pattern (Italy)</li>
<li>Texplained (France)</li>
<li>Tropic square (Czech Republic)</li>
</ul>
<h2 id="funding">Funding</h2>
<ul>
<li>Horizon Europe: HORIZON-CL3-2021-CS-01-02</li>
<li>Reference number: 101070008</li>
<li>Project start: 01.10.2022</li>
<li>Project duration: 36 months</li>
<li>Costs: € 3.814.500,00</li>
<li>Funding: 100,00% EU-funded</li>
</ul>
-
ACM CPSS'23 CFP is Open!
https://francozappa.github.io/post/2022/cfp-cpss23/
Thu, 01 Dec 2022 00:00:00 +0000
https://francozappa.github.io/post/2022/cfp-cpss23/
<p>The call for papers for 2023 ACM <em>Cyber-Physical System Security Workshop
(CPSS)</em> is open. The workshop is held in conjunction with ACM AsiaCCS'23
in Melbourne, Australia.
For more information see the CPSS <a href="https://www.nics.uma.es/CPSS2023/" target="_blank" rel="noopener">website</a> and
its <a href="https://www.nics.uma.es/CPSS2023/#CFP" target="_blank" rel="noopener">call for papers</a>.</p>
<h2 id="deadlines">Deadlines</h2>
<p>All deadlines are at 11.59PM / 23:59 American Samoa Time</p>
<ul>
<li>Submission: January 30, 2023</li>
<li>Notification: March 15, 2023</li>
<li>Camera-ready: March 30, 2023</li>
</ul>
<h2 id="scope">Scope</h2>
<p>Cyber-Physical Systems (CPS) of interest to this workshop consist of
large-scale interconnected systems of heterogeneous components interacting
with their physical environments. There exist a multitude of CPS devices and
applications deployed to serve critical functions in our lives thus making
security an important non-functional attribute of such systems. This workshop
will provide a platform for professionals from academia, government, and
industry to discuss novel ways to address the ever-present security challenges
facing CPS. We seek submissions describing theoretical and practical solutions
to security challenges in CPS. Submissions pertinent to the security of
embedded systems, IoT, SCADA, smart grid, and other critical infrastructure
are welcome.</p>
<h2 id="topic-of-interest">Topic of interest</h2>
<ul>
<li>Attack detection for CPS</li>
<li>Authentication and access control for CPS</li>
<li>Autonomous vehicle security</li>
<li>Availability and auditing for CPS</li>
<li>Blockchain for CPS security</li>
<li>Data security and privacy for CPS</li>
<li>Deception Technologies for CPS</li>
<li>Digital twins/Cyber range for CPS security</li>
<li>Embedded systems security</li>
<li>Formal methods in CPS</li>
<li>Industrial control system security</li>
<li>IoT security</li>
<li>Legacy CPS system protection</li>
<li>Lightweight crypto and security</li>
<li>Maritime cyber security</li>
<li>Recovery from cyber attacks</li>
<li>Security and risk assessment for CPS</li>
<li>Security architectures for CPS</li>
<li>Security by design for CPS</li>
<li>Smart grid security</li>
<li>Threat modeling for CPS</li>
<li>Transportation system security</li>
<li>Vulnerability analysis for CPS</li>
<li>Wireless sensor network security</li>
</ul>
-
BreakMi paper presented at IACR CHES'22
https://francozappa.github.io/post/2022/breakmi-ches/
Mon, 26 Sep 2022 00:00:00 +0000
https://francozappa.github.io/post/2022/breakmi-ches/
<p>We presented our paper titled <em>BreakMi: Reversing, Exploiting
and Fixing Xiaomi Fitness Tracking Ecosystem</em> at <a href="https://ches.iacr.org/2022/" target="_blank" rel="noopener">CHES 2022</a>
in the hardware security track.</p>
<p>Here is the excellent
<a href="https://www.youtube.com/watch?v=zD5EdvGs98U&t=3412s" target="_blank" rel="noopener">presentation</a>
given by Marco Casagrande. You can also check out the presentation
<a href="https://francozappa.github.io/publication/2022/breakmi/slides.pdf" target="_blank" rel="noopener">slides</a> and the
<a href="https://github.com/Skiti/BreakMi" target="_blank" rel="noopener">BreakMi repository</a>
to reproduce our findings (with the help of video tutorials nicely prepared by
Marco).</p>
<p>For more information, such our reverse engineering methodology, analysis and exploitation of <em>Fitbit</em> trackers,
and <em>countermeasures</em>, have a look at the <a href="https://tches.iacr.org/index.php/TCHES/article/download/9704/9234" target="_blank" rel="noopener">paper</a>.</p>
-
BLURtooth video, new CVE, and GH repo
https://francozappa.github.io/post/2022/blur-updates/
Wed, 17 Aug 2022 00:00:00 +0000
https://francozappa.github.io/post/2022/blur-updates/
<p>I’m glad to share three updates about the <a href="https://nebelwelt.net/files/22AsiaCCS.pdf" target="_blank" rel="noopener">BLURtooth paper</a>.</p>
<p>We successfully tested the BLUR attacks on a
Google Pixel 6 (Bluetooth 5.2) and submitted our findings to
Google. They classified the report with high severity, assigned
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20361" target="_blank" rel="noopener">CVE-2022-20361</a>,
and shipped fixes as part of
<a href="https://source.android.com/docs/security/bulletin/2022-08-01" target="_blank" rel="noopener">August’s Android Security bulletin</a>.
More details about the fixes can be found
<a href="https://android.googlesource.com/platform/system/bt/+/6ad3f69b2199d953647e1053e8de2a8c26f1b8d6" target="_blank" rel="noopener">here</a>.
This is yet another finding demonstrating that the attacks are effective
on all Bluetooth versions supporting CTKD unlike stated
<a href="https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/blurtooth/" target="_blank" rel="noopener">in this note from the Bluetooth SIG</a>
.</p>
<p>After following responsible disclosure we also
publish the instructions to reproduce the BLUR attacks
in a <a href="https://github.com/francozappa/blur" target="_blank" rel="noopener">GitHub repository</a>.</p>
<p>Below you can find the paper presentation streamed at AsiaCCS'22:</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/FzFQD3XTLlA" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats
https://francozappa.github.io/talk/on-the-insecurity-of-vehicles-against-protocol-level-bluetooth-threats/
Thu, 14 Jul 2022 00:00:00 +0000
https://francozappa.github.io/talk/on-the-insecurity-of-vehicles-against-protocol-level-bluetooth-threats/
<p>In this webinar we talk about, Protocol-Level Bluetooth Threats (PLBT), a novel
and relevant class of threats for automotive security. Specifically, we
explain what they are, why they are relevant, and how they can be evaluated on
modern cars. We also report our PLBT evaluation results on five popular
In-Vehicle Infotainment (IVI) units used by KIA, Toyota, Suzuki, and Skoda on
cars manufactured between 2014 and 2021. For example, we show that is trivial
to impersonate a trusted smartphone to commercial IVIs using an attack chain
that we developed in recent years (KNOB+BIAS attacks). As a result of a
successful impersonation, an attacker can exfiltrate sensitive data stored on
the IVI and send malicious commands to the IVI without being detected.</p>
<p>We note that PLBTs are effective on any Bluetooth-enabled IVI as they exploit
protocol flaws in the Bluetooth standard itself. Hence, we expect that the
vast majority of the IVIs in the market is vulnerable to the KNOB+BIAS attack
chain and other PLBTs. This fact should clearly motivate why it is important
to investigate and fix PLBTs in the automotive industry.</p>
<p>For more information please refer to our research paper presented this year at
the IEEE <em>Workshop On Offensive Technologies (WOOT)</em> titled <strong>On the Insecurity
of Vehicles Against Protocol-Level Bluetooth Threats</strong> available
<a href="https://hexhive.epfl.ch/publications/files/22WOOT.pdf" target="_blank" rel="noopener">here</a>.</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/tqln99BHUzU" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats Video
https://francozappa.github.io/post/2022/btcar-video/
Fri, 01 Jul 2022 00:00:00 +0000
https://francozappa.github.io/post/2022/btcar-video/
<p>Below you can find a webinar that I’ve recorded for the
<a href="https://asrg.io/" target="_blank" rel="noopener">Automotive Security Research Group (ASRG)</a> talking about
our recent paper titled
<a href="https://hexhive.epfl.ch/publications/files/22WOOT.pdf" target="_blank" rel="noopener">On the Insecurity of Vehicles Against Protocol-Level Bluetooth
Threats</a>.</p>
<p>The webinar will also be linked for <a href="https://www.ieee-security.org/TC/SP2022/WOOT22/index.html" target="_blank" rel="noopener">WOOT'22</a>
as the talk I gave at the workshop was not recorded because of some issues.</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/tqln99BHUzU" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
C.A.S.E., il futuro dell'auto: opportunità e rischi
https://francozappa.github.io/talk/c.a.s.e.-il-futuro-dellauto-opportunita-e-rischi/
Wed, 29 Jun 2022 00:00:00 +0000
https://francozappa.github.io/talk/c.a.s.e.-il-futuro-dellauto-opportunita-e-rischi/
<p>More information about the speech on
<a href="https://www.quattroruote.it/news/aziende/2022/06/29/f_b_day_c_a_s_e_il_futuro_dell_auto_opportunita_e_rischi_al_nostro_evento.html" target="_blank" rel="noopener">quattroruote.it</a> and
<a href="https://www.linkedin.com/pulse/case-il-futuro-dellauto-opportunit%25C3%25A0-e-rischi-al-fb-day-alberto-vita/?trackingId=cf50jgiplD79C8j7OOr7Sw%3D%3D" target="_blank" rel="noopener">linkedin pulse</a>.</p>
<p>More information about the event <a href="https://fleet-businessday.quattroruote.it/" target="_blank" rel="noopener">here</a>.</p>
-
BreakMI Paper and Repo
https://francozappa.github.io/post/2022/breakmi-announce/
Thu, 16 Jun 2022 00:00:00 +0000
https://francozappa.github.io/post/2022/breakmi-announce/
<p>I am glad to share that our paper titled <em>BreakMi: Reversing, Exploiting
and Fixing Xiaomi Fitness Tracking Ecosystem</em> is publicly available
<a href="https://tches.iacr.org/index.php/TCHES/article/download/9704/9234" target="_blank" rel="noopener">here</a>.
In this work, we reverse-engineer, exploit, and fix the proprietary security
protocols used by Xiaomi to secure the Bluetooth Low Energy communication
between its trackers and smartphone applications. We also release
<a href="https://github.com/Skiti/BreakMi" target="_blank" rel="noopener">BreakMi</a>, a tool to reproduce
our findings and perform further analyses on Xiaomi’s Fitness tracking
ecosystem. We also evaluated BreakMi on the Fitbit ecosystem and found that
most of the vulnerabilities and attacks presented for Xiaomi are portable with
minor adjustments to the Fitbit ecosystem.</p>
<p>I’m particularly proud of this paper as its main author is Marco Casagrande, my
first PhD student. Congratulations, Marco, for the hard/novel/relevant work and
thanks to the co-authors Eleonora Losiouk, Mauro Conti, and Mathias Payer!</p>
<p>We will present the paper in September at <a href="https://ches.iacr.org/2022/" target="_blank" rel="noopener">CHES 2022</a>.</p>
-
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem
https://francozappa.github.io/publication/2022/breakmi/
Fri, 01 Apr 2022 00:00:00 +0000
https://francozappa.github.io/publication/2022/breakmi/
-
On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats
https://francozappa.github.io/publication/2022/btcar/
Fri, 25 Mar 2022 00:00:00 +0000
https://francozappa.github.io/publication/2022/btcar/
-
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy
https://francozappa.github.io/publication/2022/blur/
Sun, 06 Mar 2022 00:00:00 +0000
https://francozappa.github.io/publication/2022/blur/
-
Bluetooth BLUR Attacks (BLURtooth)
https://francozappa.github.io/project/blur/
Sat, 05 Mar 2022 00:00:00 +0000
https://francozappa.github.io/project/blur/
<p>In 2020 we disclosed the
<a href="https://hexhive.epfl.ch/BLURtooth/" target="_blank" rel="noopener">BLUR attacks</a>,
a family of high impact threats affecting Bluetooth’s cross-transport key derivation (CTKD).
