Daniele Antonioli https://francozappa.github.io/ Daniele Antonioli Wowchemy (https://wowchemy.com)en-us© 2026 Daniele AntonioliThu, 16 Apr 2026 00:00:00 +0000 https://francozappa.github.io/media/icon_hufd6449924b8771808a89b636be1cd7b0_295644_512x512_fill_lanczos_center_3.png Daniele Antonioli https://francozappa.github.io/ Python basics https://francozappa.github.io/courses/example/python/ Fri, 01 Jan 2021 00:00:00 +0000 https://francozappa.github.io/courses/example/python/ <p>Build a foundation in Python.</p> <p> <i class="fas fa-clock pr-1 fa-fw"></i> 1-2 hours per week, for 8 weeks</p> <h2 id="learn">Learn</h2> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/rfscVS0vtbw" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <h2 id="quiz">Quiz</h2> <details class="spoiler " id="spoiler-2"> <summary>What is the difference between lists and tuples?</summary> <p><p>Lists</p> <ul> <li>Lists are mutable - they can be changed</li> <li>Slower than tuples</li> <li>Syntax: <code>a_list = [1, 2.0, 'Hello world']</code></li> </ul> <p>Tuples</p> <ul> <li>Tuples are immutable - they can&rsquo;t be changed</li> <li>Tuples are faster than lists</li> <li>Syntax: <code>a_tuple = (1, 2.0, 'Hello world')</code></li> </ul> </p> </details> <details class="spoiler " id="spoiler-3"> <summary>Is Python case-sensitive?</summary> <p>Yes</p> </details> Visualization https://francozappa.github.io/courses/example/visualization/ Fri, 01 Jan 2021 00:00:00 +0000 https://francozappa.github.io/courses/example/visualization/ <p>Learn how to visualize data with Plotly.</p> <p> <i class="fas fa-clock pr-1 fa-fw"></i> 1-2 hours per week, for 8 weeks</p> <h2 id="learn">Learn</h2> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/hSPmj7mK6ng" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <h2 id="quiz">Quiz</h2> <details class="spoiler " id="spoiler-2"> <summary>When is a heatmap useful?</summary> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit.</p> </details> <details class="spoiler " id="spoiler-3"> <summary>Write Plotly code to render a bar chart</summary> <p><pre><code class="language-python">import plotly.express as px data_canada = px.data.gapminder().query(&quot;country == 'Canada'&quot;) fig = px.bar(data_canada, x='year', y='pop') fig.show() </code></pre> </p> </details> Statistics https://francozappa.github.io/courses/example/stats/ Fri, 01 Jan 2021 00:00:00 +0000 https://francozappa.github.io/courses/example/stats/ <p>Introduction to statistics for data science.</p> <p> <i class="fas fa-clock pr-1 fa-fw"></i> 1-2 hours per week, for 8 weeks</p> <h2 id="learn">Learn</h2> <p>The general form of the <strong>normal</strong> probability density function is:</p> <p>$$ f(x) = \frac{1}{\sigma \sqrt{2\pi} } e^{-\frac{1}{2}\left(\frac{x-\mu}{\sigma}\right)^2} $$</p> <div class="alert alert-note"> <div> The parameter $\mu$ is the mean or expectation of the distribution. $\sigma$ is its standard deviation. The variance of the distribution is $\sigma^{2}$. </div> </div> <h2 id="quiz">Quiz</h2> <details class="spoiler " id="spoiler-2"> <summary>What is the parameter $\mu$?</summary> <p>The parameter $\mu$ is the mean or expectation of the distribution.</p> </details> BlueBrothers: Three New Protocols to Secure Bluetooth https://francozappa.github.io/publication/2026/bbro/ Thu, 16 Apr 2026 00:00:00 +0000 https://francozappa.github.io/publication/2026/bbro/ HardaBLE: Hardening BLE Against Software Compromise https://francozappa.github.io/publication/2026/hardable/ Thu, 16 Apr 2026 00:00:00 +0000 https://francozappa.github.io/publication/2026/hardable/ MaDoS: Matter DoS Attacks via Secure Channel Status Reports https://francozappa.github.io/publication/2026/mados/ Tue, 31 Mar 2026 00:00:00 +0000 https://francozappa.github.io/publication/2026/mados/ BLERP Peripheral Impersonation Attack Demo https://francozappa.github.io/post/2026/blerp-pidemo/ Mon, 23 Mar 2026 00:00:00 +0000 https://francozappa.github.io/post/2026/blerp-pidemo/ <p>Here is Tommaso Sacchetti demonstrating the BLERP peripheral impersonation attack against a vulnerable Android 13 build (2024). In this setup, an attacker in proximity impersonates a trusted mouse, triggers an unauthenticated re-pairing, and takes over the input channel. Recent Android versions have addressed this issue.</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/RJR83EH3pww" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> E-Trojans Black Hat USA 25 Video https://francozappa.github.io/post/2026/etro-bhusa/ Wed, 18 Mar 2026 00:00:00 +0000 https://francozappa.github.io/post/2026/etro-bhusa/ <p>Last summer, Marco Casagrande and I talked about <em>E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Xiaomi Electric Scooters</em> at <a href="https://blackhat.com/us-25/" target="_blank" rel="noopener">Black Hat USA 2025</a>. Our presentation is online:</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/k-UsaSfndQQ" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> DCS-CI: Design for Cyber Secure Critical Infra https://francozappa.github.io/post/2026/dcsci-cfp/ Mon, 16 Mar 2026 00:00:00 +0000 https://francozappa.github.io/post/2026/dcsci-cfp/ <p>The call for submission for the first edition of the DCS-CI conference is <a href="https://dcs-ci.github.io/call-for-submissions" target="_blank" rel="noopener">online</a>.</p> <p>The Design of Cyber-Secure Critical Infrastructure (DCS-CI) 26 <a href="https://dcs-ci.github.io" target="_blank" rel="noopener">conference</a> invites researchers, practitioners, and thought leaders to submit original work that advances our collective understanding of how to design, deploy, and maintain secure critical infrastructure systems. We welcome submissions from diverse disciplinary perspectives, including computer science, control systems engineering, security studies, public policy, and operations management. Interdisciplinary contributions that bridge theoretical innovation with practical application are particularly encouraged.</p> <p>Submit you research papers <a href="https://easychair.org/account/signin?l=5801184989022072166.1773657775.ecc862e0" target="_blank" rel="noopener">here</a>.</p> WiSec'26 Call for Posters and Demos https://francozappa.github.io/post/2026/wisec-pd/ Mon, 16 Mar 2026 00:00:00 +0000 https://francozappa.github.io/post/2026/wisec-pd/ <p>I am excited to chair the <a href="https://wisec26.events.cispa.de/call-for-posters-and-demos/" target="_blank" rel="noopener">WiSec Demo and Poster session</a>.</p> <p>Please submit your great posters and demos via this <a href="https://wisec26-poster.hotcrp.com/" target="_blank" rel="noopener">HotCRP instance</a>!</p> <p>All poster titles must be prefixed with <strong>POSTER:</strong> and all demo titles with <strong>DEMO:</strong>.</p> <p>Deadlines:</p> <ul> <li>Submission: <strong>April 7, 2026 (AOE)</strong></li> <li>Notification: <strong>April 21, 2026</strong></li> <li>Camera-ready: <strong>May 5, 2026</strong></li> </ul> <p>Please also share the word!</p> BLERP: BLE Re-Pairing Attacks and Defenses https://francozappa.github.io/post/2026/blerp-ndss/ Sat, 14 Feb 2026 00:00:00 +0000 https://francozappa.github.io/post/2026/blerp-ndss/ <p>In mid 2024, <a href="https://s3.eurecom.fr/~sacchetti/" target="_blank" rel="noopener">Tom</a> and I looked at BLE re-pairing, an underlooked attack surface. We uncovered four critical re-pairing attacks and design-level vulnerabilities that allow device impersonation and MitM of arbitrary devices in BLE range. The attacks work even in the most secure BLE modes, like authenticated pairing and Secure Connections Only, and require 0-click or 1-click interactions.</p> <p>As part of our responsible disclosure we also proposed effective countermeasures that can be adopted by implementers and by the Bluetooth SIG. AFAIK, the Bluetooth SIG is not planning to fix the BLERP attacks and vulnerabilities, although they should.</p> <p>After almost 1.5 years, we publicly release the BLERP paper and codebase:</p> <ul> <li><a href="https://www.ndss-symposium.org/wp-content/uploads/2026-f121-paper.pdf" target="_blank" rel="noopener">BLERP NDSS'26 paper</a></li> <li><a href="https://github.com/sacca97/blerp" target="_blank" rel="noopener">BLERP toolkit repo</a></li> </ul> CTRAPS on the DEF CON 33 Hackers' Almanack https://francozappa.github.io/post/2026/defcon-almanack/ Sat, 14 Feb 2026 00:00:00 +0000 https://francozappa.github.io/post/2026/defcon-almanack/ <p>The DEF CON 33 Hackers&rsquo; Almanack just <a href="https://harris.uchicago.edu/sites/default/files/the_def_con_33_hackers_almanack.pdf" target="_blank" rel="noopener">dropped</a>. We would like to thank Paul Chang and their team for featuring <a href="https://francozappa.github.io/publication/2025/ctraps/" target="_blank" rel="noopener">CTRAPS</a> in the Right to Repair section. Read and share the Almanack!.</p> <p>Links: CTRAPS <a href="https://francozappa.github.io/publication/2025/ctraps/paper.pdf" target="_blank" rel="noopener">paper</a> and <a href="https://www.youtube.com/watch?v=WZChYxX5i_I" target="_blank" rel="noopener">DEF CON talk</a>.</p> BLERP: BLE Re-Pairing Attacks and Defenses https://francozappa.github.io/publication/2026/blerp/ Mon, 05 Jan 2026 00:00:00 +0000 https://francozappa.github.io/publication/2026/blerp/ PrivacyShield: Relaying BLE Beacons to Counter Unsolicited Tracking https://francozappa.github.io/publication/2026/pshield/ Mon, 05 Jan 2026 00:00:00 +0000 https://francozappa.github.io/publication/2026/pshield/ AttackDefense Framework (ADF): Enhancing IoT Devices and Lifecycles Threat Modeling https://francozappa.github.io/publication/2025/adf/ Wed, 15 Oct 2025 00:00:00 +0000 https://francozappa.github.io/publication/2025/adf/ CTRAPS interview on Off By One Security https://francozappa.github.io/post/2025/ctraps-offbyone/ Mon, 22 Sep 2025 00:00:00 +0000 https://francozappa.github.io/post/2025/ctraps-offbyone/ <p>Marco and I talked about CTRAPS with Stephen Sims from <a href="https://www.youtube.com/@OffByOneSecurity" target="_blank" rel="noopener">Off By One Security</a> about <a href="https://francozappa.github.io/publication/2025/ctraps/" target="_blank" rel="noopener">CTRAPS: CTAP Impersonation and API Confusion on FIDO2</a>.