The BLUR attacks are the first sample of cross-transport attacks for Bluetooth
as they allow to exploit Bluetooth Classic and Bluetooth Low Energy jut by
targeting one of the two.</p>
<p>The BLUR attacks are tracked with <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15802" target="_blank" rel="noopener">CVE-2020-15802</a>.</p>
-
CFP: JSys System Security
https://francozappa.github.io/post/2022/cfp-jsys/
Thu, 24 Feb 2022 00:00:00 +0000
https://francozappa.github.io/post/2022/cfp-jsys/
<p>The <a href="https://www.jsys.org/" target="_blank" rel="noopener">Journal of Systems Research (JSys)</a>
is a new journal with diamond-access
publication model; that is, papers are free to read, submit, review, and
publish. Its design borrows heavily from similar journals recently created in
the databases, security, and crypto communities.</p>
<p>Recently JSys added a <a href="https://www.jsys.org/cfp_security/" target="_blank" rel="noopener">system security track</a> and the first CfP
is open until the 22nd of May.</p>
<h3 id="call-for-papers-system-security">Call for Papers: System Security</h3>
<p>System security covers the intersection between systems research and security
research in particular around the topics of software security, web security,
mobile security, network security, operating system security, and hardware
security. These topics inherently involve systems topics as part of their
mechanisms, policies, or attacks. While attacks are in scope, the focus of
this track is on constructive security, i.e., mitigating and avoiding attacks
along with systematizing knowledge.</p>
<p>Topic of interests:</p>
<ul>
<li>Analysis of network and security protocols</li>
<li>Attacks with novel insights, techniques, or results</li>
<li>Automated security analysis of source code and binaries</li>
<li>Embedded systems security</li>
<li>Language-based security</li>
<li>Machine learning security</li>
<li>Mobile systems security</li>
<li>Network security</li>
<li>Operating system security</li>
<li>Program analysis for security</li>
<li>Web security</li>
</ul>
-
CFP Workshop on Offensive Technologies (WOOT) 2022
https://francozappa.github.io/post/2022/cfp-woot22/
Sat, 22 Jan 2022 00:00:00 +0000
https://francozappa.github.io/post/2022/cfp-woot22/
<p>The WOOT'22 CFP is open. Please submit and spread the word.</p>
<h3 id="links">Links</h3>
<p>URL: <a href="https://www.ieee-security.org/TC/SP2022/WOOT22/index.html" target="_blank" rel="noopener">https://www.ieee-security.org/TC/SP2022/WOOT22/index.html</a>
Submission: <a href="https://woot22.secpriv.tuwien.ac.at/woot22/paper/new" target="_blank" rel="noopener">https://woot22.secpriv.tuwien.ac.at/woot22/paper/new</a></p>
<h3 id="overview">Overview</h3>
<p>The Workshop on Offensive Technologies (WOOT) aims to present a broad picture of offense and its contributions, bringing together researchers and practitioners across all areas of computer security. Offensive security has changed from a hobby to an industry. No longer an exercise for isolated enthusiasts, offensive security is today a large-scale operation managed by organized, capitalized actors. Meanwhile, the landscape has shifted: software used by millions is built by startups less than a year old, delivered on mobile phones and surveilled by national signals intelligence agencies. In the field’s infancy, offensive security research was conducted separately by industry, independent hackers, or in academia. Collaboration between these groups was difficult. Since 2007, the Workshop on Offensive Technologies (WOOT) has been bringing those communities together.</p>
<h3 id="symposium-topics">Symposium Topics</h3>
<p>Computer security exposes the differences between the actual mechanisms of
everyday trusted technologies and their models used by developers, architects,
academic researchers, owners, operators, and end users. While being inherently
focused on practice, security also poses questions such as “what kind of
computations are and aren’t trusted systems capable of?” which harken back
to fundamentals of computability. State-of-the-art offense explores these
questions pragmatically, gathering material for generalizations that lead to
better models and more trustworthy systems.</p>
<p>WOOT provides a forum for high-quality, peer-reviewed work discussing tools
and techniques for attacks. Submissions should reflect the state of the art in
offensive computer security technology, exposing poorly understood mechanisms,
presenting novel attacks, highlighting the limitations of published attacks
and defenses, or surveying the state of offensive operations at scale. WOOT
‘22 accepts papers in both an academic security context and more applied work
that informs the field about the state of security practice in offensive
techniques. The goal for these submissions is to produce published works that
will guide future work in the field. Submissions will be peer reviewed and
shepherded as appropriate. Submission topics include, but are not limited to,
attacks on and offensive research into:</p>
<ul>
<li>Hardware, including software-based exploitation of hardware vulnerabilities</li>
<li>Virtualization and the cloud</li>
<li>Network and distributed systems</li>
<li>Operating systems</li>
<li>Browser and general client-side security (runtimes, JITs, sandboxing)</li>
<li>Application security</li>
<li>Analysis of mitigations and automating how they can be bypassed</li>
<li>Automating software testing such as fuzzing for novel targets</li>
<li>Internet of Things</li>
<li>Machine Learning</li>
<li>Cyber-physical systems</li>
<li>Privacy</li>
<li>Cryptographic systems (practical attacks on deployed systems)</li>
<li>Malware design, implementation and analysis</li>
<li>Offensive applications of formal methods (solvers, symbolic execution)</li>
</ul>
<h3 id="workshop-format">Workshop Format</h3>
<p>The presenters will be authors of accepted papers. There will also be a keynote speaker and a selection of invited speakers. WOOT ‘22 will feature a Best Paper Award and a Best Student Paper Award.</p>
<p>Note that WOOT'22 and other IEEE S&P workshops are planned to be held in person, see the IEEE S&P website for details and updates.</p>
<h3 id="regular-submission">Regular Submission</h3>
<p>WOOT ‘22 welcomes submissions without restrictions of origin. Submissions from academia, independent researchers, students, hackers, and industry are welcome. Are you planning to give a cool talk at Black Hat in August? Got something interesting planned for other non-academic venues later this year? This is exactly the type of work we’d like to see at WOOT ‘22. Please submit – it will also give you a chance to have your work reviewed and to receive suggestions and comments from some of the best researchers in the world. More formal academic offensive security papers are also very welcome.</p>
<h3 id="systematization-of-knowledge">Systematization of Knowledge</h3>
<p>Continuing the tradition of past years, WOOT ‘22 will be accepting “Systematization of Knowledge” (SoK) papers. The goal of an SoK paper is to encourage work that evaluates, systematizes, and contextualizes existing knowledge. These papers will prove highly valuable to our community but would not be accepted as refereed papers because they lack novel research contributions. Suitable papers include survey papers that provide useful perspectives on major research areas, papers that support or challenge long-held beliefs with compelling evidence, or papers that provide an extensive and realistic evaluation of competing approaches to solving specific problems. Be sure to select “Systematization of Knowledge paper” in the submissions system to distinguish it from other paper submissions.</p>
<h3 id="submission-requirements">Submission Requirements</h3>
<p>Paper submission deadline: Thursday, January 27, 2022, 11:59 AoE (Anywhere on Earth)
Notification date: Thursday, February 27, 2022
Camera-ready paper deadline: Tuesday, March 8, 2022
Workshop date: Thursday, May 26, 2022</p>
<p>Please submit your paper at <a href="https://woot22.secpriv.tuwien.ac.at/woot22/paper/new" target="_blank" rel="noopener">https://woot22.secpriv.tuwien.ac.at/woot22/paper/new</a></p>
<h3 id="what-to-submit">What to Submit</h3>
<p>Submissions must be in PDF format. Papers should be succinct but thorough in presenting the work. The contribution needs to be well motivated, clearly exposed, and compared to the state of the art. Typical research papers are at least 4 pages, and maximum 10 pages long (not counting bibliography and appendix). Yet, papers whose lengths are incommensurate with their contributions will be rejected.</p>
<p>The submission should be formatted in 2-columns, using 10-point Times Roman type on 12-point leading, in a text block of 6.5” x 9”. Please number the pages. Authors must use the IEEE templates, for LaTeX papers this is IEEETran.cls version 1.8b.</p>
<p>Submissions are double blind: submissions should be anonymized and avoid obvious self-references (authors are allowed to release technical reports and present their work elsewhere such as at DefCon or BlackHat). Submit papers using the submission form.</p>
<p>Authors of accepted papers will have to provide a paper for the proceedings following the above guidelines. A shepherd may be assigned to ensure the quality of the proceedings version of the paper.</p>
<p>If your paper should not be published prior to the event, please notify the chairs. Submissions accompanied by non-disclosure agreement forms will not be considered. Accepted submissions will be treated as confidential prior to publication on the WOOT ‘22 website; rejected submissions will be permanently treated as confidential.</p>
<h3 id="policies-and-contact-information">Policies and Contact Information</h3>
<p>Simultaneous submission of the same work to multiple competing academic venues, submission of previously published work without substantial novel contributions, or plagiarism constitutes dishonesty or fraud may lead to instant or later rejecion.
Note: Work presented by the authors at industry conferences, such as Black Hat, is not considered to have been “previously published” for the purposes of WOOT ‘22. We strongly encourage the submission of such work to WOOT ‘22, particularly work that is well suited to a more formal and complete treatment in a published, peer-reviewed setting. In your submission, please do note any previous presentations of the work.</p>
<h3 id="vulnerability-disclosure">Vulnerability Disclosure</h3>
<p>If the submission describes, or otherwise takes advantage of, newly identified vulnerabilities (e.g., software vulnerabilities in a given program or design weaknesses in a hardware system) the authors should disclose these vulnerabilities to the vendors/maintainers of affected software or hardware systems prior to the CFP deadline. When disclosure is necessary, authors should include a statement within their submission and/or final paper about steps taken to fulfill the goal of disclosure.</p>
<h3 id="ethical-considerations">Ethical Considerations</h3>
<p>Submissions that describe experiments on human subjects, that analyze data derived from human subjects (even anonymized data), or that otherwise may put humans at risk should:</p>
<ul>
<li>Disclose whether the research received an approval or waiver from each of the authors’ institutional ethics review boards (e.g., an IRB).</li>
<li>Discuss steps taken to ensure that participants and others who might have been affected by an experiment were treated ethically and with respect.</li>
<li>If a paper raises significant ethical or legal concerns, including in its handling of personally identifiable information (PII) or other kinds of sensitive data, it might be rejected based on these concerns.</li>
</ul>
-
CFP: ACM CPSS 2022
https://francozappa.github.io/post/2022/cfp-cpss22/
Mon, 08 Nov 2021 00:00:00 +0000
https://francozappa.github.io/post/2022/cfp-cpss22/
<p>The call for papers for 8th ACM Cyber-Physical System Security Workshop
(CPSS 2022) held in conjunction with ACM AsiaCCS'22 is closing in 1 month
(December 3, 2021).</p>
<p>Make sure to submit your awesome CPS security papers :D</p>
<p>For more information see the CPSS <a href="https://illinois.adsc.com.sg/CPSS2022/" target="_blank" rel="noopener">website</a> and
its <a href="https://illinois.adsc.com.sg/CPSS2022/CPSS%20CFP2022.pdf" target="_blank" rel="noopener">call for papers</a>.</p>
-
Exploiting and Fixing the Bluetooth Standard
https://francozappa.github.io/talk/exploiting-and-fixing-the-bluetooth-standard/
Thu, 21 Oct 2021 00:00:00 +0000
https://francozappa.github.io/talk/exploiting-and-fixing-the-bluetooth-standard/
<p>Bluetooth is a ubiquitous technology for low-power wireless
communications. It is employed by billions of devices, including
smartphones, laptops, wearables, and cars. As a technology, Bluetooth is
specified in an open and quite complex standard. The standard defines
two Bluetooth flavors; <em>Bluetooth Classic (BC)</em> for high
throughput services and <em>Bluetooth Low Energy (BLE)</em> for low power
ones. In addition, it specifies pairing (i.e., bootstrapping) and
session establishment security mechanisms to protect the
confidentiality, integrity, and authenticity of Bluetooth communication.
One vulnerability in these mechanisms can be exploited on <em>all</em>
Bluetooth devices as they must be compliant with the Bluetooth standard.</p>
<p>This talk revisits our recent work about uncovering,
exploiting, and fixing three critical vulnerabilities in the Bluetooth
standard affecting BT and BLE. The vulns are KNOB (CVE-2019-9506), BIAS
(CVE-2020-10135), and BLUR (CVE-2020-15802). KNOB affects both BT and
BLE and enables to weaken and brute force Bluetooth’s cryptographic
keys. BIAS affects BT and allows to bypass Bluetooth’s authentication.
BLUR exploits the boundary between BT and BLE and results in
cross-transport exploitation of BT and BLE. Despite our reports to the
Bluetooth consortium (SIG), the presented vulnerabilities are either not
patched or partially fixed.</p>
-
Breaking and Fixing the Bluetooth Standard
https://francozappa.github.io/talk/breaking-and-fixing-the-bluetooth-standard/
Thu, 01 Jul 2021 00:00:00 +0000
https://francozappa.github.io/talk/breaking-and-fixing-the-bluetooth-standard/
<p>Bluetooth is a ubiquitous technology for low-power wireless
communications employed by billions of devices, including mobiles,
wearables, and cars. Bluetooth is specified in a complex yet open
standard that defines two transports: <em>Bluetooth Classic (BC)</em> for high
throughput services and <em>Bluetooth Low Energy (BLE)</em> for very low power
services. Being a pervasive technology, Bluetooth exposes a broad attack
surface. Moreover, successful attacks on Bluetooth can achieve
high-impact goals, such as identity thefts, privacy violations, and
malicious device control.
The security of Bluetooth communication heavily depends on the
<em>Bluetooth standard</em>, which defines “standard-compliant” security
mechanisms to protect the confidentiality, integrity, and availability
of Bluetooth communications.
Those mechanisms include <em>pairing</em> and <em>secure session establishment</em>
protocols used to establish keys and protect the communication.</p>
<p>This talk revisits our recent work about uncovering,
exploring, and fixing three critical vulnerabilities in the Bluetooth
standard. The vulnerabilities affect both BC and BLE, and we named them.
KNOB (CVE-2019-9506), BIAS (CVE-2020-10135) and BLUR (CVE-2020-15802).
As these vulnerabilities are <em>standard-compliant</em> (i.e., exploit
specification flaws in the Bluetooth standard), they are effective on
any Bluetooth device regardless of its hardware and software details.
For example, in our experiments, we successfully exploited KNOB, BIAS,
and BLUR on a broad set of devices, including Apple, Broadcom, Cypress,
CSR, Google, Intel, Microsoft,
and Qualcomm. Additionally, we successfully targeted all the major
Bluetooth versions currently in the market (e.g., 4.0, 4.1, 4.2, 5.0, 5.1,
and 5.2).</p>
<p>Despite our reports to the Bluetooth consortium, the presented vulnerabilities
are either not patched or partially fixed. Indeed, more work has to be done to
secure the Bluetooth standard from its foundations.</p>
-
EURECOM Digital Security opening for an Asst. Prof.
https://francozappa.github.io/post/2021/eurecom-hiring-prof/
Fri, 25 Jun 2021 00:00:00 +0000
https://francozappa.github.io/post/2021/eurecom-hiring-prof/
<p>The Digital Security Department of EURECOM invites applications for a <em>tenured</em>
position at the <em>Assistant Professor</em> level in the area of <em>Digital Security</em>.
Full info <a href="https://www.eurecom.fr/en/job/digital-security" target="_blank" rel="noopener">here</a>.</p>
<p>Please spread the word 😄 !</p>
-
Why is Hard to Secure Mobile Proximity Services
https://francozappa.github.io/talk/why-is-hard-to-secure-mobile-proximity-services/
Thu, 24 Jun 2021 00:00:00 +0000
https://francozappa.github.io/talk/why-is-hard-to-secure-mobile-proximity-services/
<p>Mobile devices such as phones, tablets, and wearables enable proximity
services on a large scale. These services use wireless technologies (such as
Wi-Fi and Bluetooth) to connect users within a specific range and exchange
information. Proximity information ranges from general-purpose files and
contacts to privacy-preserving COVID-19 proximity identifiers. Since these
services affect millions of mobile users worldwide, their security against
cyber threats is paramount. It is not pleasant if an attacker in proximity
(or even remotely) can eavesdrop on private communication or tamper with
personal data. However, adopting (even essential) security mechanisms for
proximity services is easy in theory but pretty hard in practice. For example,
it is challenging to provide confidentiality and authenticity while at the
same time provide energy-efficient and accurate proximity tracing. On top
of that, a usable proximity service has to scale well with the number of
users and provide the same quality of services across different software and
hardware ecosystems (e.g., Android and iOS) and usage condition (e.g., indoor
and outdoor). In this talk, we look at two commercial proximity services.
First, Google’s Nearby Connections (NC) is an API to connect Android devices
using a combination of Wi-Fi and Bluetooth and without requiring an Internet
connection. Second, Google/Apple’s Exposure Notification (EN) framework.
EN powers most COVID-19 contact-tracing mobile applications in Europe,
including the ones used in Italy, Germany, and Switzerland. Throughout the
talk, the audience will learn, among others, real-world proximity services'
architectures, pitfalls, vulnerabilities, attacks, countermeasures, and
related research trends.</p>
-
SecMT'21 Talk About Security of Proximity Services
https://francozappa.github.io/post/2021/secmt21-talk/
Tue, 22 Jun 2021 00:00:00 +0000
https://francozappa.github.io/post/2021/secmt21-talk/
<p>I’m glad to give a talk at the
<a href="https://spritz.math.unipd.it/events/2021/ACNS_Workshop/index.html" target="_blank" rel="noopener">SecMT'21</a>
workshop on mobile system security
co-located with the <a href="https://sulab-sever.u-aizu.ac.jp/ACNS2021/" target="_blank" rel="noopener">ACNS'21</a>
conference.
Students can register to SecMT for <em>free</em> by filling this
<a href="https://docs.google.com/forms/d/e/1FAIpQLSfwNOLR8AJmbJo5F954hTXvhsTfKXE3FvTVFr-OLmLcbWmTyg/viewform" target="_blank" rel="noopener">Google form</a>.</p>
<p><strong>Talk title</strong>:</p>
<p>Why is Hard to Secure Mobile Proximity Services</p>
<p><strong>Talk abstract</strong>:</p>
<p>Mobile devices such as phones, tablets, and wearables enable proximity
services on a large scale. These services use wireless technologies (such as
Wi-Fi and Bluetooth) to connect users within a specific range and exchange
information. Proximity information ranges from general-purpose files and
contacts to privacy-preserving COVID-19 proximity identifiers. Since these
services affect millions of mobile users worldwide, their security against
cyber threats is paramount. It is not pleasant if an attacker in proximity (or
even remotely) can eavesdrop on private communication or tamper with personal
data. However, adopting (even essential) security mechanisms for proximity
services is easy in theory but pretty hard in practice. For example, it is
challenging to provide confidentiality and authenticity while at the same time
provide energy-efficient and accurate proximity tracing. On top of that, a
usable proximity service has to scale well with the number of users and
provide the same quality of services across different software and hardware
ecosystems (e.g., Android and iOS) and usage condition (e.g., indoor and
outdoor). In this talk, we look at two commercial proximity services. First,
Google’s Nearby Connections (NC) is an API to connect Android devices using a
combination of Wi-Fi and Bluetooth and without requiring an Internet
connection. Second, Google/Apple’s Exposure Notification (EN) framework. EN
powers most COVID-19 contact-tracing mobile applications in Europe, including
the ones used in Italy, Germany, and Switzerland. Throughout the talk, the
audience will learn, among others, real-world proximity services'
architectures, pitfalls, vulnerabilities, attacks, countermeasures, and
related research trends.</p>
-
Starting at EURECOM
https://francozappa.github.io/post/2021/eurecom-start/
Fri, 04 Jun 2021 00:00:00 +0000
https://francozappa.github.io/post/2021/eurecom-start/
<p>It is my pleasure to announce that since 1st of June I’ve started my new
adventure with <a href="https://www.eurecom.fr/" target="_blank" rel="noopener">EURECOM</a> and the
<a href="http://s3.eurecom.fr/" target="_blank" rel="noopener">System Security Group (S3)</a>.</p>
<p>I’m thrilled and honored to have joined a team of talented and diverse people,
and I’m looking forward give my contribution!</p>
<p>The location is also pretty amusing, and I feel closer to Italy than
usual 😄</p>
-
CFP for Hardwear.io USA 2021 is Open (Tips and Tricks)
https://francozappa.github.io/post/2021/hw21-suggestions/
Fri, 19 Mar 2021 00:00:00 +0000
https://francozappa.github.io/post/2021/hw21-suggestions/
<p>Last year I had the pleasure to give a talk about
<a href="https://hardwear.io/virtual-con-2020/speakers/from-the-bluetooth-standard-to-standard-compliant-0-days.php" target="_blank" rel="noopener">critical and standard-compliant Bluetooth flaws</a>
at the virtual edition of
<a href="https://hardwear.io/virtual-con-2020/" target="_blank" rel="noopener">Hardwear.io 2020</a>.</p>
<p>The organizers recently opened the
<a href="https://hardwear.io/usa-2021/cfp.php" target="_blank" rel="noopener">call-for-papers (CFP) for Hardwear.io USA 2021</a> and asked me
to share my take on why you would want to submit
your work to Hardwear.io and few tips and tricks to improve the quality of your presentation.
What follow are some random and personal thoughts that might be useful for
somebody and might overlap with what is already suggested in the CFP
😄</p>
<h2 id="why-one-should-submit">Why one should submit?</h2>
<ol>
<li>
<p>Hardwear.io is (still) a “nichy” venue where you present
to a relatively small but relevant audience of experts.</p>
</li>
<li>
<p>Hardwear.io’s audience is a mix of folks
from academia and industry. This is very helpful as it allows to get feedback
from different angles and hear more voices.</p>
</li>
<li>
<p>Hardwear.io enables to push the boundaries of interesting (yet less-mainstream)
security topics such as embedded, industrial, hardware, and wireless systems.</p>
</li>
<li>
<p>Hardwear.io is not only about talks and conferences, there is whole community surrounding
it that is active every day and from which you can get advice.</p>
</li>
<li>
<p>If you are a fan of merchandise (i.e., shirts, pins, magnets, …) then Hardwear.io
is not going to disappoint you 🎉</p>
</li>
</ol>
<h2 id="tips-and-tricks-to-strengthen-your-submission">Tips and Tricks to strengthen your submission</h2>
<ul>
<li>Clearly scope you work to one (or more) submission topic(s)</li>
<li>Keep a mix of technical and non-technical content</li>
<li>The non-technical content is useful to let non-expert reviewers
appreciate your work (i.e., what you did)</li>
<li>The technical part is needed to convince the expert reviewers that you
actually did what you are presenting (i.e., how you did it)</li>
<li>Make sure that other than explaining “what” you did
and “how” you did it, you are also showing “why” your submission
is important, needed, novel, and interesting.</li>
<li>Look at the <a href="https://hardwear.io/usa-2021/cfp.php" target="_blank" rel="noopener">TIPS FOR SUBMITTING on the CFP</a></li>
</ul>
-
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks
https://francozappa.github.io/publication/2021/lightblue/
Thu, 18 Feb 2021 00:00:00 +0000
https://francozappa.github.io/publication/2021/lightblue/
-
Joining EURECOM S3 as an Assistant Professor in June 2021
https://francozappa.github.io/post/2020/eurecom-asstprof/
Wed, 02 Dec 2020 00:00:00 +0000
https://francozappa.github.io/post/2020/eurecom-asstprof/
<p>Starting from June 2021, I will join <a href="http://s3.eurecom.fr/" target="_blank" rel="noopener">EURECOM System Security Group
(S3)</a> as an Assistant Professor. I will keep
doing research on the security of wireless systems, mobile/embedded systems,
and (industrial) internet of things. I will also teach the fabulous
<a href="https://mobisec.reyammer.io/" target="_blank" rel="noopener">Mobile Systems and Smartphone Security (MOBISEC)</a>
course, created by Yanick Fratantonio, starting from Sept 2021.</p>
<p>I thank EURECOM faculty members for considering my candidature and
eventually selecting me from a pool of talented applicants. Related to that,
I give credit to Marc Dacier, Aurelien Francillon, Yanick Fratantonio, Davide
Balzarotti, and Massimiliano Todisco for answering my questions
and providing useful feedback and support during the interview process.</p>
<p>I also acknowledge Mathias Payer, Kasper Rasmussen, Nils Tippenhauer, and
Mauro Conti for supporting my candidature. Their support was instrumental
and I will be pleased to keep collaborating with them in the future.</p>
<p>I look forward to join EURECOM and the sunny French riviera and in the
meantime I’m ramping up my French knowledge.
🇫🇷 🏖 ⛰️</p>
-
CFP: 2021 IEEE Workshop on Offensive Technologies (WOOT)
https://francozappa.github.io/post/2021/cfp-woot21/
Fri, 27 Nov 2020 00:00:00 +0000
https://francozappa.github.io/post/2021/cfp-woot21/
<p>The call for papers for the 2021 IEEE Workshop on Offensive Technologies (WOOT)
is open. Please submit your great research work and spread the word among
attackers 🔥 😄 🔥</p>
<p>Here are the deadlines:</p>
<ul>
<li>Abstract registration deadline: Wednesday, January 27, 2021, 11:59 AoE (Anywhere on Earth)</li>
<li>Paper submission deadline: Friday, January 29, 2021, 11:59 AoE (Anywhere on Earth)</li>
<li>Notification date: Monday, March 01, 2021</li>
<li>Workshop date: Thursday, May 27, 2021</li>
</ul>
<p>Submission topics include, but are not limited to, attacks on and offensive research into:</p>
<ul>
<li>Hardware, including software-based exploitation of hardware vulnerabilities</li>
<li>Virtualization and the cloud</li>
<li>Network and distributed systems</li>
<li>Operating systems</li>
<li>Browser and general client-side security (runtimes, JITs, sandboxing)</li>
<li>Application security</li>
<li>Analysis of mitigations and automating how they can be bypassed</li>
<li>Automating software testing such as fuzzing for novel targets</li>
<li>Internet of Things</li>
<li>Machine Learning</li>
<li>Cyber-physical systems</li>
<li>Privacy</li>
<li>Cryptographic systems (practical attacks on deployed systems)</li>
<li>Malware design, implementation and analysis</li>
<li>Offensive applications of formal methods (solvers, symbolic execution)</li>
</ul>
<p>For more information about the CFP look <a href="https://www.ieee-security.org/TC/SP2021/SPW2021/WOOT21/" target="_blank" rel="noopener">here</a>.</p>
-
Joining WOOT and SEC TPCs
https://francozappa.github.io/post/2021/cfp-woot21-sec21/
Sun, 22 Nov 2020 00:00:00 +0000
https://francozappa.github.io/post/2021/cfp-woot21-sec21/
<p>I’m thrilled to join the technical program committees of the
<a href="https://www.ieee-security.org/TC/SP2021/SPW2021/WOOT21/" target="_blank" rel="noopener">Workshop on Offensive Technologies (WOOT)</a>
and the
<a href="https://www.usenix.org/conference/usenixsecurity21" target="_blank" rel="noopener">USENIX Security Symposium (SEC)</a>.</p>
<p>Lots of good papers ahead 😄</p>
<p align="center">
<iframe src="https://giphy.com/embed/13bUdxDy4jJUR2" width="480" height="270"
frameBorder="0" class="giphy-embed" allowFullScreen></iframe><p><a
href="https://giphy.com/gifs/care-paperwork-13bUdxDy4jJUR2"></a></p>
-
Early Evidence of Effectiveness of Digital Contact Tracing for SARS-CoV-2 in Switzerland
https://francozappa.github.io/publication/2020/cte-journal/
Thu, 01 Oct 2020 00:00:00 +0000
https://francozappa.github.io/publication/2020/cte-journal/
-
BLURtooth (BLUR Attacks) Disclosure
https://francozappa.github.io/post/2020/blur-announce/
Fri, 25 Sep 2020 00:00:00 +0000
https://francozappa.github.io/post/2020/blur-announce/
<p>Since January 2020 we’ve been working on a security analysis of Bluetooth
cross-transport key-derivation (CTKD). In May 2020 we reported to the
Bluetooth SIG a set of CTKD vulnerabilities and related attacks (i.e., the
BLURtooth report about the BLUR attacks) and kept our findings private.</p>
<p>The 10th of September 2020 the Bluetooth SIG posted the following security note without letting us know:
<a href="https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/" target="_blank" rel="noopener">Bluetooth SIG Statement Regarding the Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low
Energy Vulnerability (BLURtooth)</a>.</p>
<p>To clarify our position with respect to such security note we release
<a href="https://hexhive.epfl.ch/BLURtooth/" target="_blank" rel="noopener">a public disclosure statement</a> and an updated version
of the <a href="https://arxiv.org/abs/2009.11776" target="_blank" rel="noopener">BLURtooth technical report</a>. Enjoy!</p>
<p>Bonus track:</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/LJzCYSdrHMI" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
BIAS and KNOB attacks against Bluetooth BR/EDR/LE
https://francozappa.github.io/talk/bias-and-knob-attacks-against-bluetooth-br/edr/le/
Tue, 18 Aug 2020 00:00:00 +0000
https://francozappa.github.io/talk/bias-and-knob-attacks-against-bluetooth-br/edr/le/
<p>Bluetooth is a ubiquitous technology for low power wireless communications. Bluetooth runs on billions of devices including mobile, wearables, home automation, smart speakers, headsets, industrial and medical appliances, and vehicles. As a result, Bluetooth’s attack surface is huge and includes significant threats such as identity thefts, privacy violations, and malicious device control. Bluetooth is a complex technology specified in an open standard. The standard defines two wireless stacks Bluetooth Classic for high throughput services (e.g., audio and voice) and Bluetooth Low Energy (BLE) for very low power services (e.g., localization, and monitoring). The standard defines security mechanisms to protect the confidentiality, integrity, and authenticity of Bluetooth communications. Those mechanisms include pairing to share a long term key among two devices, and secure session establishment to let two paired devices negotiate session keys to protect their communication. A single vulnerability in a standard-compliant security mechanism translates into billions of exploitable devices. This talk reviews several standard-compliant vulnerabilities that we recently uncovered on the key negotiation and authentication mechanisms of Bluetooth Classic and BLE. We also describe how to exploit such vulnerabilities to perform key negotiation attacks on Bluetooth Classic and BLE (KNOB attacks, CVE-2019-9506) and impersonation attacks on Bluetooth Classic (BIAS attacks, CVE-2020-10135). The attacks are presented together with a detailed description of the Bluetooth treat model and the affected security mechanism. We also explain how we implemented such attacks using low-cost hardware and open-source software and how we evaluated them on actual devices from the major vendors including Apple, Broadcom, Cypress, CSR, Google, Intel, Microsoft, and Qualcomm. Finally, we describe how the Bluetooth standard was amended after the disclosure of our attacks, our proposed countermeasures, and why most of the Bluetooth devices are still vulnerable to our attacks.</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/2Sx-81wz9LA" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
WAC3 Presentation is Online
https://francozappa.github.io/post/2020/wac320-video/
Wed, 12 Aug 2020 00:00:00 +0000
https://francozappa.github.io/post/2020/wac320-video/
<p>BIAS + KNOB attack against Bluetooth:</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/2Sx-81wz9LA" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<p>All the WAC talks are available on <a href="https://www.youtube.com/watch?v=XS_DZ5F-y3k&list=PLeeS-3Ml-rppRzqiDB7l-TIyE-YSqXGR3" target="_blank" rel="noopener">YouTube</a></p>
-
DP3T/GAEN for COVID-19
https://francozappa.github.io/project/gaen/
Fri, 07 Aug 2020 00:00:00 +0000
https://francozappa.github.io/project/gaen/
<p>The
<a href="https://francozappa.github.io/publication/dp3t-preprint/paper.pdf" target="_blank" rel="noopener">Decentralized Privacy-Preserving Proximity Tracing
(DP3T)</a>
is a system that we developed
for secure and privacy-preserving proximity tracing at large scale. DP3T
provides a technological foundation to help slow the spread of SARS-CoV-2 by
simplifying and accelerating the process of notifying people who might have
been exposed to the virus so that they can take appropriate measures to break
its transmission chain. DP3T is open-source and its
<a href="https://github.com/DP-3T" target="_blank" rel="noopener">repos</a> and
<a href="https://github.com/DP-3T/documents" target="_blank" rel="noopener">documents</a>
are on GitHub.</p>
<p>We also published a work titled
<a href="https://www.medrxiv.org/content/medrxiv/early/2020/09/19/2020.09.07.20189274.full.pdf" target="_blank" rel="noopener">Early Evidence of Effectiveness of Digital Contact Tracing for SARS-CoV-2 in
Switzerland</a> to show early findings about the effectiveness of digital contact tracing in Switzerland.</p>
<p>Google and Apple developed the
<a href="https://blog.google/inside-google/company-announcements/apple-google-exposure-notification-api-launches/" target="_blank" rel="noopener">GAEN (Google/Apple Exposure
Notifications)</a>
framework based on DP3T.</p>
-
CFP: ACM AsiaCCS 2021
https://francozappa.github.io/post/2021/cfp-asiaccs21/
Wed, 05 Aug 2020 00:00:00 +0000
https://francozappa.github.io/post/2021/cfp-asiaccs21/
<p>I’m glad to serve as a TPC member for <a href="https://asiaccs2021.comp.polyu.edu.hk/" target="_blank" rel="noopener">ACM AsiaCCS 2021</a>.