</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/07B0etOq7OM" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <p>Thank you Stephen and Randall for inviting us and keep up with the awesome content in your YouTube channel!</p> CTRAPS at Euro S&P'25 and DEF CON 33 https://francozappa.github.io/post/2025/ctraps-eurosp25/ Fri, 04 Jul 2025 00:00:00 +0000 https://francozappa.github.io/post/2025/ctraps-eurosp25/ <p>This week we presented at IEEE Euro S&amp;P'25 <a href="https://francozappa.github.io/publication/2025/ctraps/" target="_blank" rel="noopener">CTRAPS: CTAP Impersonation and API Confusion on FIDO2</a>, a paper about the security and privacy of FIDO2, a widespread standard used for single-factor and multi-factor authentication. We focus on the <em>Client to Authenticator Protocol (CTAP)</em>, an application layer protocol spoken by a FIDO2 authenticator (e.g., a YubiKey) and a client (e.g., a smartphone or a laptop). We uncover seven CTAP design issues in the FIDO2 standard, including the lack of Client to Authenticator authentication, and eleven related new attacks we call <em>CTRAPS</em>.</p> <p>The CTRAPS attacks are effective on any CTAP compliant FIDO2 client and authenticator since they exploit design issues, i.e., millions of FIDO2 devices and users. Their effects, include deletion of discoverable and non-discoverable credentials, DoS of an authenticator, and user tracking with FIDO2 credentials. The attacks affect not only a FIDO2 authenticator but also a relying party, e.g., by deleting the master key a user loses all the related non-discoverable credentials stored on the relying parties.</p> <p>The eleven CTRAPS attacks are grouped into two classes:</p> <ol> <li>four <em>Client Impersonation (CI)</em> attacks: where the attacker impersonates a client to an authenticator over CTAP to achieve several goals, like 0-click deletion of all credentials stored on the authenticator via the reset CTAP API call.</li> <li>seven <em>API Confusion (AC)</em> attacks: where the attacker MitM a CTAP channel between a client and an authenticator and confound the authenticator by calling a different API than the one intended to be called by the client, e.g., the client thinks it has called and authorized the make credential API while the attacker calls the reset API and deletes all credentials.</li> </ol> <p>We also release a <a href="https://github.com/Skiti/CTrAPs" target="_blank" rel="noopener">toolkit</a> implementing the attacks. It can be used for CTAP security testing as it includes a virtual CTAP testbed to test an authenticator without having to compromise real credentials and several malicious Clients to test various attack scenarios.</p> <p>We successfully evaluate the CTRAPS attacks on six popular FIDO2 authenticators, including (FIPS compliant) YubiKeys, Feitian, and Solo and ten popular relying parties, like apple.com, github.com, adobe.com, and facebook.com.</p> <p>We also release five CTRAPS attacks <a href="https://www.youtube.com/@skitisec/shorts" target="_blank" rel="noopener">demos</a>.</p> <p>Moreover, we discovered an implementation-specific vulnerability affecting Yubikeys allowing to enumerate relying parties without authorization. Yubico promptly acknowledged the issue, see <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35311" target="_blank" rel="noopener">CVE-2024-35311</a>, and <a href="https://www.yubico.com/support/security-advisories/ysa-2024-02/" target="_blank" rel="noopener">YSA-2024-02</a>. They released a new firmware fixing the vulnerability which is shipped with the following Yubikeys Series: 5, Security Key, Bio, FIPS,and CSPN.</p> <p>We will also present CTRAPS at <a href="https://defcon.org/html/defcon-33/dc-33-speakers.html#content_60350" target="_blank" rel="noopener">DEF CON 33</a>.</p> <p>More CTRAPS resources:</p> <ul> <li><a href="https://francozappa.github.io/publication/2025/ctraps/paper.pdf" target="_blank" rel="noopener">paper</a></li> <li><a href="https://francozappa.github.io/publication/2025/ctraps/poster.pdf" target="_blank" rel="noopener">poster</a></li> <li><a href="https://francozappa.github.io/publication/2025/ctraps/slides.pdf" target="_blank" rel="noopener">slides</a></li> </ul> CTRAPS: CTAP Client Impersonation and API Confusion on FIDO2 https://francozappa.github.io/talk/ctraps-ctap-client-impersonation-and-api-confusion-on-fido2/ Fri, 20 Jun 2025 00:00:00 +0000 https://francozappa.github.io/talk/ctraps-ctap-client-impersonation-and-api-confusion-on-fido2/ <p>Talk on <a href="https://francozappa.github.io/publication/2025/ctraps/" target="_blank" rel="noopener">CTRAPS attacks on FIDO2</a> as part of ETHZ ZISC seminars.</p> NDSS'26 Artifact Evaluation Comitee Self-Nomination https://francozappa.github.io/post/2025/ae-ndss26/ Fri, 13 Jun 2025 00:00:00 +0000 https://francozappa.github.io/post/2025/ae-ndss26/ <p>Mathy Vanhoef and I are co-chairing NDSS'26 <a href="https://www.ndss-symposium.org/ndss2026/submissions/call-for-artifacts/" target="_blank" rel="noopener">Artifact Evaluation (AE)</a>.</p> <p>We are looking for motivated PhD and Postdocs to self-nominate themselves for the NDSS'26 <a href="https://secartifacts.github.io/ndss2026/organizers" target="_blank" rel="noopener">Artifact Evaluation Committee (AEC)</a>. Joining it would offer them practical experience and may ease developing artifact submissions for their papers.</p> <p>The self nomination form is open until <em>June 25th</em> and available <a href="https://docs.google.com/forms/d/e/1FAIpQLSdQGc5NsZnYqEW7MQw4ciXOc0UIIP4cxSo82WQxJpej42qlKA/viewform" target="_blank" rel="noopener">here</a>.</p> <p>NDSS'26 AEC call is <a href="https://secartifacts.github.io/ndss2026/aec-call" target="_blank" rel="noopener">here</a>.</p> EmuOCPP: Effective and Scalable OCPP Security and Privacy Testing https://francozappa.github.io/publication/2025/emuocpp/ Tue, 13 May 2025 00:00:00 +0000 https://francozappa.github.io/publication/2025/emuocpp/ SimProcess: High Fidelity Simulation of Noisy ICS Physical Processes https://francozappa.github.io/publication/2025/simprocess/ Tue, 13 May 2025 00:00:00 +0000 https://francozappa.github.io/publication/2025/simprocess/ Bluetooth Security Testing with BlueToolkit: a Large-Scale Automotive Case Study https://francozappa.github.io/publication/2025/btoolkit/ Fri, 11 Apr 2025 00:00:00 +0000 https://francozappa.github.io/publication/2025/btoolkit/ KNOB Attack and Crypto 101 by Alfred Menezes https://francozappa.github.io/post/2025/crypto101-knob/ Tue, 01 Apr 2025 00:00:00 +0000 https://francozappa.github.io/post/2025/crypto101-knob/ <p>Alfred Menezes has published a fantastic online course on real-world cryptography called <a href="https://cryptography101.ca/crypto101-deployments/" target="_blank" rel="noopener">Crypto 101: Real-World Deployments</a>.</p> <p>It is an honor to be featured in the Bluetooth Security Lecture (Lecture 4) which talks about the KNOB attack.</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/0Y5aciplnuk" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> CheckOCPP: Automatic OCPP Packet Dissection and Compliance Check https://francozappa.github.io/publication/2025/checkocpp/ Thu, 27 Mar 2025 00:00:00 +0000 https://francozappa.github.io/publication/2025/checkocpp/ CTRAPS: CTAP Impersonation and API Confusion on FIDO2 https://francozappa.github.io/publication/2025/ctraps/ Thu, 27 Mar 2025 00:00:00 +0000 https://francozappa.github.io/publication/2025/ctraps/ FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Multi-level Entropy-based Thresholds https://francozappa.github.io/talk/fp-tracer-fine-grained-browser-fingerprinting-detection-via-taint-tracking-and-multi-level-entropy-based-thresholds/ Tue, 18 Mar 2025 00:00:00 +0000 https://francozappa.github.io/talk/fp-tracer-fine-grained-browser-fingerprinting-detection-via-taint-tracking-and-multi-level-entropy-based-thresholds/ <p>Talk on FP-tracer and browser fingerprinting at <a href="https://team.inria.fr/privatics/privacy-alpine-seminar-2025-aka-privaski/" target="_blank" rel="noopener">Privasky'25</a>.</p> On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats https://francozappa.github.io/talk/on-the-insecurity-of-vehicles-against-protocol-level-bluetooth-threats/ Fri, 14 Mar 2025 00:00:00 +0000 https://francozappa.github.io/talk/on-the-insecurity-of-vehicles-against-protocol-level-bluetooth-threats/ <p>Talk on Automotive Bluetooth Security at <a href="https://conferences.cirm-math.fr/amusec-2025.html" target="_blank" rel="noopener">AMUSEC'25</a>.</p> <p>Cars are some of the most security-critical consumer devices. On the one hand, owners expect rich infotainment features, including audio, hands-free calls, contact management, or navigation through their connected mobile phone. On the other hand, the infotainment unit exposes exploitable wireless attack surfaces. This talk focuses on protocol-level Bluetooth threats on vehicles, a critical but unexplored wireless attack surface. These threats are crucial because they are portable across vehicles, and they can achieve impactful goals, such as accessing sensitive data or even taking remote control of the vehicle. Their evaluation is novel as prior work focused on other wireless attack surfaces, notably Bluetooth implementation bugs. Among relevant protocol-level threats, we pick the KNOB and BIAS attacks because they provide the most effective strategy to impersonate arbitrary Bluetooth devices and are not yet evaluated against vehicles.</p> CFP: ACSW 2025 https://francozappa.github.io/post/2025/cfp-acsw25/ Mon, 03 Feb 2025 00:00:00 +0000 https://francozappa.github.io/post/2025/cfp-acsw25/ <p>The call for papers for the 4th Workshop on Automotive Cyber Security (ACSW) co-located with IEEE EuroS&amp;P 2025 is closing today, Feb 3rd AoE. Please submit your automotive security work!</p> <p>For more information see the ACSW <a href="https://acsw.unimore.it/index.html" target="_blank" rel="noopener">website</a> and its <a href="https://acsw.unimore.it/past.html" target="_blank" rel="noopener">past editions</a>.</p> AttackDefense Framework (ADF) https://francozappa.github.io/project/adf/ Tue, 17 Dec 2024 00:00:00 +0000 https://francozappa.github.io/project/adf/ <p>The ADF framework is described in a paper published in the ACM TECS journal in 2024 titled <a href="https://dl.acm.org/doi/abs/10.1145/3698396" target="_blank" rel="noopener">AttackDefense Framework (ADF): Enhancing IoT Devices and Lifecycles Threat Modeling</a> and available on <a href="https://github.com/francozappa/adf" target="_blank" rel="noopener">GitHub</a>.</p> The AttackDefense Framework (ADF) https://francozappa.github.io/post/2024/adf-release/ Tue, 17 Dec 2024 00:00:00 +0000 https://francozappa.github.io/post/2024/adf-release/ <p>We release the <em>AttackDefense Framework (ADF)</em>, a threat modeling framework for IoT devices and their life cycles. The ADF employs a flexible and generic threat data structure called the <em>AttackDefense (AD) object</em>. An AD can model attack and defense aspects, like attack vectors, surfaces, models and defense policies and mechanisms, at the same time.</p> <p>With the ADF, we can model, among others, security, privacy, hardware, software, firmware, and protocol threats to a <em>device</em> (e.g., a crypto wallet) and threats to the <em>device&rsquo;s life cycle</em> (e.g., supply chain attacks while implementing a device).</p> <p>The ADF block diagram includes four components used to <em>enhance</em> threat modeling:</p> <p> <figure > <div class="d-flex justify-content-center"> <div class="w-100" ><img alt="ADF block diagram" srcset=" /post/2024/adf-release/adf-bd_hu63b64d12bf1aceb22fc319946564a383_130421_594603a7097a58de1133279b7fd3318a.webp 400w, /post/2024/adf-release/adf-bd_hu63b64d12bf1aceb22fc319946564a383_130421_032fceec1def1f36c7951522f3255487.webp 760w, /post/2024/adf-release/adf-bd_hu63b64d12bf1aceb22fc319946564a383_130421_1200x1200_fit_q75_h2_lanczos_3.webp 1200w" src="https://francozappa.github.io/post/2024/adf-release/adf-bd_hu63b64d12bf1aceb22fc319946564a383_130421_594603a7097a58de1133279b7fd3318a.webp" width="760" height="361" loading="lazy" data-zoomable /></div> </div></figure> </p> <p>For more details about the ADF, look at:</p> <ul> <li><a href="https://dl.acm.org/doi/abs/10.1145/3698396" target="_blank" rel="noopener">ADF paper (ACM TECS'24)</a></li> <li><a href="https://github.com/francozappa/adf" target="_blank" rel="noopener">ADF GitHub repo</a></li> <li><a href="https://github.com/francozappa/adf/blob/main/blogpost.md" target="_blank" rel="noopener">ADF usage example for BLE</a></li> <li><a href="https://horizon-orshin.eu/" target="_blank" rel="noopener">ADF contributes to ORSHIN</a></li> </ul> <p>Let&rsquo;s Threat Model All the Things!</p> E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Battery-powered Embedded Systems https://francozappa.github.io/publication/2024/etrojans/ Mon, 09 Dec 2024 00:00:00 +0000 https://francozappa.github.io/publication/2024/etrojans/ A Quest to Secure Standard and Proprietary Wireless Systems https://francozappa.github.io/talk/a-quest-to-secure-standard-and-proprietary-wireless-systems/ Mon, 22 Jul 2024 00:00:00 +0000 https://francozappa.github.io/talk/a-quest-to-secure-standard-and-proprietary-wireless-systems/ <p>In this talk we will explore recent research on real world wireless security protocols. We will cover standard protocols such as Bluetooth pairing and session establishment and proprietary ones such as IoT application layer protocols used to secure traffic between companion mobile applications and electric scooters and fitness trackers.</p> Information and Entertainment for Automotive Researchers https://francozappa.github.io/talk/information-and-entertainment-for-automotive-researchers/ Mon, 08 Jul 2024 00:00:00 +0000 https://francozappa.github.io/talk/information-and-entertainment-for-automotive-researchers/ <p>Keynote given at ACSW'24 (EuroS&amp;P Workshop) covering Automotive Bluetooth Security and E-Spoofer.</p> FP-tracer PETS'24 Paper and Artifact https://francozappa.github.io/post/2024/fptracer-pets/ Mon, 01 Jul 2024 00:00:00 +0000 https://francozappa.github.io/post/2024/fptracer-pets/ <p>Modern websites use <em>attribute-based browser fingerprinting</em> to track us(ers) using our browser&rsquo;s JavaScript API. They can track us without cookies, and regardless of what we click on websites&rsquo; consent banners.</p> <p>With <a href="https://www.petsymposium.org/popets/2024/popets-2024-0092.php" target="_blank" rel="noopener">FP-tracer</a>, we present a new and effective method to detect attribute-based browser fingerprinting using a taint tracking aware browser, and joint entropy thresholds. With FP-tracer, we see not only the trackers but also how much they track us. FP-tracer is available as an <a href="https://github.com/soumboussaha/FP-tracer" target="_blank" rel="noopener">open-source artifact</a>.</p> <p>Through FP-tracer, we assessed 80K domains. Our study found that 8% of the domains collected enough attributes to track a browser uniquely. Sometimes, a browser can be tracked with only two attributes, i.e., userAgent and storageEstimate. Read the paper for more insights!</p> <p>Soumaya Boussaha will present FP-tracer at <a href="https://www.petsymposium.org/2024/" target="_blank" rel="noopener">PETS'24</a>.</p> <p>FP-tracer contributes to <a href="https://encopia.org/" target="_blank" rel="noopener">ENCOPIA</a>, where we are ENabling COnnected PrIvacy Assurance.</p> A Quest to Secure Proprietary and Standard Wireless Protocols https://francozappa.github.io/talk/a-quest-to-secure-proprietary-and-standard-wireless-protocols/ Fri, 17 May 2024 00:00:00 +0000 https://francozappa.github.io/talk/a-quest-to-secure-proprietary-and-standard-wireless-protocols/ <p>Keynote given at <a href="https://ressi2024.sciencesconf.org/" target="_blank" rel="noopener">RESSI'24</a> covering, among others, <a href="https://francozappa.github.io/publication/2023/bluffs/" target="_blank" rel="noopener">BLUFFS</a>, <a href="https://francozappa.github.io/publication/2023/espoofer/" target="_blank" rel="noopener">E-Spoofer</a>, and <a href="https://francozappa.github.io/publication/2022/breakmi/" target="_blank" rel="noopener">BreakMi</a>.</p> A Quest to Secure Standard and Proprietary Wireless Protocols https://francozappa.github.io/talk/a-quest-to-secure-standard-and-proprietary-wireless-protocols/ Tue, 14 May 2024 00:00:00 +0000 https://francozappa.github.io/talk/a-quest-to-secure-standard-and-proprietary-wireless-protocols/ <p>Talk covering, among others, <a href="https://francozappa.github.io/publication/2023/bluffs/" target="_blank" rel="noopener">BLUFFS</a>, <a href="https://francozappa.github.io/publication/2023/espoofer/" target="_blank" rel="noopener">E-Spoofer</a>, and <a href="https://francozappa.github.io/publication/2022/breakmi/" target="_blank" rel="noopener">BreakMi</a>.</p> BLUFFS: Breaking and fixing the Bluetooth standard. One More Time. https://francozappa.github.io/talk/bluffs-breaking-and-fixing-the-bluetooth-standard.-one-more-time./ Thu, 04 Apr 2024 00:00:00 +0000 https://francozappa.github.io/talk/bluffs-breaking-and-fixing-the-bluetooth-standard.-one-more-time./ <h2 id="youtube-37c3">YouTube (37c3)</h2> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/2HstGZPZpZY" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem https://francozappa.github.io/talk/e-spoofer-attacking-and-defending-xiaomi-electric-scooter-ecosystem/ Thu, 04 Apr 2024 00:00:00 +0000 https://francozappa.github.io/talk/e-spoofer-attacking-and-defending-xiaomi-electric-scooter-ecosystem/ <h2 id="youtube-wisec23">YouTube (WiSec'23)</h2> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/yQvsoKBc304" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> E-Spoofer and BLUFFS Talks at THCON'24 https://francozappa.github.io/post/2024/thcon-talks/ Wed, 13 Mar 2024 00:00:00 +0000 https://francozappa.github.io/post/2024/thcon-talks/ <p>Salut, Marco Casagrande will talk about <a href="https://francozappa.github.io/publication/2023/espoofer/" target="_blank" rel="noopener">E-Spoofer</a> and I will talk about <a href="https://francozappa.github.io/publication/2023/bluffs/" target="_blank" rel="noopener">BLUFFS</a> at the 2024 Toulouse Hacking Convention (THCON)! Both research works are funded by the <a href="https://horizon-orshin.eu/" target="_blank" rel="noopener">ORSHIN</a> Horizon Europe research grant.