The first round of submission deadline is approaching (21 August 2020), indeed
submit your great research works!</p>
<p>Those are the important dates:</p>
<ul>
<li>1st round deadlines
<ul>
<li>Paper submission: 21 August 2020</li>
<li>Author notification: 24 October 2020</li>
<li>Camera ready due to: 25 November 2020</li>
</ul>
</li>
<li>2st round deadlines
<ul>
<li>Paper submission: 11 December 2020</li>
<li>Author notification: 15 February 2021</li>
<li>Camera ready due to: 15 March 2021</li>
</ul>
</li>
<li>Conference date: June 7-11, 2021</li>
</ul>
-
WAC3 Talk About KNOB and BIAS Attacks
https://francozappa.github.io/post/2020/wac320-talk/
Tue, 21 Jul 2020 00:00:00 +0000
https://francozappa.github.io/post/2020/wac320-talk/
<p>I’m glad to give a talk about the
<a href="https://francozappa.github.io/project/knob/" target="_blank" rel="noopener">KNOB</a> and
<a href="https://francozappa.github.io/project/bias/" target="_blank" rel="noopener">BIAS</a> attacks
on Bluetooth at the third
<a href="https://crypto.iacr.org/2020/wac.php" target="_blank" rel="noopener">Workshop on Attacks in Cryptography (WAC)</a>
co-located with<br>
<a href="https://crypto.iacr.org/2020/" target="_blank" rel="noopener">CRYPTO 2020</a>.
The Workshop will be held
online on Zoom the 16th of August 2020, and my talk will
be from 13:20 to 14:00 (EDT) in the Attacks on Standards session (session IV).</p>
<p>This is the talk abstract:</p>
<blockquote>
<p>Bluetooth is a ubiquitous technology for low power wireless
communications. Bluetooth runs on billions of devices including
mobile, wearables, home automation, smart speakers, headsets,
industrial and medical appliances, and vehicles. As a result,
Bluetooth’s attack surface is huge and includes significant threats
such as identity thefts, privacy violations, and malicious device
control.</p>
<p>Bluetooth is a complex technology specified in an open standard. The
standard defines two wireless stacks Bluetooth Classic for high
throughput services (e.g., audio and voice) and Bluetooth Low Energy
(BLE) for very low power services (e.g., localization, and
monitoring). The standard defines security mechanisms to protect the
confidentiality, integrity, and authenticity of Bluetooth
communications. Those mechanisms include pairing to share a long term
key among two devices, and secure session establishment to let two
paired devices negotiate session keys to protect their communication.
A single vulnerability in a standard-compliant security mechanism
translates into billions of exploitable devices.</p>
<p>This talk reviews several standard-compliant vulnerabilities that we
recently uncovered on the key negotiation and authentication
mechanisms of Bluetooth Classic and BLE. We also describe how to
exploit such vulnerabilities to perform key negotiation attacks on
Bluetooth Classic and BLE (KNOB attacks, CVE-2019-9506) and
impersonation attacks on Bluetooth Classic (BIAS attacks,
CVE-2020-10135). The attacks are presented together with a detailed
description of the Bluetooth treat model and the affected security
mechanism. We also explain how we implemented such attacks using
low-cost hardware and open-source software and how we evaluated them
on actual devices from the major vendors including Apple, Broadcom,
Cypress, CSR, Google, Intel, Microsoft, and Qualcomm. Finally, we
describe how the Bluetooth standard was amended after the disclosure
of our attacks, our proposed countermeasures, and why most of the
Bluetooth devices are still vulnerable to our attacks.</p>
</blockquote>
<p>For more details about the KNOB and BIAS attacks have a look at the
related research papers:</p>
<ul>
<li><em>The KNOB is Broken: Exploiting Low Entropy in the Encryption Key
Negotiation of Bluetooth BR/EDR</em>, USENIX Security 2019.</li>
<li><em>Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy</em>,
ACM TOPS 2020.</li>
<li><em>BIAS: Bluetooth Impersonation AttackS</em>, IEEE S&P 2020.</li>
</ul>
<p>Please join the virtual WAC, and
thanks
<a href="https://eyalro.net/" target="_blank" rel="noopener">Eyal Ronen</a>
and
<a href="https://www.mathyvanhoef.com/" target="_blank" rel="noopener">Mathy Vanhoef</a>
for organizing it and for the invitation!</p>
-
NSS 2020 Extended Call For Papers
https://francozappa.github.io/post/2020/nss20-cfp-ext/
Mon, 06 Jul 2020 00:00:00 +0000
https://francozappa.github.io/post/2020/nss20-cfp-ext/
<p>The Network and System Security (NSS) 2020 conference
paper submission deadline has been extended to
<strong>15 September 2020 (Anywhere on Earth)</strong></p>
<p>Please submit your research work!</p>
<p>You can find more information in the <a href="http://nsclab.org/nss2020/index.html" target="_blank" rel="noopener">NSS
website</a> and specifically in the
<a href="http://nsclab.org/nss2020/cfp.html" target="_blank" rel="noopener">CFP section</a>.</p>
-
Tutor Island: Matematica & Codice
https://francozappa.github.io/post/2020/tutor-island/
Sat, 20 Jun 2020 00:00:00 +0000
https://francozappa.github.io/post/2020/tutor-island/
<p>Condivido con piacere <a href="https://www.youtube.com/channel/UCKkzN06obaHk8mt3iBTp6qw" target="_blank" rel="noopener">Tutor Island</a>
il nuovo canale YouTube del mio amico e collega
Paolo. Su questo canale potrete trovare
tutorial in Italiano (e prossimamente anche in Inglese) su argomenti matematici,
informatici e ingegneristici. Per esempio linko qui sotto una playlist con un
corso per ingegneri che vogliono programmare in MATLAB/Octave:</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/2ro75VG9UWs" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<p>Paolo è un bravissimo insegnante e divulgatore scientifico con anni di
esperienza alle spalle sia universitaria che professionale. Paolo ha anche
esperienza in ambito informatico e dai sui video sicuramente imparerete molto
di più che l’argomento centrale del video. Il canale di Paolo
è anche molto curato dal punto di vista audio, video e grafico e questo non
guasta mai 😄</p>
<p>Tutor Island offre materiale esclusivo per studenti con una piccola donazione su
<a href="https://www.patreon.com/tutorisland" target="_blank" rel="noopener">Patreon</a>.
Potete seguire il feed del canale, oltre che su YouTube, su
<a href="https://twitter.com/tutor_island" target="_blank" rel="noopener">Twitter</a> e
<a href="https://www.facebook.com/tutorislandfb/" target="_blank" rel="noopener">Facebook</a>.</p>
<p>🏖 ☀ 🏝</p>
-
CFP: Conference on Network and System Security (NSS)
https://francozappa.github.io/post/2020/cfp-nss20/
Mon, 08 Jun 2020 00:00:00 +0000
https://francozappa.github.io/post/2020/cfp-nss20/
<p>I’m glad to serve as a TPC member and publicity co-chair for the <em>14th International Conference
on Network and System Security (NSS)</em>. The conference focuses on network and
system security and welcomes papers from a broad range of topics including:</p>
<ul>
<li>Active Defense Systems</li>
<li>Analysis, Benchmark of Security Systems</li>
<li>Applied Cryptography</li>
<li>Authentication</li>
<li>Privacy and Anonymity Technologies</li>
<li>Secure Cryptographic Protocols and Applications</li>
<li>Security Notions, Approaches, and Paradigms</li>
<li>Steganography and Steganalysis</li>
<li>Blockchain and Cryptocurrency</li>
<li>Smart Contract</li>
<li>Digital Forensics</li>
<li>Cyber Hacking and Protection</li>
<li>Hardware Security</li>
<li>Intrusion Detection and Prevention</li>
<li>AI/Machine Learning Security</li>
<li>Software Security</li>
<li>Security Policy</li>
<li>Security and Privacy in Social Networks</li>
<li>Trusted Computing</li>
<li>Watermarking and Digital Rights Management</li>
<li>Location Privacy</li>
<li>Security For Critical Infrastructures</li>
<li>RFID/NFC Security</li>
<li>Security Infrastructure</li>
<li>Security and Privacy For Digital Health</li>
<li>Viruses and Malware</li>
<li>Intellectual Property Rights Protection</li>
<li>Cyber-Physical Security</li>
</ul>
<p>You can find more information in the <a href="http://nsclab.org/nss2020/index.html" target="_blank" rel="noopener">Conference
website</a> and specifically in the
<a href="http://nsclab.org/nss2020/cfp.html" target="_blank" rel="noopener">CFP section</a>.</p>
<p>NSS 2020 deadlines:</p>
<ul>
<li>Paper submission <strong>15 July 2020 (Anywhere on Earth)</strong></li>
<li>Notification of acceptance <strong>15 August 2020</strong></li>
<li>Camera-ready paper submission <strong>20 October 2020</strong></li>
<li>Conference location and date <strong>Melbourne Australia, 24–27 November 2020</strong></li>
</ul>
-
Bluetooth BIAS Attacks
https://francozappa.github.io/project/bias/
Mon, 18 May 2020 00:00:00 +0000
https://francozappa.github.io/project/bias/
<p>In 2020 we disclosed the <a href="https://francozappa.github.io/about-bias/" target="_blank" rel="noopener">Bluetooth Impersonation AttackS
(BIAS)</a>,
a family of high impact attacks affecting Bluetooth’s
authentication protocols. The attacks allow
impersonating any Bluetooth device during secure
session establishment without knowing the long term pairing key.
The BIAS attacks are tracked with <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10135" target="_blank" rel="noopener">CVE-2019-9506</a></p>
<h2 id="ieee-sp-oakland-2020-paper-teaser">IEEE S&P (Oakland) 2020 Paper Teaser</h2>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/fASGU7Og5_4" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<h2 id="ieee-sp-oakland-2020-paper-presentation">IEEE S&P (Oakland) 2020 Paper Presentation</h2>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/bVbBDnruv7M" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<h2 id="bias--knob-attack-against-bluetooth-iacr-attacks-in-crypto">BIAS + KNOB attack against Bluetooth IACR Attacks in Crypto</h2>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/2Sx-81wz9LA" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<h2 id="from-bluetooth-standard-to-standard-compliant-0-days-hardweario">From Bluetooth Standard to Standard Compliant 0-days Hardwear.io</h2>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/ZVSbF11uxuk" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
Slides and video from our hardwear.io 2020 talk
https://francozappa.github.io/post/2020/knob-hw20-material/
Sun, 10 May 2020 00:00:00 +0000
https://francozappa.github.io/post/2020/knob-hw20-material/
<p>Here are the <a href="https://francozappa.github.io/talk/hwio20/slides.pdf" target="_blank" rel="noopener">slides</a>
and the recording of our hardwear.io talk titled <em>From Bluetooth Standard to
Standard-Compliant 0-days</em>:</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/ZVSbF11uxuk" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
From the Bluetooth Standard to Standard-Compliant 0-days
https://francozappa.github.io/talk/from-the-bluetooth-standard-to-standard-compliant-0-days/
Thu, 30 Apr 2020 00:00:00 +0000
https://francozappa.github.io/talk/from-the-bluetooth-standard-to-standard-compliant-0-days/
<p>Bluetooth is a ubiquitous technology for low power wireless communications.