</p> <ul> <li>E-Spoofer talk: 4th April 2024, <em>10:15-10:45</em></li> <li>BLUFFS talk: 4th April 2024, <em>11:15-10:45</em></li> <li>Where: Marthe Condat auditorium, Paul Sabatier University, Toulouse</li> <li><a href="https://thcon.party/program/" target="_blank" rel="noopener">THCON program</a></li> </ul> <p>See you in Toulouse 🇫🇷 at <a href="https://thcon.party/" target="_blank" rel="noopener">THCON'24</a></p> FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Multi-level Entropy-based Thresholds https://francozappa.github.io/publication/2024/fptracer/ Mon, 11 Mar 2024 00:00:00 +0000 https://francozappa.github.io/publication/2024/fptracer/ Bluetooth Security at NECS Winter School https://francozappa.github.io/talk/bluetooth-security-at-necs-winter-school/ Mon, 08 Jan 2024 00:00:00 +0000 https://francozappa.github.io/talk/bluetooth-security-at-necs-winter-school/ <p>This lecture overviews recent and impactful research on Bluetooth security and privacy. We will cover protocol-level vulnerabilities in the Bluetooth specification affecting billions of devices, such as KNOB, BIAS, BLUR, and BLUFFS.</p> <p>Moreover, we will explore works about insecure and proprietary protocols built on Bluetooth, including BreakMi exploiting Xiaomi and Fitbit fitness tracker protocols and E-Spoofer compromising Xiaomi&rsquo;s electric scooter protocols.</p> <p>While presenting our research works, we will also teach basic and advanced concepts about the security and privacy of IoT protocols.</p> BLUFFS: Breaking and fixing the Bluetooth standard. One More Time. https://francozappa.github.io/talk/bluffs-breaking-and-fixing-the-bluetooth-standard.-one-more-time./ Sat, 30 Dec 2023 00:00:00 +0000 https://francozappa.github.io/talk/bluffs-breaking-and-fixing-the-bluetooth-standard.-one-more-time./ <h2 id="abstract">Abstract</h2> <p>Ciao! We present the BLUFFS attacks (CVE-2023-24023), six novel attacks breaking Bluetooth&rsquo;s forward and future secrecy. Our attacks enable device impersonation and machine-in-the-middle across sessions by compromising and re-using one session key. We discuss the four vulnerabilities in the Bluetooth specification enabling the attacks, two of which are new and related to unilateral and repeatable session key derivation. We describe the toolkit we developed and open-sourced to test our attacks via firmware binary patching, our experiments where we exploited 18 heterogeneous Bluetooth devices, and the practical and backward-compliant session key derivation protocol we built to fix the attacks by design. We also cover related work like KNOB, BIAS, and BLUR, and educational Bluetooth security tips and tricks.</p> <p>Bluetooth is a pervasive technology for wireless communication. Billions of devices use it in sensitive applications and to exchange private data. The security of Bluetooth depends on the Bluetooth standard and its two security mechanisms: pairing and session establishment. No prior work, including the standard itself, analyzed the future and forward secrecy guarantees of these mechanisms, e.g., if Bluetooth pairing and session establishment defend past and future sessions when the adversary compromises the current. To address this gap, we present six novel attacks, defined as the BLUFFS attacks, breaking Bluetooth sessions’ forward and future secrecy. Our attacks enable device impersonation and machine-in-the-middle across sessions by only compromising one session key. The attacks exploit two novel vulnerabilities that we uncover in the Bluetooth standard related to unilateral and repeatable session key derivation. As the attacks affect Bluetooth at the architectural level, they are effective regardless of the victim’s hardware and software details (e.g., chip, stack, version, and security mode).</p> <p>We also release BLUFFS, a low-cost toolkit to perform and automatically check the effectiveness of our attacks. The toolkit employs seven original patches to manipulate and monitor Bluetooth session key derivation by dynamically patching a closed-source Bluetooth firmware that we reverse-engineered. We show that our attacks have a critical and large-scale impact on the Bluetooth ecosystem, by evaluating them on seventeen diverse Bluetooth chips (eighteen devices) from popular hardware and software vendors and supporting the most popular Bluetooth versions. Motivated by our empirical findings, we develop and successfully test an enhanced key derivation function for Bluetooth that stops by-design our six attacks and their four root causes. We show how to effectively integrate our fix into the Bluetooth standard and discuss alternative implementation-level mitigations. We responsibly disclosed our contributions to the Bluetooth SIG.</p> <h2 id="youtube">YouTube</h2> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/2HstGZPZpZY" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <h2 id="media-ccc">Media CCC</h2> <iframe width="512" height="288" src="https://media.ccc.de/v/37c3-12342-bluffs_bluetooth_forward_and_future_secrecy_attacks_and_defenses/oembed" frameborder="0" title="BLUFFS" allowfullscreen></iframe> Recorded BLUFFS Talk at 37c3 https://francozappa.github.io/post/2023/bluffs-37c3-video/ Sat, 30 Dec 2023 00:00:00 +0000 https://francozappa.github.io/post/2023/bluffs-37c3-video/ <h2 id="youtube">YouTube</h2> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/2HstGZPZpZY" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <h2 id="media-ccc">Media CCC</h2> <iframe width="512" height="288" src="https://media.ccc.de/v/37c3-12342-bluffs_bluetooth_forward_and_future_secrecy_attacks_and_defenses/oembed" frameborder="0" title="BLUFFS" allowfullscreen></iframe> <h2 id="more">More</h2> <p><a href="https://media.ccc.de/v/37c3-12342-bluffs_bluetooth_forward_and_future_secrecy_attacks_and_defenses" target="_blank" rel="noopener">here</a>.</p> BLUFFS Talk at 37c3 https://francozappa.github.io/post/2023/bluffs-37c3/ Fri, 22 Dec 2023 00:00:00 +0000 https://francozappa.github.io/post/2023/bluffs-37c3/ <p>See you in Hamburg 🇩🇪 at <a href="https://events.ccc.de/congress/2023/infos/index.html" target="_blank" rel="noopener">37c3</a></p> <p> <figure > <div class="d-flex justify-content-center"> <div class="w-100" ><img src="https://francozappa.github.io/images/37c3.png" alt="Schedule" loading="lazy" data-zoomable /></div> </div></figure> </p> BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses https://francozappa.github.io/post/2023/bluffs-ccs23/ Mon, 27 Nov 2023 00:00:00 +0000 https://francozappa.github.io/post/2023/bluffs-ccs23/ <p>Breaking and fixing the Bluetooth standard. One More Time.</p> <ul> <li><a href="https://dl.acm.org/doi/pdf/10.1145/3576915.3623066" target="_blank" rel="noopener">Paper</a></li> <li><a href="https://francozappa.github.io/publication/2023/bluffs/slides.pdf" target="_blank" rel="noopener">Slides</a></li> <li><a href="https://github.com/francozappa/bluffs" target="_blank" rel="noopener">Toolkit</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24023" target="_blank" rel="noopener">CVE-2023-24023</a></li> <li><a href="https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/bluffs-vulnerability/" target="_blank" rel="noopener">BT SIG note</a></li> </ul> <p> <figure > <div class="d-flex justify-content-center"> <div class="w-100" ><img src="https://francozappa.github.io/images/omt.gif" alt="One More Time" loading="lazy" data-zoomable /></div> </div></figure> </p> BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses https://francozappa.github.io/publication/2023/bluffs/ Mon, 06 Nov 2023 00:00:00 +0000 https://francozappa.github.io/publication/2023/bluffs/ E-Spoofer paper presentation at WiSec'23 https://francozappa.github.io/post/2023/espoofer-wisec-video/ Mon, 07 Aug 2023 00:00:00 +0000 https://francozappa.github.io/post/2023/espoofer-wisec-video/ <p>Marco Casagrande&rsquo;s presentation of our <a href="https://francozappa.github.io/publication/2023/espoofer/paper.pdf" target="_blank" rel="noopener">E-Spoofer paper</a> about Xiaomi e-scooters' security and privacy recorded at ACM WiSec'23</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/yQvsoKBc304" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> Bluetooth Security and the KNOB Attack on BLE https://francozappa.github.io/talk/bluetooth-security-and-the-knob-attack-on-ble/ Tue, 04 Jul 2023 00:00:00 +0000 https://francozappa.github.io/talk/bluetooth-security-and-the-knob-attack-on-ble/ <p>In this lecture we cover an Introduction about Bluetooth security, its main transports (BC, BLE), procedures (discovery, connect) and logical entities (Host, Controller, HCI). Then we look at Bluetooth security architecture and the specific BC/BLE algorithms and protocols. We conclude by talking about state of the art attacks that we developed against this protocols including KNOB, BIAS, and BLUR.</p> <p>In this lab we cover an Introduction about Bluetooth security, its main transports (BC, BLE), procedures (discovery, connect) and logical entities (Host, Controller, HCI). Then we look at Bluetooth security architecture and the specific BC/BLE algorithms and protocols. We conclude by talking about state of the art attacks that we developed against this protocols including KNOB, BIAS, and BLUR</p> <p>Summer school program <a href="https://www.s3.eurecom.fr/~aurel/summer-school-2023/program/" target="_blank" rel="noopener">here</a>.</p> E-Spoofer master's thesis ranked 2nd for Italian CLUSIT Award https://francozappa.github.io/post/2023/espoofer-clusit/ Mon, 26 Jun 2023 00:00:00 +0000 https://francozappa.github.io/post/2023/espoofer-clusit/ <p>Riccardo Cestaro&rsquo;s master thesis, done at EURECOM in my group as a visiting student from UniPD, won the <em>second prize</em> in the CLUSIT (Italian Association for Information Security) thesis contest. CLUSIT yearly awards some of the best Information security theses in Italy. The list of winners is available <a href="https://tesi.clusit.it/vincitori.php" target="_blank" rel="noopener">here</a>.</p> <p>Riccardo&rsquo;s thesis contributed to the <a href="https://francozappa.github.io/publication/2023/espoofer/paper.pdf" target="_blank" rel="noopener">E-Spoofer paper</a> that we recently presented at WiSec'23.</p> <p>Bravo Riccardo, and kudos to the co-supervisors.</p> Hiring a postdoc interested in IIoT network security https://francozappa.github.io/post/2023/hiring-postdoc-pepr5g/ Tue, 20 Jun 2023 00:00:00 +0000 https://francozappa.github.io/post/2023/hiring-postdoc-pepr5g/ <p>I am looking for a postdoc interested in <strong>Industrial Internet-of-Thing (IIoT) network security and privacy</strong>. The postdoc will be funded by the PEPR5g ANR project, work under my supervision at and join <a href="https://www.s3.eurecom.fr/" target="_blank" rel="noopener">EURECOM&rsquo;s S3 group</a>. I can start hiring from the beginning of this summer.</p> <p>My research revolves around <em>applied</em> system security and privacy (e.g., security assessment, vulnerability analysis and exploitation of deployed systems). To get a feeling, please see my <a href="https://francozappa.github.io/" target="_blank" rel="noopener">website</a> and <a href="https://francozappa.github.io/publication/" target="_blank" rel="noopener">publications</a>.</p> <p>If you are interested please send me (<a href="mailto:[email protected]">[email protected]</a>) an <em>HTML-less</em> email containing:</p> <ul> <li>[PEPR5G] in the email subject</li> <li>The names and email addresses of two referrer (e.g., PhD advisors) in the email body</li> <li>A CV with a list to publications in PDF</li> <li>A short research statement in PDF (max 2 pages) explaining why you are interested in IIoT network security and privacy, what you did so far and are what you planning to do in this research area</li> </ul> <p>Elseif you know someone that might be interested, please spread the word.</p> <p>Grazie!</p> BreakMi: Reversing, Exploiting and Fixing Xiaomi (and Fitbit) Fitness Tracking Ecosystems https://francozappa.github.io/talk/breakmi-reversing-exploiting-and-fixing-xiaomi-and-fitbit-fitness-tracking-ecosystems/ Sat, 03 Jun 2023 00:00:00 +0000 https://francozappa.github.io/talk/breakmi-reversing-exploiting-and-fixing-xiaomi-and-fitbit-fitness-tracking-ecosystems/ <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/MeLeg1sVmss" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <p>Xiaomi is the leading company in the fitness tracking industry. Successful attacks on its fitness tracking ecosystem would result in severe consequences, including the loss of sensitive health and personal data. Despite these relevant risks, we know very little about the security mechanisms adopted by Xiaomi. In this work, we uncover them and show that they are insecure. In particular, Xiaomi protects its fitness tracking ecosystem with custom application-layer protocols spoken over insecure Bluetooth Low-Energy (BLE) connections (ignoring standard BLE security mechanisms already supported by their devices) and TLS connections. We identify severe vulnerabilities affecting such proprietary protocols, including unilateral and replayable authentication.</p> <p>Those issues are critical as they affect all Xiaomi trackers released since 2016 and up-to-date Xiaomi companion apps for Android and iOS. We show in practice how to exploit the identified vulnerabilities by presenting six impactful attacks. Four attacks enable to wirelessly impersonate any Xiaomi fitness tracker and companion app, man-in-the-middle (MitM) them, and eavesdrop on their communication. The other two attacks leverage a malicious Android application to remotely eavesdrop on data from a tracker and impersonate a Xiaomi fitness app.</p> <p>Overall, the attacks have a high impact as they can be used to exfiltrate and inject sensitive data from any Xiaomi tracker and compatible app. We propose five practical and low-overhead countermeasures to mitigate the presented vulnerabilities. Moreover, we present BreakMi, a modular toolkit that we developed to automate our reverse-engineering process and attacks. breakmi understands Xiaomi application-layer proprietary protocols, reimplements Xiaomi security mechanisms, and automatically performs our attacks. We demonstrate that our toolkit can be generalized by extending it to be compatible with the Fitbit ecosystem. We will open-source BreakMi.</p> <p>More <a href="https://hardwear.io/usa-2023/speakers/marco-and-daniele.php" target="_blank" rel="noopener">here</a>.</p> On the (In)securities of Popular Standard and Proprietary Wireless Protocols https://francozappa.github.io/talk/on-the-insecurities-of-popular-standard-and-proprietary-wireless-protocols/ Thu, 01 Jun 2023 00:00:00 +0000 https://francozappa.github.io/talk/on-the-insecurities-of-popular-standard-and-proprietary-wireless-protocols/ <p>This talk covers our recent research on the (in)securities of proprietary and standard wireless security protocols used daily by millions of devices and users. In particular, I will cover the BLUR attacks on Bluetooth, a novel class of threats capable of exploiting Bluetooth Classic from Bluetooth Low Energy and vice versa. Then, I will report on our security evaluation of protocol-level Bluetooth threats on vehicles (i.e., cars), a currently unexplored by impactful attack surface. Next, I will shift to proprietary wireless protocols and describe our security assessments of Xiaomi and Fitbit fitness trackers&rsquo; proprietary protocols. Finally, I will conclude by covering our latest work on custom Xiaomi e-scooters&rsquo; wireless protocols.</p> E-Spoofer paper at WiSec'23 https://francozappa.github.io/post/2023/espoofer-wisec/ Wed, 31 May 2023 00:00:00 +0000 https://francozappa.github.io/post/2023/espoofer-wisec/ <p>Marco Casagrande presented at <a href="https://wisec2023.surrey.ac.uk/program/" target="_blank" rel="noopener">WiSec'23</a> our paper titled: <strong>E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem</strong>.</p> <p>In a nutshell, we reverse-engineered the proprietary wireless protocols used by Xiaomi e-scooters and companions applications (i.e., Mi Home) over BLE, found critical vulnerabilities, exploited them to get arbitrary read and write capabilities on an e-scooter both in proximity and remotely (via a malicious Android app), developed concrete countermeasures, released a toolkit to reproduce our findings and tamper with the protocols, and responsibly disclosed our results to Xiaomi.</p> <p>Useful links: <a href="https://francozappa.github.io/publication/2023/espoofer/paper.pdf" target="_blank" rel="noopener">Paper</a>, <a href="https://francozappa.github.io/publication/2023/espoofer/slides.pdf" target="_blank" rel="noopener">Slides</a>, <a href="https://github.com/Skiti/E-Spoofer" target="_blank" rel="noopener">Code</a>, <a href="https://www.youtube.com/@ESpoofer-yv9li" target="_blank" rel="noopener">Demos</a>, <a href="https://twitter.com/acm_wisec/status/1663184140248797184" target="_blank" rel="noopener">WiSec tweet</a>.</p> <p>This work continues our exploration of obscure proprietary protocols used in popular and high risk setups, including our research on <a href="https://francozappa.github.io/publication/2022/breakmi/" target="_blank" rel="noopener">Xiaomi and Fitbit fitness trackers</a> presented last year at CHES.</p> <p>Shout-out to the paper&rsquo;s co-authors: Marco Casagrande, Riccardo Cestaro, <a href="https://www.math.unipd.it/~elosiouk/" target="_blank" rel="noopener">Eleonora Losiouk</a>, and <a href="https://www.math.unipd.it/~conti/" target="_blank" rel="noopener">Mauro Conti</a>. And the funding partners: <a href="https://horizon-orshin.eu/" target="_blank" rel="noopener">ORSHIN (EU)</a> and the Air Force Office of Scientific Research.</p> E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem https://francozappa.github.io/publication/2023/espoofer/ Tue, 30 May 2023 00:00:00 +0000 https://francozappa.github.io/publication/2023/espoofer/ EURECOM Digital Security opening for an Asst. Prof. https://francozappa.github.io/post/2023/eurecom-hiring-prof/ Wed, 03 May 2023 00:00:00 +0000 https://francozappa.github.io/post/2023/eurecom-hiring-prof/ <p>The Digital Security Department of EURECOM invites applications for a <em>tenured</em> position at the <em>Assistant Professor</em> level in the area of <em>Digital Security</em>. Starting date: ASAP. Full info <a href="https://www.eurecom.fr/en/job/digital-security" target="_blank" rel="noopener">here</a>.</p> <p>Please spread the word 😄 !</p> BreakMi talk at Hardwear.io USA 2023 🐞 https://francozappa.github.io/post/2023/breakmi-hwio/ Wed, 12 Apr 2023 00:00:00 +0000 https://francozappa.github.io/post/2023/breakmi-hwio/ <p>Our talk titled <strong>BreakMi: Reversing, Exploiting and Fixing Xiaomi (and Fitbit) Fitness Tracking Ecosystems</strong> has been accepted at Hardwear.io USA'23. The talk extends and complements our paper titled <a href="https://tches.iacr.org/index.php/TCHES/article/download/9704/9234" target="_blank" rel="noopener"><em>BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem</em></a>. The talk covers new relevant and educational aspect about our study that we did not have time to talk about during the <a href="https://www.youtube.com/watch?t=3412&amp;v=zD5EdvGs98U&amp;feature=youtu.be" target="_blank" rel="noopener">paper presentation at CHES'22</a>. For instance we will cover in detail:</p> <ul> <li>Our reverse engineering methodology that the community can adopt to tackle similar problems.