Bluetooth runs on billions of devices, including mobile, wearables, home
automation, smart speakers, headsets, industrial and medical appliances,
and vehicles. As a result, Bluetooth’s attack surface is huge and includes
significant threats such as identity thefts, privacy violations, and malicious
device control.</p>
<p>Bluetooth is a complex technology specified in an open standard. The standard
defines two wireless stacks Bluetooth “classic” BR/EDR for high throughput
services (e.g., audio and voice) and Bluetooth Low Energy (BLE) for very low
power services (e.g., localization, and monitoring). The standard defines
security mechanisms to protect Bluetooth communications. Those mechanisms
include pairing to share a long term key among two devices, and secure
session establishment to let two paired devices negotiate session keys. It is
paramount that those standard security mechanisms provide security guarantees
that they promise, such as confidentiality, authenticity, and integrity of
data. A single vulnerability in a standard security mechanism translates into
billions of exploitable devices.</p>
<p>This talk describes how we managed to find and exploit standard-compliant
0-days in the Bluetooth standard. We describe, in detail, the Bluetooth
security architecture, including its main components (Host, Controller) and
protocols (HCI, LMP, and SMP). Then we talk about the Key Negotiation of
Bluetooth (KNOB) attack on Bluetooth “classic” BR/EDR [CVE-2019-9506] and its
extension to BLE. The KNOB attacks are enabled by standard-compliant 0-days
in the key negotiation protocols of Bluetooth “classic” BR/EDR and BLE. In
particular, those protocols allow to negotiate keys with very low entropy
(strength), and they do not protect the integrity of entropy negotiation.
Using the KNOB attack, a man-in-the-middle attacker can force a Bluetooth
“classic” BR/EDR session key to 1 byte of entropy, and a BLE long term key to
7 bytes of entropy. Such low entropy values are unacceptable in 2020 and can
easily (for BLE) or trivially (for BR/EDR) be brute-forced.</p>
<p>As a result of our attacks, a remote attacker gets access to private data and
inserts valid malicious data on Bluetooth “classic” BR/EDR and BLE secure
connection. The exploits are effective on any standard compliant Bluetooth
device regardless of software, hardware vendors and versions, Bluetooth
version, supported security features, or security mode in use. As a result of
our disclosure in 2019, the Bluetooth SIG amended the standard by requiring 7
bytes of entropy as minimum entropy value for Bluetooth BR/EDR (as for BLE).
Only some vendors, including Intel, Google, Apple, and Microsoft, patched
a subset of their products to address the KNOB attack, and in the talk,
we describe some of those patches and why they are not effective. We also
describe why the majority of low-end devices that we tested remains vulnerable
to the 1-byte entropy downgrade. We conclude the talk describing the main
lessons that we learned while finding and exploiting Bluetooth standard
compliant 0 days.</p>
<p>The KNOB attacks were identified, investigated, and demonstrated by Daniele
Antonioli, Nils Tippenhauer, and Kasper Rasmussen, more information at
<a href="https://knobattack.com" target="_blank" rel="noopener">https://knobattack.com</a>.</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/ZVSbF11uxuk" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
Decentralized Privacy-Preserving Proximity Tracing
https://francozappa.github.io/publication/2020/dp3t-deb/
Sun, 26 Apr 2020 00:00:00 +0000
https://francozappa.github.io/publication/2020/dp3t-deb/
-
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy
https://francozappa.github.io/post/2020/knob-tops/
Sun, 26 Apr 2020 00:00:00 +0000
https://francozappa.github.io/post/2020/knob-tops/
<p>Our new paper
<a href="https://francozappa.github.io/publication/knob-ble/" target="_blank" rel="noopener">Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy</a>
will appear in the <a href="https://dl.acm.org/journal/tops" target="_blank" rel="noopener">ACM Transactions on Privacy and Security</a>.</p>
<p>Our paper extends our previous work on the
<a href="https://knobattack.com" target="_blank" rel="noopener">KNOB attack on Bluetooth BR/EDR</a>
to Bluetooth Low Energy (BLE), presents an updated evaluation of the KNOB attack for
Bluetooth BR/EDR and discusses some of the countermeasures put in place by
vendors such as Google and Apple after the disclosure of the KNOB attack and
the amendment of the Bluetooth standard.</p>
-
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy
https://francozappa.github.io/publication/2020/knob-ble/
Sun, 26 Apr 2020 00:00:00 +0000
https://francozappa.github.io/publication/2020/knob-ble/
-
Bluetooth Impersonation AttackS (BIAS) at IEEE S&P 2020
https://francozappa.github.io/post/2020/bias-announce/
Thu, 16 Apr 2020 00:00:00 +0000
https://francozappa.github.io/post/2020/bias-announce/
<p>Our paper
<a href="https://francozappa.github.io/publication/bias/" target="_blank" rel="noopener">Bluetooth Impersonation AttackS (BIAS)</a>
will be presented at the
<a href="https://www.ieee-security.org/TC/SP2020//index.html" target="_blank" rel="noopener">IEEE Symposium on Security and Privacy (IEEE S&P) 2020</a>.</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/fASGU7Og5_4" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<p>More information are available in the <a href="https://francozappa.github.io/about-bias" target="_blank" rel="noopener">BIAS website</a></p>
<p>The BIAS code will be also uploaded soon! Stay tuned and unbiased 😄</p>
-
KNOB Attacks Talk at Hardwear.io 2020
https://francozappa.github.io/post/2020/knob-hw20/
Sun, 05 Apr 2020 00:00:00 +0000
https://francozappa.github.io/post/2020/knob-hw20/
<p>I’m glad to give a talk titled
<a href="https://hardwear.io/virtual-con-2020/speakers/from-the-bluetooth-standard-to-standard-compliant-0-days.php" target="_blank" rel="noopener">From the Bluetooth Standard to Standard Compliant 0-days</a>
together with <a href="https://nebelwelt.net/" target="_blank" rel="noopener">Mathias Payer</a> at the virtual edition of
<a href="https://hardwear.io/virtual-con-2020/" target="_blank" rel="noopener">Hardwear.io 2020</a>.</p>
<p>Our talk covers, among others, the technical details behind the
<a href="https://knobattack.com/" target="_blank" rel="noopener">Key Negotiation Of Bluetooth (KNOB) attack on Bluetooth BR/EDR</a>,
its extension to BLE, and the countermeasures adopted by vendors, such as Google and Apple, to
mitigate the KNOB attacks.</p>
<p>Please join us at the virtual conference! 😄</p>
-
BIAS: Bluetooth Impersonation AttackS
https://francozappa.github.io/publication/2020/bias/
Thu, 26 Mar 2020 00:00:00 +0000
https://francozappa.github.io/publication/2020/bias/
-
InspiredResearch Newsletter University of Oxford
https://francozappa.github.io/post/2020/knob-ir/
Fri, 10 Jan 2020 00:00:00 +0000
https://francozappa.github.io/post/2020/knob-ir/
<p>The
<a href="https://www.cs.ox.ac.uk/innovation/inspiredresearch/InspiredResearch-winter2019.pdf" target="_blank" rel="noopener">In<em>spired</em>Research (Winter 2019 Issue 15)</a>
twice-yearly newsletter from the Computer Science Department of the University of
Oxford features a nice article about the KNOB attack by
<a href="https://www.cs.ox.ac.uk/people/kasper.rasmussen/" target="_blank" rel="noopener">Prof. Kasper Rasmussen</a>.</p>
-
Security Engineering Third Edition (SEv3)
https://francozappa.github.io/post/2019/knob-sev3/
Sat, 07 Dec 2019 00:00:00 +0000
https://francozappa.github.io/post/2019/knob-sev3/
<p>Recently, I’ve stumbled upon the webpage about
<a href="https://www.cl.cam.ac.uk/~rja14/book.html" target="_blank" rel="noopener">Security Engineering – Third Edition (SEv3)</a>
by <a href="https://www.cl.cam.ac.uk/~rja14/" target="_blank" rel="noopener">Prof. Ross Anderson</a>.
I’m particularly attached to this book,
as it is the <em>first</em> book about information security that I bought
(I bought SEv2 in 2012), and it was very helpful to introduce
me to security engineering (coming from an EE background) and to tackle my
<a href="https://francozappa.github.io/publication/master-thesis/thesis.pdf" target="_blank" rel="noopener">master thesis about Random Number Generators</a>.
Actually, I have to thank
<a href="https://ece.umass.edu/faculty/wayne-burleson" target="_blank" rel="noopener">Prof. Wayne Burleson</a>
for the book recommendation!</p>
<p>I’m very proud that the
<a href="https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch5-oct12.pdf" target="_blank" rel="noopener">Cryptography Chapter of SEv3</a>
(so far 😄) includes a discussion about the
<a href="https://knobattack.com/" target="_blank" rel="noopener">KNOB attack</a> in the subsection about
Diffie-Hellman key establishment (5.7.2.2). I look forward to read SEv3
once is ready!</p>
-
Postdoc with Mathias Payer's HexHive group at EPFL
https://francozappa.github.io/post/2019/epfl-postdoc/
Fri, 29 Nov 2019 14:28:36 +0800
https://francozappa.github.io/post/2019/epfl-postdoc/
<p>Next January I will join as a postdoc <a href="https://nebelwelt.net/" target="_blank" rel="noopener">Mathias Payer</a>’s
<a href="https://hexhive.epfl.ch/" target="_blank" rel="noopener">HexHive</a> group at <a href="https://www.epfl.ch/en/" target="_blank" rel="noopener">EPFL</a>.</p>
<p>Looking forward to start a new adventure, and meet old and new friends.</p>
<p>😆</p>
-
KNOB Attack References and Advisories
https://francozappa.github.io/post/2019/knob-references/
Thu, 17 Oct 2019 00:00:00 +0000
https://francozappa.github.io/post/2019/knob-references/
<p>I’ve collected a list of references and advisories about the KNOB attack from
several hardware and software providers and organizations. You can find it in
the last paragraph of
the <a href="https://knobattack.com/" target="_blank" rel="noopener">“Are my Devices Vulnerable?” section of knobattack.com</a>.</p>
<p>Please let me know if any link in the list is wrong and/or broken, and if you
find other relevant links!</p>
-
Video of my KNOB Attack Presentation at USENIX Security 2019
https://francozappa.github.io/post/2019/knob-sec-video/
Mon, 07 Oct 2019 00:00:00 +0000
https://francozappa.github.io/post/2019/knob-sec-video/
<p>Title of the paper:
<em>The KNOB is Broken: Exploiting Low Entropy
in the Encryption Key Negotiation Of Bluetooth BR/EDR</em>:</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/v9Xg9XcnNh0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<p>More info at <a href="https://knobattack.com/" target="_blank" rel="noopener">knobattack.com</a></p>
-
Bluetooth blues: KNOB Attack Explained
https://francozappa.github.io/talk/bluetooth-blues-knob-attack-explained/
Sat, 14 Sep 2019 00:00:00 +0000
https://francozappa.github.io/talk/bluetooth-blues-knob-attack-explained/
<p>In this interview we present the KNOB attack as part of the
CyberWire’s Research Saturday session.</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/_XvjXZCc1DU" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<p>Alternative <a href="https://thecyberwire.com/podcasts/research-saturday/102/notes" target="_blank" rel="noopener">link</a>.</p>
-
KNOB Attack Interview with Dave Bittner (CyberWire)
https://francozappa.github.io/post/2019/knob-cyberwire/
Sat, 14 Sep 2019 00:00:00 +0000
https://francozappa.github.io/post/2019/knob-cyberwire/
<p>Today CyberWire aired my
<a href="https://thecyberwire.com/podcasts/cw-podcasts-rs-2019-09-14.html" target="_blank" rel="noopener">interview</a>
about the
<a href="https://knobattack.com/" target="_blank" rel="noopener">KNOB attack</a>
with <a href="https://twitter.com/bittner" target="_blank" rel="noopener">Dave Bittner</a>.</p>
-
Design, Implementation, and Evaluation of Secure Cyber-Physical and Wireless Systems
https://francozappa.github.io/publication/2019/phd-thesis/
Tue, 27 Aug 2019 00:00:00 +0000
https://francozappa.github.io/publication/2019/phd-thesis/
-
PhD at SUTD Completed!
https://francozappa.github.io/post/2019/phd-completed/
Tue, 27 Aug 2019 00:00:00 +0000
https://francozappa.github.io/post/2019/phd-completed/
<p>I’m glad to announce that I’ve completed my PhD in Computer Science at SUTD
about <em>Design, Implementation, and Evaluation of Secure Cyber-Physical and
Wireless Systems</em>. I’ve uploaded my
<a href="https://francozappa.github.io/publication/phd-thesis/thesis.pdf" target="_blank" rel="noopener">thesis</a>
and the
<a href="https://francozappa.github.io/publication/phd-thesis/slides.pdf" target="_blank" rel="noopener">slides</a>
of my final presentation.