</li> <li>BreakMi’s implementation details and attack demos from the <a href="https://github.com/Skiti/BreakMi" target="_blank" rel="noopener">BreakMi repository</a></li> <li>The Fitbit fitness tracker ecosystem (owned by Google) and how BreakMi can be used to evaluate and exploit Fitbit fitness trackers</li> <li>Responsible disclosure insights with Google and Xiaomi</li> </ul> <p>Shout-out to our collaborators <a href="https://www.math.unipd.it/~elosiouk/" target="_blank" rel="noopener">Eleonora Losiouk</a>, <a href="https://www.math.unipd.it/~conti/" target="_blank" rel="noopener">Mauro Conti</a>, and <a href="https://nebelwelt.net/" target="_blank" rel="noopener">Mathias Payer</a>!</p> <p>Other relevant links: <a href="https://hardwear.io/usa-2023/speakers/marco-and-daniele.php" target="_blank" rel="noopener">Hardwear.io</a>, <a href="https://twitter.com/hardwear_io/status/1645486885219827714" target="_blank" rel="noopener">Twitter</a>, <a href="https://www.linkedin.com/feed/update/urn:li:activity:7051287921869385728/" target="_blank" rel="noopener">LinkedIn</a>.</p> BreakMI Poster Presentation at EURECOM SC https://francozappa.github.io/post/2023/breakmi-poster/ Mon, 06 Feb 2023 00:00:00 +0000 https://francozappa.github.io/post/2023/breakmi-poster/ <p>Marco Casagrande presented his excellent <a href="https://francozappa.github.io/publication/2022/breakmi/poster.pdf" target="_blank" rel="noopener">poster</a> about <a href="https://tches.iacr.org/index.php/TCHES/article/download/9704/9234" target="_blank" rel="noopener">BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem</a> during EURECOM&rsquo;s Scientific Council (SC).</p> <p> <figure > <div class="d-flex justify-content-center"> <div class="w-100" ><img alt="Image alt" srcset=" /post/2023/breakmi-poster/images/poster_hu71f71713b931b7aeee0ba9752f154afd_934076_d9f19a8ccdd4fc3f9d33b4dcdc0af9cc.webp 400w, /post/2023/breakmi-poster/images/poster_hu71f71713b931b7aeee0ba9752f154afd_934076_28579351d3ce547cbebdd64164fdbc1a.webp 760w, /post/2023/breakmi-poster/images/poster_hu71f71713b931b7aeee0ba9752f154afd_934076_1200x1200_fit_q75_h2_lanczos.webp 1200w" src="https://francozappa.github.io/post/2023/breakmi-poster/images/poster_hu71f71713b931b7aeee0ba9752f154afd_934076_d9f19a8ccdd4fc3f9d33b4dcdc0af9cc.webp" width="534" height="760" loading="lazy" data-zoomable /></div> </div></figure> </p> <p>For more info see at the paper&rsquo;s presentation starting around min 56:</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/zD5EdvGs98U" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> ENCOPIA https://francozappa.github.io/project/encopia/ Thu, 26 Jan 2023 00:00:00 +0000 https://francozappa.github.io/project/encopia/ <h2 id="contacts">Contacts</h2> <p><a href="https://encopia.org/" target="_blank" rel="noopener">Website</a></p> <h2 id="core-concept-and-innovation">Core Concept and Innovation</h2> <p>Today’s IoT devices collect huge amounts of data and share them with cloud services. In turn, Big Data analytics are used to analyze this data to provide new services such as predictive maintenance, more efficient routing and targeted advertisement. As the world becomes pervasively sentient with sensors placed in all kinds of daily devices, opting out is no longer possible. Devices like autonomous cars, smart screens and smart glasses will record personal information of all passersby, resulting in a conflict between individual privacy rights and the interest of making the benefits of big data analytics available to society as a whole.</p> <p>To ensure both goals are achievable, great care in the design and development of the complete IoT system from the device to the cloud service is necessary. This project aims at automating the verification of privacy goals of IoT services, from sensor devices all the way into the cloud services — during development and after deployment.</p> <h2 id="scientific-and-technological-goals">Scientific and Technological Goals</h2> <p>We propose to use binary analysis methods to make privacy goals testable in an automated fashion for the complete life cycle of sensitive information. Tools developed in this project will ensure that sensitive data can be tracked through programs and services by analyzing the software used and tracking data flows within them. Automated privacy analysis tools do not exist today. Yet binary analysis has made great strides in the last years. With a combination of binary-level function detection and information flow tracking, data can be traced through applications along its life cycle, tracking its usage and detecting potential privacy breaches when they occur. By combining state-of-the-art binary analysis with dynamic data flow tracking in the cloud through JIT compiler instrumentation, we achieve an end-to-end privacy tracking of sensitive data.</p> <h2 id="future-outlook">Future Outlook</h2> <p>The wide availability and sharing of vast amounts of data is necessary to drive digital innovation and leverage the powerful tools of big data and machine learning for the future knowledge society. The proposed tools will enable developers, third-party providers and users to ensure that data is used as intended and that protective mechanisms such as pseudonymization, encryption or differential privacy are applied. The researched methods can also be applied in certification schemes, which are currently under development under the European Cybersecurity Act.</p> <h2 id="consortium">Consortium</h2> <ul> <li>Langlauf Security Automation GmbH</li> <li>Siemens AG</li> <li>SAP Labs France</li> <li>EURECOM, Software and System Security Group</li> <li>University of Lübeck, Institute for IT Security</li> </ul> Open-source ReSilient Hardware and software for Internet of thiNgs (ORSHIN) https://francozappa.github.io/project/orshin/ Thu, 26 Jan 2023 00:00:00 +0000 https://francozappa.github.io/project/orshin/ <h2 id="contacts">Contacts</h2> <p><a href="https://horizon-orshin.eu/" target="_blank" rel="noopener">Website</a>, <a href="https://twitter.com/ORSHIN_HE" target="_blank" rel="noopener">Twitter</a>, <a href="https://www.linkedin.com/company/orshin-horizon-europe-project-101070008/" target="_blank" rel="noopener">LinkedIn</a>, <a href="https://vimeo.com/technikon" target="_blank" rel="noopener">Vimeo</a></p> <h2 id="about">About</h2> <p>It is common wisdom that cyber security is only as strong as the weakest link in a chain. Therefore, the main challenge is to identify the critical points of IoT infrastructure. To address this issue, ORSHIN is creating the first generic and integrated methodology, called trusted lifecycle, to develop secure network devices based on open-source components while managing their entire lifecycle. ORSHIN&rsquo;s trustworthy lifecycle consists of different phases (design, implementation, evaluation, installation, maintenance and retirement) that form a chain of trust. This lifecycle defines how the safety objectives are translated into policies for defined phases. Using this holistic view, ORSHIN will address critical links, reduce threats and improve security of open-source devices.</p> <h2 id="vision">Vision</h2> <p>The open-source initiative represents a significant shift in the industry, providing the opportunity to share knowledge between industry and research and enabling rapid time-to-market for solutions, but there is still much room for improvement - particularly with a view to cyber security. Therefore, the ORSHIN project team will step together and develop a new approach that will improve cyber security, manage the entire lifecycle of trustworthy network and create a secure infrastructure for connected devices. To meet this challenge ORSHIN will work on building a trusted open-source hardware and software that will significantly reduce the risks associated with IoT devices - from design to its retirement, as a chain of trust called the trusted lifecycle.</p> <h2 id="consortium">Consortium</h2> <p>The ORSHIN consortium consists of seven partners from six European countries. It consists of a well-balanced mixture between academic and industrial players, from large semiconductor to small SMEs.</p> <ul> <li>Technikon (Austria)</li> <li>KU Leuven (Belgium)</li> <li>EURECOM (France)</li> <li>NXP (Germany)</li> <li>Security Pattern (Italy)</li> <li>Texplained (France)</li> <li>Tropic square (Czech Republic)</li> </ul> <h2 id="funding">Funding</h2> <ul> <li>Horizon Europe: HORIZON-CL3-2021-CS-01-02</li> <li>Reference number: 101070008</li> <li>Project start: 01.10.2022</li> <li>Project duration: 36 months</li> <li>Costs: € 3.814.500,00</li> <li>Funding: 100,00% EU-funded</li> </ul> ACM CPSS'23 CFP is Open! https://francozappa.github.io/post/2022/cfp-cpss23/ Thu, 01 Dec 2022 00:00:00 +0000 https://francozappa.github.io/post/2022/cfp-cpss23/ <p>The call for papers for 2023 ACM <em>Cyber-Physical System Security Workshop (CPSS)</em> is open. The workshop is held in conjunction with ACM AsiaCCS'23 in Melbourne, Australia. For more information see the CPSS <a href="https://www.nics.uma.es/CPSS2023/" target="_blank" rel="noopener">website</a> and its <a href="https://www.nics.uma.es/CPSS2023/#CFP" target="_blank" rel="noopener">call for papers</a>.</p> <h2 id="deadlines">Deadlines</h2> <p>All deadlines are at 11.59PM / 23:59 American Samoa Time</p> <ul> <li>Submission: January 30, 2023</li> <li>Notification: March 15, 2023</li> <li>Camera-ready: March 30, 2023</li> </ul> <h2 id="scope">Scope</h2> <p>Cyber-Physical Systems (CPS) of interest to this workshop consist of large-scale interconnected systems of heterogeneous components interacting with their physical environments. There exist a multitude of CPS devices and applications deployed to serve critical functions in our lives thus making security an important non-functional attribute of such systems. This workshop will provide a platform for professionals from academia, government, and industry to discuss novel ways to address the ever-present security challenges facing CPS. We seek submissions describing theoretical and practical solutions to security challenges in CPS. Submissions pertinent to the security of embedded systems, IoT, SCADA, smart grid, and other critical infrastructure are welcome.</p> <h2 id="topic-of-interest">Topic of interest</h2> <ul> <li>Attack detection for CPS</li> <li>Authentication and access control for CPS</li> <li>Autonomous vehicle security</li> <li>Availability and auditing for CPS</li> <li>Blockchain for CPS security</li> <li>Data security and privacy for CPS</li> <li>Deception Technologies for CPS</li> <li>Digital twins/Cyber range for CPS security</li> <li>Embedded systems security</li> <li>Formal methods in CPS</li> <li>Industrial control system security</li> <li>IoT security</li> <li>Legacy CPS system protection</li> <li>Lightweight crypto and security</li> <li>Maritime cyber security</li> <li>Recovery from cyber attacks</li> <li>Security and risk assessment for CPS</li> <li>Security architectures for CPS</li> <li>Security by design for CPS</li> <li>Smart grid security</li> <li>Threat modeling for CPS</li> <li>Transportation system security</li> <li>Vulnerability analysis for CPS</li> <li>Wireless sensor network security</li> </ul> BreakMi paper presented at IACR CHES'22 https://francozappa.github.io/post/2022/breakmi-ches/ Mon, 26 Sep 2022 00:00:00 +0000 https://francozappa.github.io/post/2022/breakmi-ches/ <p>We presented our paper titled <em>BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem</em> at <a href="https://ches.iacr.org/2022/" target="_blank" rel="noopener">CHES 2022</a> in the hardware security track.</p> <p>Here is the excellent <a href="https://www.youtube.com/watch?v=zD5EdvGs98U&amp;t=3412s" target="_blank" rel="noopener">presentation</a> given by Marco Casagrande. You can also check out the presentation <a href="https://francozappa.github.io/publication/2022/breakmi/slides.pdf" target="_blank" rel="noopener">slides</a> and the <a href="https://github.com/Skiti/BreakMi" target="_blank" rel="noopener">BreakMi repository</a> to reproduce our findings (with the help of video tutorials nicely prepared by Marco).</p> <p>For more information, such our reverse engineering methodology, analysis and exploitation of <em>Fitbit</em> trackers, and <em>countermeasures</em>, have a look at the <a href="https://tches.iacr.org/index.php/TCHES/article/download/9704/9234" target="_blank" rel="noopener">paper</a>.</p> BLURtooth video, new CVE, and GH repo https://francozappa.github.io/post/2022/blur-updates/ Wed, 17 Aug 2022 00:00:00 +0000 https://francozappa.github.io/post/2022/blur-updates/ <p>I&rsquo;m glad to share three updates about the <a href="https://nebelwelt.net/files/22AsiaCCS.pdf" target="_blank" rel="noopener">BLURtooth paper</a>.</p> <p>We successfully tested the BLUR attacks on a Google Pixel 6 (Bluetooth 5.2) and submitted our findings to Google. They classified the report with high severity, assigned <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20361" target="_blank" rel="noopener">CVE-2022-20361</a>, and shipped fixes as part of <a href="https://source.android.com/docs/security/bulletin/2022-08-01" target="_blank" rel="noopener">August&rsquo;s Android Security bulletin</a>. More details about the fixes can be found <a href="https://android.googlesource.com/platform/system/bt/&#43;/6ad3f69b2199d953647e1053e8de2a8c26f1b8d6" target="_blank" rel="noopener">here</a>. This is yet another finding demonstrating that the attacks are effective on all Bluetooth versions supporting CTKD unlike stated <a href="https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/blurtooth/" target="_blank" rel="noopener">in this note from the Bluetooth SIG</a> .</p> <p>After following responsible disclosure we also publish the instructions to reproduce the BLUR attacks in a <a href="https://github.com/francozappa/blur" target="_blank" rel="noopener">GitHub repository</a>.</p> <p>Below you can find the paper presentation streamed at AsiaCCS'22:</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/FzFQD3XTLlA" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats https://francozappa.github.io/talk/on-the-insecurity-of-vehicles-against-protocol-level-bluetooth-threats/ Thu, 14 Jul 2022 00:00:00 +0000 https://francozappa.github.io/talk/on-the-insecurity-of-vehicles-against-protocol-level-bluetooth-threats/ <p>In this webinar we talk about, Protocol-Level Bluetooth Threats (PLBT), a novel and relevant class of threats for automotive security. Specifically, we explain what they are, why they are relevant, and how they can be evaluated on modern cars. We also report our PLBT evaluation results on five popular In-Vehicle Infotainment (IVI) units used by KIA, Toyota, Suzuki, and Skoda on cars manufactured between 2014 and 2021. For example, we show that is trivial to impersonate a trusted smartphone to commercial IVIs using an attack chain that we developed in recent years (KNOB+BIAS attacks). As a result of a successful impersonation, an attacker can exfiltrate sensitive data stored on the IVI and send malicious commands to the IVI without being detected.</p> <p>We note that PLBTs are effective on any Bluetooth-enabled IVI as they exploit protocol flaws in the Bluetooth standard itself. Hence, we expect that the vast majority of the IVIs in the market is vulnerable to the KNOB+BIAS attack chain and other PLBTs. This fact should clearly motivate why it is important to investigate and fix PLBTs in the automotive industry.</p> <p>For more information please refer to our research paper presented this year at the IEEE <em>Workshop On Offensive Technologies (WOOT)</em> titled <strong>On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats</strong> available <a href="https://hexhive.epfl.ch/publications/files/22WOOT.pdf" target="_blank" rel="noopener">here</a>.</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/tqln99BHUzU" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats Video https://francozappa.github.io/post/2022/btcar-video/ Fri, 01 Jul 2022 00:00:00 +0000 https://francozappa.github.io/post/2022/btcar-video/ <p>Below you can find a webinar that I&rsquo;ve recorded for the <a href="https://asrg.io/" target="_blank" rel="noopener">Automotive Security Research Group (ASRG)</a> talking about our recent paper titled <a href="https://hexhive.epfl.ch/publications/files/22WOOT.pdf" target="_blank" rel="noopener">On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats</a>.</p> <p>The webinar will also be linked for <a href="https://www.ieee-security.org/TC/SP2022/WOOT22/index.html" target="_blank" rel="noopener">WOOT'22</a> as the talk I gave at the workshop was not recorded because of some issues.</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/tqln99BHUzU" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> C.A.S.E., il futuro dell'auto: opportunità e rischi https://francozappa.github.io/talk/c.a.s.e.-il-futuro-dellauto-opportunita-e-rischi/ Wed, 29 Jun 2022 00:00:00 +0000 https://francozappa.github.io/talk/c.a.s.e.-il-futuro-dellauto-opportunita-e-rischi/ <p>More information about the speech on <a href="https://www.quattroruote.it/news/aziende/2022/06/29/f_b_day_c_a_s_e_il_futuro_dell_auto_opportunita_e_rischi_al_nostro_evento.html" target="_blank" rel="noopener">quattroruote.it</a> and <a href="https://www.linkedin.com/pulse/case-il-futuro-dellauto-opportunit%25C3%25A0-e-rischi-al-fb-day-alberto-vita/?trackingId=cf50jgiplD79C8j7OOr7Sw%3D%3D" target="_blank" rel="noopener">linkedin pulse</a>.</p> <p>More information about the event <a href="https://fleet-businessday.quattroruote.it/" target="_blank" rel="noopener">here</a>.</p> BreakMI Paper and Repo https://francozappa.github.io/post/2022/breakmi-announce/ Thu, 16 Jun 2022 00:00:00 +0000 https://francozappa.github.io/post/2022/breakmi-announce/ <p>I am glad to share that our paper titled <em>BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem</em> is publicly available <a href="https://tches.iacr.org/index.php/TCHES/article/download/9704/9234" target="_blank" rel="noopener">here</a>. In this work, we reverse-engineer, exploit, and fix the proprietary security protocols used by Xiaomi to secure the Bluetooth Low Energy communication between its trackers and smartphone applications. We also release <a href="https://github.com/Skiti/BreakMi" target="_blank" rel="noopener">BreakMi</a>, a tool to reproduce our findings and perform further analyses on Xiaomi&rsquo;s Fitness tracking ecosystem. We also evaluated BreakMi on the Fitbit ecosystem and found that most of the vulnerabilities and attacks presented for Xiaomi are portable with minor adjustments to the Fitbit ecosystem.</p> <p>I&rsquo;m particularly proud of this paper as its main author is Marco Casagrande, my first PhD student. Congratulations, Marco, for the hard/novel/relevant work and thanks to the co-authors Eleonora Losiouk, Mauro Conti, and Mathias Payer!</p> <p>We will present the paper in September at <a href="https://ches.iacr.org/2022/" target="_blank" rel="noopener">CHES 2022</a>.</p> BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem https://francozappa.github.io/publication/2022/breakmi/ Fri, 01 Apr 2022 00:00:00 +0000 https://francozappa.github.io/publication/2022/breakmi/ On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats https://francozappa.github.io/publication/2022/btcar/ Fri, 25 Mar 2022 00:00:00 +0000 https://francozappa.github.io/publication/2022/btcar/ BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy https://francozappa.github.io/publication/2022/blur/ Sun, 06 Mar 2022 00:00:00 +0000 https://francozappa.github.io/publication/2022/blur/ Bluetooth BLUR Attacks (BLURtooth) https://francozappa.github.io/project/blur/ Sat, 05 Mar 2022 00:00:00 +0000 https://francozappa.github.io/project/blur/ <p>In 2020 we disclosed the <a href="https://hexhive.epfl.ch/BLURtooth/" target="_blank" rel="noopener">BLUR attacks</a>, a family of high impact threats affecting Bluetooth&rsquo;s cross-transport key derivation (CTKD). The BLUR attacks are the first sample of cross-transport attacks for Bluetooth as they allow to exploit Bluetooth Classic and Bluetooth Low Energy jut by targeting one of the two.