For more information have a look
<a href="https://francozappa.github.io/publication/phd-thesis/" target="_blank" rel="noopener">here</a>.</p>
<p>🎶 😆 🎶</p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/kHx5hCVN26E" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<p>🎶 😆 🎶</p>
-
KNOB Attack Add Slave Patch for poc-internalblue
https://francozappa.github.io/post/2019/knob-repo3/
Mon, 26 Aug 2019 00:00:00 +0000
https://francozappa.github.io/post/2019/knob-repo3/
<p>I’ve pushed the
<a href="https://github.com/francozappa/knob/tree/master/poc-internalblue" target="_blank" rel="noopener">code</a>
to perform the KNOB attack also when the Nexus 5 is the Bluetooth slave
responding to the first LMP packet. To switch between different attack modes
have a look at the updated
<a href="https://github.com/francozappa/knob/blob/master/poc-internalblue/README.md" target="_blank" rel="noopener">README</a>.</p>
<p>For more information visit <a href="https://knobattack.com/" target="_blank" rel="noopener">knobattack.com</a></p>
-
Bluetooth KNOB Attacks
https://francozappa.github.io/project/knob/
Tue, 20 Aug 2019 00:00:00 +0000
https://francozappa.github.io/project/knob/
<p>In 2019 we disclosed two families of high impact attacks affecting the entropy
negotiation protocols of Bluetooth Classic (BC) and Bluetooth Low Energy
(BLE). We named the attacks Key Negotiation of Bluetooth (KNOB) attacks. They
are tracked as <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9506" target="_blank" rel="noopener">CVE-2019-9506</a>.</p>
<p>Our first work titled <a href="https://www.usenix.org/system/files/sec19-antonioli.pdf" target="_blank" rel="noopener">The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation of Bluetooth BR/EDR</a> explains how to exploit BC’s entropy negotiation to downgrade the entropy of a Bluetooth security key to 1 byte and then brute-force it.</p>
<p>In a follow-up work titled
<a href="https://francozappa.github.io/publication/knob-ble/paper.pdf" target="_blank" rel="noopener">Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy</a>
we analyzed also BLE and found that it is vulnerable as
well to the KNOB attacks. In this case the attacker can downgrade the entropy
of BLE security key to 7 bytes and then brute-force it.</p>
<h2 id="usenix-security-2019-paper-presentation">USENIX Security 2019 Paper Presentation</h2>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/v9Xg9XcnNh0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<h2 id="bluetooth-blues-knob-attack-explained--research-saturday">Bluetooth blues: KNOB attack explained. — Research Saturday</h2>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/_XvjXZCc1DU" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<h2 id="bias--knob-attack-against-bluetooth-iacr-attacks-in-crypto">BIAS + KNOB attack against Bluetooth IACR Attacks in Crypto</h2>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/2Sx-81wz9LA" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<h2 id="from-bluetooth-standard-to-standard-compliant-0-days-hardweario">From Bluetooth Standard to Standard Compliant 0-days Hardwear.io</h2>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/ZVSbF11uxuk" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
KNOB Attack FAQ
https://francozappa.github.io/post/2019/knob-faq/
Mon, 19 Aug 2019 00:00:00 +0000
https://francozappa.github.io/post/2019/knob-faq/
<p>In this post I’m trying to address some discussion points and
misconceptions about the KNOB attack.</p>
<h2 id="attribution">Attribution</h2>
<blockquote>
<p>Researchers from CISPA discovered the KNOB attack</p>
</blockquote>
<p><strong>Partially true</strong>. The KNOB attack was discovered by myself (Daniele Antonioli) from SUTD,
Nils Ole Tippenhauer from CISPA, and Kasper Rasmussen from the University of Oxford.
In particular, I’ve identified the vulnerability back in <em>May 2018</em> while I was
working with Kasper on <a href="https://francozappa.github.io/publication/rearby/" target="_blank" rel="noopener">Nearby Connections</a>
at the University of Oxford, and I wrote
the first exploit in <em>October 2018</em> while I was visiting Nils (my former
advisor at SUTD) at CISPA. I’d like to thank the researchers from CISPA
who kindly lent me their Bluetooth devices.</p>
<h2 id="attack">Attack</h2>
<blockquote>
<p>The KNOB attack is performed while two Bluetooth BR/EDR devices are pairing</p>
</blockquote>
<p><strong>False</strong>. The KNOB attack targets the connection phase and can be conducted
between two devices are already paired. See also
<a href="https://francozappa.github.io/publication/knob/slides.pdf" target="_blank" rel="noopener">slide 6</a></p>
<blockquote>
<p>The KNOB attack can only be used to spy Bluetooth communications</p>
</blockquote>
<p><strong>Partially true</strong>. The KNOB attack can also be used to inject valid
ciphertext, e.g., to impersonate a legitimate Bluetooth device.</p>
<blockquote>
<p>The KNOB attack reduces the encryption key size to 1 byte</p>
</blockquote>
<p><strong>False</strong>. The encryption key size stays the same (16 bytes). The KNOB attack reduces
the <em>entropy (randomness)</em> of the key to 1 byte. For example the key
<code>0xa395a045bf2410983b4309214598beaf</code> (16 byte of entropy)
is reduced to
<code>0xa3000000000000000000000000000000</code> (1 byte of entropy) and not
to <code>0xa3</code>.</p>
<blockquote>
<p>The KNOB attack is theoretical</p>
</blockquote>
<p><strong>False</strong>. The KNOB attack exploits an actual vulnerability in the key
negotiation protocol of Bluetooth (BR/EDR). As it is an attack at the <em>architectural</em> level,
all standard compliant devices are potentially vulnerable.
Back in 2018 we performed the KNOB attack on more than 20 Bluetooth devices,
and all of them were vulnerable. You can test if your device is vulnerable by
using our
<a href="https://github.com/francozappa/knob/tree/master/poc-internalblue" target="_blank" rel="noopener">PoC</a>.</p>
<blockquote>
<p>The attacker has to be “local” or in a “privileged” position</p>
</blockquote>
<p><strong>False</strong>. The KNOB attack can be conducted remotely. For obvious reasons the
attacker has to be in Bluetooth range, but this does not imply a privileged
position.</p>
<blockquote>
<p>Internalblue enabled the discovery of the KNOB attack</p>
</blockquote>
<p><strong>False</strong>. I’ve discovered the vulnerability while I was analyzing
<a href="https://francozappa.github.io/publication/rearby/" target="_blank" rel="noopener">Nearby Connections</a>
and reading the Bluetooth specification in May 2018. Then, while I was looking
at devices with an open source Bluetooth firmware,
I’ve stumbled upon the Internalblue v0.1. To implement the attack I had
to
<a href="https://github.com/francozappa/knob/tree/master/poc-internalblue" target="_blank" rel="noopener">extend Internalblue</a>
to support LMP packet injection, and develop some
<a href="https://github.com/francozappa/knob/tree/master/e0" target="_blank" rel="noopener">extra code for E0</a>.
Nevertheless,
<a href="https://github.com/seemoo-lab/internalblue" target="_blank" rel="noopener">Internalblue</a>
is an awesome project, I recommend it, and I thank
<a href="http://tech.mantz-it.com/" target="_blank" rel="noopener">Dennis</a>
and
<a href="http://nerdine.org/" target="_blank" rel="noopener">Jiska</a>
for releasing it to the public.</p>
<h2 id="implementation">Implementation</h2>
<blockquote>
<p>The researchers did not implement the attack</p>
</blockquote>
<p><strong>False</strong>. We implemented the KNOB attack and our implementation generates
the same effects of a remote KNOB attack conducted over the air. This is nice
because we have a reliable and cheap attack setup that can be reproduced
without the need of signal manipulation and jamming techniques, and SDR.
If you want to reproduce the attack look at our
<a href="https://github.com/francozappa/knob" target="_blank" rel="noopener">repo</a>.</p>
<blockquote>
<p>The researchers implemented only the firmware attack</p>
</blockquote>
<p><strong>False</strong>. We implement the remote attack by patching the firmware of one of
the victim devices (Nexus 5). Our patches simulate the effect of a remote MitM
attack and they do not change any firmware logic. This allows us to test the
effect of a remote MitM attack on actual devices without having to perform the
attack over the air.</p>
-
KNOB Attack Code for E0 and Slides from SEC19 are Online
https://francozappa.github.io/post/2019/knob-repo2/
Sun, 18 Aug 2019 00:00:00 +0000
https://francozappa.github.io/post/2019/knob-repo2/
<p>The
<a href="https://github.com/francozappa/knob/tree/master/e0" target="_blank" rel="noopener">code</a>
that we developed to validate and brute force
<a href="https://en.wikipedia.org/wiki/E0_%28cipher%29" target="_blank" rel="noopener">E0</a>
encryption keys is online.</p>
<p>The
<a href="https://francozappa.github.io/publication/knob/slides.pdf" target="_blank" rel="noopener">slides</a>
of my KNOB attack SEC19 talk are also online.
As we can see from the slides, the KNOB attack is <em>not</em>
conducted while two Bluetooth devices are pairing, but when two devices are
connecting (establishing a new encrypted session).
Bluetooth (BR/EDR) is a technology with a <em>pair-once</em>
<em>connect-multiple-times</em> paradigm. For example, you pair your smartphone
with your car once, and then every day you connect the two and the devices
negotiate a new (fresh) encryption key.</p>
<p>For more information visit <a href="https://knobattack.com/" target="_blank" rel="noopener">knobattack.com</a></p>
-
KNOB Attack Repository is Online
https://francozappa.github.io/post/2019/knob-repo/
Fri, 16 Aug 2019 00:00:00 +0000
https://francozappa.github.io/post/2019/knob-repo/
<p>Our <a href="https://github.com/francozappa/knob" target="_blank" rel="noopener">KNOB repository</a>
is online, and it includes our
<a href="https://github.com/francozappa/knob/tree/master/poc-internalblue" target="_blank" rel="noopener">PoC</a>.</p>
<p>For more information visit <a href="https://knobattack.com/" target="_blank" rel="noopener">knobattack.com</a></p>
-
Key Negotiation Of Bluetooth (KNOB) Attack
https://francozappa.github.io/post/2019/knob-announce/
Wed, 14 Aug 2019 00:00:00 +0000
https://francozappa.github.io/post/2019/knob-announce/
<p>The embargo is over! The information about <em>The KNOB is Broken: Exploiting Low Entropy
in the Encryption Key Negotiation Of Bluetooth BR/EDR</em>, including our research
paper, CVE details, and media coverage, are publicly available at
<a href="https://knobattack.com/" target="_blank" rel="noopener">knobattack.com</a></p>
-
My PhD Defense at SUTD
https://francozappa.github.io/post/2019/phd-defense/
Mon, 10 Jun 2019 11:28:36 +0800
https://francozappa.github.io/post/2019/phd-defense/
<p>Soon I’m going to defend my PhD thesis at SUTD. Feel free to join!</p>
<p>Date and time:</p>
<blockquote>
<p>Friday, 5 July 2019, 10:00 - 11:00 (AM)</p>
</blockquote>
<p>Venue:</p>
<blockquote>
<p>Think Tank 20 (2.305)</p>
</blockquote>
<p>Title of the talk:</p>
<blockquote>
<p>Design, Implementation, and Evaluation of Secure Cyber-Physical and Wireless System</p>
</blockquote>
<p>Abstract:</p>
<blockquote>
<p>In the first part of the presentation we will talk about our recent
contributions in the area of wireless systems security.
Wireless systems are used to transmit (sensitive) information and to manage
and monitor systems remotely. In our recent works we focus on three problems
to advance the security of wireless systems:
effectiveness of deployed physical layer features as defense mechanisms,
complexity and accessibility of wireless technologies, and security
evaluations of wireless protocols. Firstly, we present a theoretical and
empirical comparisons between b/n/ac amendments of IEEE 802.11 (WLAN).
Our goal is to estimate and measure whether or not modern physical layer
features, such as MIMO and beamforming, could be used to as defense mechanism.
Afterwards, we will talk about our security analysis of Nearby Connections, a
proprietary API for proximity-based services developed by Google. This API
uses a combination of Bluetooth and Wi-Fi, and it is included in all Android
devices since version 4.0 and all Android Things devices. Our analysis
uncovers the proprietary (security) mechanisms of Nearby Connections and it is
based on our reverse-engineering of its implementation. We demonstrate that
Nearby Connections is vulnerable to critical threats by implementing attacks
where we maliciously manipulate Nearby Connections and we extend the
connection range to devices that are not nearby. Prior to publication we
disclosed our findings to Google and we suggested them effective
countermeasures. In the last part of the presentation we will summarize our
contributions in the area of cyber-physical systems (CPS). In particular we
will introduce MiniCPS, a toolkit for real-time CPS simulation and emulation
and its related projects and use cases.</p>
</blockquote>
-
NDSS 2019 YouTube video of the presentation
https://francozappa.github.io/post/2019/ndss19-video/
Wed, 03 Apr 2019 00:00:00 +0000
https://francozappa.github.io/post/2019/ndss19-video/
<p>My NDSS 2019 presentation of
<em>Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google’s “Nearby Connections” on Android</em></p>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/h5geJLoQIsU" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation of Bluetooth BR/EDR
https://francozappa.github.io/publication/2019/knob/
Mon, 01 Apr 2019 00:00:00 +0000
https://francozappa.github.io/publication/2019/knob/
-
NDSS 2019 in San Diego
https://francozappa.github.io/post/2019/ndss19-conf/
Tue, 26 Feb 2019 11:28:36 +0800
https://francozappa.github.io/post/2019/ndss19-conf/
<p>This week I’ve been in San Diego CA for the
<a href="https://www.ndss-symposium.org/" target="_blank" rel="noopener">The Network and Distributed System Security Symposium (NDSS)
2019</a> conference.</p>
<p>I’ve presented our paper about
<a href="https://francozappa.github.io/publication/rearby/paper.pdf" target="_blank" rel="noopener">Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby
Connections’ on Android</a>.</p>
<p>Please have a look at the
<a href="https://francozappa.github.io/publication/rearby/slides.pdf" target="_blank" rel="noopener">slides</a>,
at the,
<a href="https://github.com/francozappa/REarby/tree/master/poc-hostapd" target="_blank" rel="noopener">Soft AP manipulation PoC</a>
and the
<a href="https://www.reddit.com/r/netsec/comments/aye2q9/nearby_threats_reversing_analyzing_and_attacking/" target="_blank" rel="noopener">reddit thread</a>.</p>
-
CFP: Cyber-Physical System SECurity (CPS-SEC) Workshop 2019
https://francozappa.github.io/post/2019/cfp-cps-sec19/
Thu, 14 Feb 2019 00:00:00 +0000
https://francozappa.github.io/post/2019/cfp-cps-sec19/
<p>Recently, I’ve accepted the invitation to join the
<a href="https://cns2019.ieee-cns.org/workshop/cps-sec-international-workshop-cyber-physical-systems-security" target="_blank" rel="noopener">IEEE CPS-SEC workshop</a>
TPC. CPS-SEC is co-located with the
<a href="https://cns2019.ieee-cns.org/" target="_blank" rel="noopener">IEEE CNS conference</a> .
From the official website:</p>
<blockquote>
<p>The IEEE International Workshop on Cyber-Physical Systems Security (CPS-Sec)
will be held in conjunction with the IEEE Conference on Communications and
Network Security (CNS) 2019 in Washington, D.C., USA, on 10-12 June, 2019.</p>
</blockquote>
<blockquote>
<p>Nowadays, the correct functioning of information systems represents a
fundamental milestone for the well-being of modern economies and societies.
The scientific evolution of digital, analog, and physical components with the
interactions between networks created the Cyber-Physical Systems (CPS). Even
though the benefits of the cyber and physical world interactions are
noticeable, new security challenges have arisen: typical vulnerabilities from
the cyber domain emerged in CPS. Cyber-attacks over CPS pose different
security challenges. In particular, classic Information Technology (IT) cyber
security tools are considered partially or totally ineffective in CPS
scenarios because complex cyber-physical attacks could avoid security
detection methodologies developed specifically for the IT world. The
prevention, detection, and mitigation of cyber-attacks encompass both the
physical and the cyber layers of a system: to this end, approaches to securing
CPS consider techniques adopted in the physical domain and in the cyber space.</p>
</blockquote>
<blockquote>
<p>Following the success of the previous editions, the IEEE International
Workshop on Cyber-Physical Systems Security 2019 (CPS-Sec 2019) aims to
represent a forum for researchers and practitioners from industry and academia
interested in the areas of CPS security. CPS-Sec 2019 seeks novel submissions
describing practical and theoretical solutions to the cyber-physical security
challenges. A submission may represent any CPS domain, including embedded
systems, Internet of Things (IoT), Industrial Internet of Things (IIoT), SCADA
Systems, Smart-Grid Systems, Critical Infrastructure, Automotive and
Transportation Systems, Medical applications.</p>
</blockquote>
<ul>
<li>Important dates:
<ul>
<li>Submission Deadline: 15 March, 2019 (extended)</li>
<li>Notification of Acceptance: 26 March, 2019</li>
<li>Camera-Ready: 2 April, 2019</li>
</ul>
</li>
</ul>
-
Slides
https://francozappa.github.io/slides/example/
Tue, 05 Feb 2019 00:00:00 +0000
https://francozappa.github.io/slides/example/
<h1 id="create-slides-in-markdown-with-wowchemy">Create slides in Markdown with Wowchemy</h1>
<p><a href="https://wowchemy.com/" target="_blank" rel="noopener">Wowchemy</a> | <a href="https://owchemy.com/docs/managing-content/#create-slides" target="_blank" rel="noopener">Documentation</a></p>
<hr>
<h2 id="features">Features</h2>
<ul>
<li>Efficiently write slides in Markdown</li>
<li>3-in-1: Create, Present, and Publish your slides</li>
<li>Supports speaker notes</li>
<li>Mobile friendly slides</li>
</ul>
<hr>
<h2 id="controls">Controls</h2>
<ul>
<li>Next: <code>Right Arrow</code> or <code>Space</code></li>
<li>Previous: <code>Left Arrow</code></li>
<li>Start: <code>Home</code></li>
<li>Finish: <code>End</code></li>
<li>Overview: <code>Esc</code></li>
<li>Speaker notes: <code>S</code></li>
<li>Fullscreen: <code>F</code></li>
<li>Zoom: <code>Alt + Click</code></li>
<li><a href="https://github.com/hakimel/reveal.js#pdf-export" target="_blank" rel="noopener">PDF Export</a>: <code>E</code></li>
</ul>
<hr>
<h2 id="code-highlighting">Code Highlighting</h2>
<p>Inline code: <code>variable</code></p>
<p>Code block:</p>
<pre><code class="language-python">porridge = "blueberry"
if porridge == "blueberry":
print("Eating...")
</code></pre>
<hr>
<h2 id="math">Math</h2>
<p>In-line math: $x + y = z$</p>
<p>Block math:</p>
<p>$$
f\left( x \right) = ;\frac{{2\left( {x + 4} \right)\left( {x - 4} \right)}}{{\left( {x + 4} \right)\left( {x + 1} \right)}}
$$</p>
<hr>
<h2 id="fragments">Fragments</h2>
<p>Make content appear incrementally</p>
<pre><code>{{% fragment %}} One {{% /fragment %}}
{{% fragment %}} **Two** {{% /fragment %}}
{{% fragment %}} Three {{% /fragment %}}
</code></pre>
<p>Press <code>Space</code> to play!</p>
<span class="fragment " >
One
</span>
<span class="fragment " >
**Two**
</span>
<span class="fragment " >
Three
</span>
<hr>
<p>A fragment can accept two optional parameters:</p>
<ul>
<li><code>class</code>: use a custom style (requires definition in custom CSS)</li>
<li><code>weight</code>: sets the order in which a fragment appears</li>
</ul>
<hr>
<h2 id="speaker-notes">Speaker Notes</h2>
<p>Add speaker notes to your presentation</p>
<pre><code class="language-markdown">{{% speaker_note %}}
- Only the speaker can read these notes
- Press `S` key to view
{{% /speaker_note %}}
</code></pre>
<p>Press the <code>S</code> key to view the speaker notes!</p>
<aside class="notes">
<ul>
<li>Only the speaker can read these notes</li>
<li>Press <code>S</code> key to view</li>
</ul>
</aside>
<hr>
<h2 id="themes">Themes</h2>
<ul>
<li>black: Black background, white text, blue links (default)</li>
<li>white: White background, black text, blue links</li>
<li>league: Gray background, white text, blue links</li>
<li>beige: Beige background, dark text, brown links</li>
<li>sky: Blue background, thin dark text, blue links</li>
</ul>
<hr>
<ul>
<li>night: Black background, thick white text, orange links</li>
<li>serif: Cappuccino background, gray text, brown links</li>
<li>simple: White background, black text, blue links</li>
<li>solarized: Cream-colored background, dark green text, blue links</li>
</ul>
<hr>
<section data-noprocess data-shortcode-slide
data-background-image="/media/boards.jpg"
>
<h2 id="custom-slide">Custom Slide</h2>
<p>Customize the slide style and background</p>
<pre><code class="language-markdown">{{< slide background-image="/media/boards.jpg" >}}
{{< slide background-color="#0000FF" >}}
{{< slide class="my-style" >}}
</code></pre>
<hr>
<h2 id="custom-css-example">Custom CSS Example</h2>
<p>Let’s make headers navy colored.</p>
<p>Create <code>assets/css/reveal_custom.css</code> with:</p>
<pre><code class="language-css">.reveal section h1,
.reveal section h2,
.reveal section h3 {
color: navy;
}
</code></pre>
<hr>
<h1 id="questions">Questions?</h1>
<p><a href="https://github.com/wowchemy/wowchemy-hugo-modules/discussions" target="_blank" rel="noopener">Ask</a></p>
<p><a href="https://wowchemy.com/docs/managing-content/#create-slides" target="_blank" rel="noopener">Documentation</a></p>
-
Reversing and Attacking Google Nearby
https://francozappa.github.io/project/rearby/
Sat, 02 Feb 2019 17:46:49 +0800
https://francozappa.github.io/project/rearby/
<p>In 2019 in a paper titled
<a href="https://francozappa.github.io/publication/rearby/paper.pdf" target="_blank" rel="noopener">Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby
Connections’ on Android</a>
we uncovered issues on Nearby Connections, an proprietary Google API
included in all Android devices. The API is used to provide proximity-based
services using a combination of Bluetooth and Wi-Fi wireless technologies.</p>
<p>We developed an open-sourced <a href="https://github.com/francozappa/REarby" target="_blank" rel="noopener">REarby</a>,
a toolkit to automate reverse engineering and attacking Nearby Connections.</p>
<h2 id="ndss-2019-paper-presentation">NDSS 2019 Paper Presentation</h2>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/h5geJLoQIsU" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
-
Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android
https://francozappa.github.io/publication/2019/rearby/
Sat, 02 Feb 2019 00:00:00 +0000
https://francozappa.github.io/publication/2019/rearby/
-
NDSS 2019 camera-ready and PoC attack code
https://francozappa.github.io/post/2019/ndss19-cr/
Wed, 23 Jan 2019 00:00:00 +0000
https://francozappa.github.io/post/2019/ndss19-cr/
<p>The camera-ready version of
<em>Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google’s “Nearby Connections” on Android</em>
is available
<a href="https://francozappa.github.io/publication/rearby/paper.pdf" target="_blank" rel="noopener">here</a></p>
<p>We also released a
<a href="https://github.com/francozappa/REarby/tree/master/poc-hostapd" target="_blank" rel="noopener">proof of concept code</a>
to perform the <em>Soft AP manipulation attack</em>. The code was previously
disclosed to Google. In summary, the attack allows a malicious Nearby
Connections server (advertiser) to redirect a client to a malicious Internet
connected access point. As a result the attacker can reconfigure the wireless
network interface of the victim via DHCP and gets access to all the Wi-Fi
traffic (even traffic from non Nearby Connections applications).</p>
-
Academic day_night and search
https://francozappa.github.io/post/2018/theme-daynight-search/
Sun, 02 Dec 2018 11:28:36 +0800
https://francozappa.github.io/post/2018/theme-daynight-search/
<p>Recently <a href="https://github.com/gcushen" target="_blank" rel="noopener">gcushen</a> updated
<a href="https://github.com/gcushen/hugo-academic" target="_blank" rel="noopener">Academic</a> (the theme that I’m using
to build this website with <code>hugo</code>)
with two useful features that I recommend to use: <code>day_night</code> and <code>search</code>.</p>
<p><code>day_night</code> allows the reader to toggle light and dark color themes for the website.
If you look at the top navigation bar on the right you should spot an icon
with either a moon (to switch to a dark theme) or a sun (to switch to a light
theme).</p>
<p><code>search</code> allows to search the website using keywords such as minicps or
rearby. This functionality is accessed by clicking the magnifying glass icon
close to the theme switch icon or by using <code>vim</code>-like shortcuts: <code>/</code> enables
search and <code>Esc</code> disables it. Currently, this functionality can be supported
using built-in Fuse (client-side) or Agolia (server-side). I’m using the first
option.</p>
<p>If you are browsing from a mobile device the icons can be found by tapping the
global menu icon.</p>
-
Our Paper is Accepted for NDSS 2019
https://francozappa.github.io/post/2018/ndss19/
Thu, 15 Nov 2018 00:00:00 +0000
https://francozappa.github.io/post/2018/ndss19/
<p>I’m very happy to announce that our paper titled
<em>Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google’s “Nearby
Connections” on Android</em> has been accepted for the
<a href="https://www.ndss-symposium.org/" target="_blank" rel="noopener">The Network and Distributed System Security Symposium (NDSS)</a>. Here you can download a
<a href="http://www.cs.ox.ac.uk/files/10367/ndss19-paper367.pdf" target="_blank" rel="noopener">pre-print</a>.
Here is the list of
<a href="https://www.ndss-symposium.org/ndss2019/accepted-papers/" target="_blank" rel="noopener">accepted papers for NDSS 2019</a>
Soon I’ll update more material such an exploit PoC code.</p>
<p>Congratulations to
<a href="https://www.cs.ox.ac.uk/people/kasper.rasmussen/" target="_blank" rel="noopener">Kasper</a>
and
<a href="https://tippenhauer.de/" target="_blank" rel="noopener">Nils</a> and thank you for the help.</p>
-
Visiting Researcher at CISPA, University of Saarbrücken
https://francozappa.github.io/post/2018/cispa-visiting/
Thu, 23 Aug 2018 11:28:36 +0800
https://francozappa.github.io/post/2018/cispa-visiting/
<p>As part of my PhD I’ve recently joined as a visiting researcher the
<a href="https://cispa.saarland/" target="_blank" rel="noopener">CISPA – Helmholtz-Zentrum, Saarbruecken</a>
🇩🇪.</p>
<p>I’m going to spend six months there, supervised by
<a href="https://cispa.saarland/people/nils.tippenhauer/" target="_blank" rel="noopener">Prof. N.O. Tippenhauer</a>.</p>
-
Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot
https://francozappa.github.io/publication/2018/cpsbot-preprint/
Thu, 26 Apr 2018 00:00:00 +0000
https://francozappa.github.io/publication/2018/cpsbot-preprint/
-
State-Aware Anomaly Detection for Industrial Control Systems
https://francozappa.github.io/publication/2018/state-anomaly-detection/
Mon, 05 Mar 2018 00:00:00 +0000
https://francozappa.github.io/publication/2018/state-anomaly-detection/
-
HowTo: Connect to the SUTD's eduroam using (Arch) Linux
https://francozappa.github.io/post/2018/sutd-eduroam/
Sat, 27 Jan 2018 11:28:36 +0800
https://francozappa.github.io/post/2018/sutd-eduroam/
<p>After the
<a href="https://francozappa.github.io/post/sutd-vpn-student/" target="_blank" rel="noopener">post about connecting to SUTD’s VPN</a>
is now time to connect eduroam! Again, SUTD’s IT support for (Arch) Linux at the time of
writing is <em>none</em>.</p>
<p>SUTD runs a setup with only username-password (no certificates required) and
the connection can be established using the GUI of NetworkManager. If your
WiFi card is on and eduroam is in your range you should see the <code>eduroam</code> SSID
on the list of the available WiFi networks. If you attempt to connect then
all you need to do is enter your <code>username</code> and <code>password</code>. As usual, PhD
student and staff are separated into different namespaces. Use the username
<code>[email protected]</code> if you are a staff member or <code>[email protected]</code>
if you are a student (<code>xxxxxxx</code> is your 7-digits student id). The password
should be the same as the one you are using to connect to the Internet from
SUTD.</p>
<p>Your NetworkManager Wi-Fi Security screen should look like this (<code>username</code> and
<code>password</code> are obscured):</p>
<p>
<figure >
<div class="d-flex justify-content-center">
<div class="w-100" ><img src="https://francozappa.github.io/img/posts/sutd-eduroam.png" alt="SUTD eduroam" loading="lazy" data-zoomable /></div>
</div></figure>
</p>
<p>🐧</p>
-
HowTo: Connect to the SUTD's VPN using (Arch) Linux as a Student
https://francozappa.github.io/post/2018/sutd-vpn/
Sat, 20 Jan 2018 11:28:36 +0800
https://francozappa.github.io/post/2018/sutd-vpn/
<p>I’ve recently came across the problem of connecting to the SUTD VPN server
from overseas. SUTD’s IT support for (Arch) Linux at the time of writing
is <em>none</em>, and after a bit of research I’ve found a quick and easy solution.</p>
<p>SUTD runs <em>Pulse Connect Secure (PCS)</em> server, a commercial solution known as
<em>Juniper SSL VPN</em>. Luckily there is an open-source client that supports PCS
named <em>OpenConnect</em>. Arch has an <code>openconnect</code> package and a NetworkManager
plugin called <code>networkmanager-openconnect</code>. Install both packages trough your
package manager.</p>
<p>Then you can use the (user-friendly?) NetworkManager GUI to add the new VPN setup.
Use the openconnect profile and all the default options (eg: no need of Realm, and Certificates).
Point your <code>Gateway</code> to <code>https://sutdvpn.sutd.edu.sg/dana-na/auth/url_0/welcome.cgi</code> and
your GUI screen should look like this:</p>
<p>
<figure >
<div class="d-flex justify-content-center">
<div class="w-100" ><img src="https://francozappa.github.io/img/posts/sutd-vpn-student.png" alt="SUTD VPN Student" loading="lazy" data-zoomable /></div>
</div></figure>
</p>
<p>Then save it and you will be prompted to accept a certificate. Once you accept
it you can enter your username (student_id eg: <code>1001234</code>) and passwords (same
as the <code>SUTD_Student</code> network’s one). Once you are connected your GUI should
present you a message to confirm that. You can manually check it using
<code>ifconfig</code> and <code>route</code> commands.
If you encounter problems try to have a look
<a href="https://wiki.archlinux.org/index.php?title=Pulse_Connect_Secure&mobileaction" target="_blank" rel="noopener">here</a>
or post a comment below.</p>
<p>P.S. Thanks to
<a href="http://people.sutd.edu.sg/~nils_tippenhauer/connecting-to-sutd-vpn-from-linux/" target="_blank" rel="noopener">Nils’s post</a>
from which I’ve started my research,
this post should update it with an easier setup!</p>
<p>🐧</p>
-
Visiting Researcher at the University of Oxford
https://francozappa.github.io/post/2018/oxford-visiting/
Sun, 14 Jan 2018 11:28:36 +0800
https://francozappa.github.io/post/2018/oxford-visiting/
<p>As part of my PhD I’ve recently joined as a visiting researcher the
<a href="https://www.cs.ox.ac.uk/" target="_blank" rel="noopener">Department of Computer Science, University of Oxford</a>
🇬🇧.</p>
<p>I’m going to spend around six months there, supervised by
<a href="https://www.cs.ox.ac.uk/people/kasper.rasmussen/" target="_blank" rel="noopener">Prof. Kasper Rasmussen</a>
and co-supervised by
<a href="https://www.cs.ox.ac.uk/people/ivan.martinovic/" target="_blank" rel="noopener">Prof. Ivan Martinovic</a>.</p>
<p>I’m very excited!</p>
-
SAC 2018
https://francozappa.github.io/post/2018/sac18/
Thu, 21 Dec 2017 11:28:36 +0800
https://francozappa.github.io/post/2018/sac18/
<p>I’m happy to announce that our paper titled
<em>State-Aware Anomaly Detection for Industrial Control Systems</em>
has been accepted for the
<a href="https://www.sigapp.org/sac/sac2018/" target="_blank" rel="noopener">Symposium On Applied Computing (SAC) 2018</a> conference.</p>
<p>Congratulations to <a href="http://people.sutd.edu.sg/~1001407/?page_id=10&lang=en" target="_blank" rel="noopener">Hamid</a>,
and the co-authors!</p>
-
Institutional Email Issue
https://francozappa.github.io/post/2017/email-issues/
Sun, 26 Nov 2017 11:28:36 +0800
https://francozappa.github.io/post/2017/email-issues/
<p>For some <!-- STUpiD --> reasons my <code>[email protected]</code> email address was
deactivated <em>without notice</em> sometime at the end of October 2017. Unfortunately
I’ve discovered it only this week and I’m still trying to reactivate it. I
apologize if you recently got an error message while trying to send me an
email to that address.</p>
<p>Please use the <code>[email protected]</code>
address instead. I ❤️ ✉️</p>
-
S317: MiniCPS Challenges
https://francozappa.github.io/post/2017/minicps-s3-code/
Tue, 21 Nov 2017 14:28:36 +0800
https://francozappa.github.io/post/2017/minicps-s3-code/
<p>I recently open-sourced the code that I developed for the MiniCPS challenges
for the SWaT Security Showdown (S3) event in 2017.</p>
<p><a href="https://github.com/scy-phy/minicps/tree/master/examples/s3-2017" target="_blank" rel="noopener">Here</a> is the code.</p>
<p>The <code>init.sh</code> contains the list of commands that I run on a local testing
machine and on the remote AWS instances that we used during the event.
The attackers were provided with the VPN credentials to
access two different subnetworks in a <em>mixed</em> MiniCPS simulation eg:
water treatment (SWaT) and water distribution (WaDI).</p>
<p>The code is expecting to find the four files (flags) in the <code>/root/flags</code>
folder named <code>wadi1</code>, <code>wadi2</code>, <code>flag2</code>, and <code>flag3</code>. Indeed you have to create
those files and write the string flags.</p>
<p>The relevant information to start and stop the challenges are in the
<code>README.md</code>. In general, I like to use a <code>Makefile</code> as a launcher for the various
commands. If you open the file, you will find several targets. To test the
challenges locally use:</p>
<pre><code>make local
</code></pre>
<p>Please let me know if you find any bugs or missing files.</p>
-
MiniCPS Framework
https://francozappa.github.io/project/minicps/
Tue, 07 Nov 2017 17:46:49 +0800
https://francozappa.github.io/project/minicps/
<p><a href="https://dl.acm.org/citation.cfm?id=2808715" target="_blank" rel="noopener">MiniCPS</a> is a framework that we developed to
simulate/emulate
Cyber-Physical Systems, including Industrial Control System. MiniCPS is open
source and available on <a href="https://github.com/scy-phy/minicps" target="_blank" rel="noopener">Github</a>. The framework is
build on top of <a href="http://mininet.org/" target="_blank" rel="noopener">Mininet</a>.</p>
<p>We used the framework in
several other projects such as the development of
novel attacks (e.g., <a href="https://arxiv.org/pdf/1802.00152" target="_blank" rel="noopener">ICS botnets</a>), countermeasures
(e.g., <a href="https://dl.acm.org/citation.cfm?id=2994493" target="_blank" rel="noopener">high-interaction ICS honeypots</a>),
and gamified ICS security competitions (e.g.,
<a href="https://dl.acm.org/citation.cfm?id=3140253" target="_blank" rel="noopener">S3 ICS CTF</a>).</p>
-
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3
https://francozappa.github.io/publication/2017/s3/
Wed, 01 Nov 2017 00:00:00 +0000
https://francozappa.github.io/publication/2017/s3/
-
Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN
https://francozappa.github.io/publication/2017/wifi-mimo/
Sat, 07 Oct 2017 00:00:00 +0000
https://francozappa.github.io/publication/2017/wifi-mimo/
-
ST Engineering Poster Award at FIRST Industry Workshop 2017
https://francozappa.github.io/post/2017/first17/
Wed, 26 Jul 2017 11:28:36 +0800
https://francozappa.github.io/post/2017/first17/
<p>I’m happy to announce that my poster titled
<a href="files/posters/cps-spc16.pdf">Towards high-interaction virtual ICS honeypots-in-a-box</a>
won the
<a href="https://www.stengg.com/en/electronics/" target="_blank" rel="noopener">ST Engineering</a>
Poster Award at the
<a href="https://gradevents.sutd.edu.sg/first/" target="_blank" rel="noopener">FIRST industry workshop</a>, held at
SUTD. This is a special gift one day before my 30th birthday!
Here I’m sharing a picture from the award ceremony:</p>
<p>
<figure >
<div class="d-flex justify-content-center">
<div class="w-100" ><img src="https://francozappa.github.io/img/posts/first17-award.jpg" alt="FIRST17 Award Ceremony" loading="lazy" data-zoomable /></div>
</div></figure>
</p>
<p>Congratulations also to <a href="http://people.sutd.edu.sg/~1001407/?page_id=10&lang=en" target="_blank" rel="noopener">Hamid</a> who won
one award:</p>
<p>
<figure >
<div class="d-flex justify-content-center">
<div class="w-100" ><img src="https://francozappa.github.io/img/posts/first17-hamid.jpg" alt="FIRST17 Hamid and Me" loading="lazy" data-zoomable /></div>
</div></figure>
</p>
<p>and <a href="http://people.sutd.edu.sg/~eyasugetahun/" target="_blank" rel="noopener">Eyasu</a> who managed to win two awards:</p>
<p>
<figure >
<div class="d-flex justify-content-center">
<div class="w-100" ><img src="https://francozappa.github.io/img/posts/first17-eyasu.jpg" alt="FIRST17 Eyasu and Me" loading="lazy" data-zoomable /></div>
</div></figure>
</p>
-
Future of Science, Technology and Policy Workshop
https://francozappa.github.io/post/2017/smart17/
Mon, 17 Jul 2017 11:28:36 +0800
https://francozappa.github.io/post/2017/smart17/
<p>Recently I was selected as a <em>mentor</em> for the cybersecurity track of the
<em>Future of Science, Technology and Policy</em> Workshop, organized by
<a href="https://smart.mit.edu/" target="_blank" rel="noopener">SMART</a>. I had the privilege to supervision
six graduate and post-graduate colleagues with different backgrounds:</p>
<ol>
<li>Jukka Isohätälä from NUS (Physics and CS)</li>
<li>Nikhil Mallareddy from MIT (Environmental Engineering)</li>
<li>Ioannis Fousekis from ETH (EECS and Economics)</li>
<li>Michael Wicki from ETH (Political sciences and Economics)</li>
<li>Fabian Willibaldf rom ETH (Environmental Engineering)</li>
<li>Jay Prakash from SUTD (EECS)</li>
</ol>
<p>I’m presenting the summary of our activities of day 2 related to
cybersecurity organized at my institution <a href="https://www.sutd.edu.sg/" target="_blank" rel="noopener">SUTD</a>:</p>
<p>We started knowing about Singapore’s Cyber-Security Agency (CSA). In
particular, we were introduced to Singapore cybersecurity strategies and
long-term plans.Then we heard the personal story of a cybersecurity
startup founder and we discovered common and effective threats in the
cybersecurity landscape. Finally, we heard two presentations from two
SUTD cybersecurity professors about novel cybersecurity problems and
solutions, such as cyber-physical systems, IoT and adversarial machine
learning. We understood the importance of education and awareness when
talking about cybersecurity.</p>
<p>After lunch we visited SUTD’s world-class cybersecurity facilites. We started
from <a href="https://itrust.sutd.edu.sg/" target="_blank" rel="noopener">iTrust</a>, SUTD’s cybersecurity research
centre. iTrust covers a broad range of topics spanning from theoretical
to applied cybersecurity. The range of research area covered spans from
traditional computer security to domain-specific areas such as: industrial
control systems, Internet of Things, and autonomous vehicles.</p>
<p>iTrust in collaboration with the Singapore government and private
industries has developed four state-of-the-art testbeds. Those testbed
allow researchers to apply and evaluate their ideas in realistic and
safe environment. We now briefly comment of each of the testbed. The
Secure Water Treatment testbed is the oldest and it includes advanced
sub-processes such as Ultrafiltration and Reverse Osmosis. The water
treated by SWaT is one of the sources of the second oldest testbed: the
Water Distribution (WaDi) testbed. WaDi is a miniaturized reproduction
of a water distribution facility with six consumers tanks with
independent demands patters. WaDi can be used to simulated water
leakages, water-hammer attacks and water contamination. Both SWaT and
WaDi can be powered by EPIC the smart grid testbed. EPIC is the newest
and less-know testbed at SUTD and several researchers are actively
working to evaluate it. Finally, we visited the Internet-of-Things
testbed that includes an anechoic chamber to perform radio tests and
several Commercial-Off-The-Shelf devices (such as IP camera, smart
thermostats and smart lamps) to recreate a smart home environment.</p>
<p>Overall it was a very rich experience. We understand that coming up with
a cybersecurity policy is a hard problem for several independent reasons
such as cross-disciplinary knowledge, funding, awareness, and education.</p>
<p>Here I’m sharing a picture with all the participants from SUTD:</p>
<p>
<figure >
<div class="d-flex justify-content-center">
<div class="w-100" ><img src="https://francozappa.github.io/img/posts/smart17-sutd.jpg" alt="SMART SUTD" loading="lazy" data-zoomable /></div>
</div></figure>
</p>
<p>More pictures <a href="https://www.instagram.com/explore/tags/fstp2017/" target="_blank" rel="noopener">here</a></p>
-
Legacy-Compliant Data Authentication for Industrial Control System Traffic
https://francozappa.github.io/publication/2017/legacy-authentication/
Sat, 01 Jul 2017 00:00:00 +0000
https://francozappa.github.io/publication/2017/legacy-authentication/
-
Towards high-interaction virtual ICS honeypots-in-a-box
https://francozappa.github.io/publication/2016/honeypot/
Fri, 01 Jan 2016 00:00:00 +0000
https://francozappa.github.io/publication/2016/honeypot/
<p>This paper won the <strong>Research excellence award by ST Engineering during the FIRST workshop in 2017</strong>.</p>
-
MiniCPS: A toolkit for security research on CPS networks
https://francozappa.github.io/publication/2015/minicps/
Thu, 01 Jan 2015 00:00:00 +0000
https://francozappa.github.io/publication/2015/minicps/
-
Design and Testing of Random Number Generators (RNG)
https://francozappa.github.io/publication/2013/master-thesis/
Tue, 01 Jan 2013 00:00:00 +0000
https://francozappa.github.io/publication/2013/master-thesis/
-
On-chip lightweight implementation of reduced NIST randomness test suite
https://francozappa.github.io/publication/2013/nist-randomness/
Tue, 01 Jan 2013 00:00:00 +0000
https://francozappa.github.io/publication/2013/nist-randomness/
-
https://francozappa.github.io/admin/config.yml
Mon, 01 Jan 0001 00:00:00 +0000
https://francozappa.github.io/admin/config.yml