</p> <p>The BLUR attacks are tracked with <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15802" target="_blank" rel="noopener">CVE-2020-15802</a>.</p> CFP: JSys System Security https://francozappa.github.io/post/2022/cfp-jsys/ Thu, 24 Feb 2022 00:00:00 +0000 https://francozappa.github.io/post/2022/cfp-jsys/ <p>The <a href="https://www.jsys.org/" target="_blank" rel="noopener">Journal of Systems Research (JSys)</a> is a new journal with diamond-access publication model; that is, papers are free to read, submit, review, and publish. Its design borrows heavily from similar journals recently created in the databases, security, and crypto communities.</p> <p>Recently JSys added a <a href="https://www.jsys.org/cfp_security/" target="_blank" rel="noopener">system security track</a> and the first CfP is open until the 22nd of May.</p> <h3 id="call-for-papers-system-security">Call for Papers: System Security</h3> <p>System security covers the intersection between systems research and security research in particular around the topics of software security, web security, mobile security, network security, operating system security, and hardware security. These topics inherently involve systems topics as part of their mechanisms, policies, or attacks. While attacks are in scope, the focus of this track is on constructive security, i.e., mitigating and avoiding attacks along with systematizing knowledge.</p> <p>Topic of interests:</p> <ul> <li>Analysis of network and security protocols</li> <li>Attacks with novel insights, techniques, or results</li> <li>Automated security analysis of source code and binaries</li> <li>Embedded systems security</li> <li>Language-based security</li> <li>Machine learning security</li> <li>Mobile systems security</li> <li>Network security</li> <li>Operating system security</li> <li>Program analysis for security</li> <li>Web security</li> </ul> CFP Workshop on Offensive Technologies (WOOT) 2022 https://francozappa.github.io/post/2022/cfp-woot22/ Sat, 22 Jan 2022 00:00:00 +0000 https://francozappa.github.io/post/2022/cfp-woot22/ <p>The WOOT'22 CFP is open. Please submit and spread the word.</p> <h3 id="links">Links</h3> <p>URL: <a href="https://www.ieee-security.org/TC/SP2022/WOOT22/index.html" target="_blank" rel="noopener">https://www.ieee-security.org/TC/SP2022/WOOT22/index.html</a> Submission: <a href="https://woot22.secpriv.tuwien.ac.at/woot22/paper/new" target="_blank" rel="noopener">https://woot22.secpriv.tuwien.ac.at/woot22/paper/new</a></p> <h3 id="overview">Overview</h3> <p>The Workshop on Offensive Technologies (WOOT) aims to present a broad picture of offense and its contributions, bringing together researchers and practitioners across all areas of computer security. Offensive security has changed from a hobby to an industry. No longer an exercise for isolated enthusiasts, offensive security is today a large-scale operation managed by organized, capitalized actors. Meanwhile, the landscape has shifted: software used by millions is built by startups less than a year old, delivered on mobile phones and surveilled by national signals intelligence agencies. In the field&rsquo;s infancy, offensive security research was conducted separately by industry, independent hackers, or in academia. Collaboration between these groups was difficult. Since 2007, the Workshop on Offensive Technologies (WOOT) has been bringing those communities together.</p> <h3 id="symposium-topics">Symposium Topics</h3> <p>Computer security exposes the differences between the actual mechanisms of everyday trusted technologies and their models used by developers, architects, academic researchers, owners, operators, and end users. While being inherently focused on practice, security also poses questions such as &ldquo;what kind of computations are and aren&rsquo;t trusted systems capable of?&rdquo; which harken back to fundamentals of computability. State-of-the-art offense explores these questions pragmatically, gathering material for generalizations that lead to better models and more trustworthy systems.</p> <p>WOOT provides a forum for high-quality, peer-reviewed work discussing tools and techniques for attacks. Submissions should reflect the state of the art in offensive computer security technology, exposing poorly understood mechanisms, presenting novel attacks, highlighting the limitations of published attacks and defenses, or surveying the state of offensive operations at scale. WOOT &lsquo;22 accepts papers in both an academic security context and more applied work that informs the field about the state of security practice in offensive techniques. The goal for these submissions is to produce published works that will guide future work in the field. Submissions will be peer reviewed and shepherded as appropriate. Submission topics include, but are not limited to, attacks on and offensive research into:</p> <ul> <li>Hardware, including software-based exploitation of hardware vulnerabilities</li> <li>Virtualization and the cloud</li> <li>Network and distributed systems</li> <li>Operating systems</li> <li>Browser and general client-side security (runtimes, JITs, sandboxing)</li> <li>Application security</li> <li>Analysis of mitigations and automating how they can be bypassed</li> <li>Automating software testing such as fuzzing for novel targets</li> <li>Internet of Things</li> <li>Machine Learning</li> <li>Cyber-physical systems</li> <li>Privacy</li> <li>Cryptographic systems (practical attacks on deployed systems)</li> <li>Malware design, implementation and analysis</li> <li>Offensive applications of formal methods (solvers, symbolic execution)</li> </ul> <h3 id="workshop-format">Workshop Format</h3> <p>The presenters will be authors of accepted papers. There will also be a keynote speaker and a selection of invited speakers. WOOT &lsquo;22 will feature a Best Paper Award and a Best Student Paper Award.</p> <p>Note that WOOT'22 and other IEEE S&amp;P workshops are planned to be held in person, see the IEEE S&amp;P website for details and updates.</p> <h3 id="regular-submission">Regular Submission</h3> <p>WOOT &lsquo;22 welcomes submissions without restrictions of origin. Submissions from academia, independent researchers, students, hackers, and industry are welcome. Are you planning to give a cool talk at Black Hat in August? Got something interesting planned for other non-academic venues later this year? This is exactly the type of work we&rsquo;d like to see at WOOT &lsquo;22. Please submit &ndash; it will also give you a chance to have your work reviewed and to receive suggestions and comments from some of the best researchers in the world. More formal academic offensive security papers are also very welcome.</p> <h3 id="systematization-of-knowledge">Systematization of Knowledge</h3> <p>Continuing the tradition of past years, WOOT &lsquo;22 will be accepting &ldquo;Systematization of Knowledge&rdquo; (SoK) papers. The goal of an SoK paper is to encourage work that evaluates, systematizes, and contextualizes existing knowledge. These papers will prove highly valuable to our community but would not be accepted as refereed papers because they lack novel research contributions. Suitable papers include survey papers that provide useful perspectives on major research areas, papers that support or challenge long-held beliefs with compelling evidence, or papers that provide an extensive and realistic evaluation of competing approaches to solving specific problems. Be sure to select &ldquo;Systematization of Knowledge paper&rdquo; in the submissions system to distinguish it from other paper submissions.</p> <h3 id="submission-requirements">Submission Requirements</h3> <p>Paper submission deadline: Thursday, January 27, 2022, 11:59 AoE (Anywhere on Earth) Notification date: Thursday, February 27, 2022 Camera-ready paper deadline: Tuesday, March 8, 2022 Workshop date: Thursday, May 26, 2022</p> <p>Please submit your paper at <a href="https://woot22.secpriv.tuwien.ac.at/woot22/paper/new" target="_blank" rel="noopener">https://woot22.secpriv.tuwien.ac.at/woot22/paper/new</a></p> <h3 id="what-to-submit">What to Submit</h3> <p>Submissions must be in PDF format. Papers should be succinct but thorough in presenting the work. The contribution needs to be well motivated, clearly exposed, and compared to the state of the art. Typical research papers are at least 4 pages, and maximum 10 pages long (not counting bibliography and appendix). Yet, papers whose lengths are incommensurate with their contributions will be rejected.</p> <p>The submission should be formatted in 2-columns, using 10-point Times Roman type on 12-point leading, in a text block of 6.5” x 9”. Please number the pages. Authors must use the IEEE templates, for LaTeX papers this is IEEETran.cls version 1.8b.</p> <p>Submissions are double blind: submissions should be anonymized and avoid obvious self-references (authors are allowed to release technical reports and present their work elsewhere such as at DefCon or BlackHat). Submit papers using the submission form.</p> <p>Authors of accepted papers will have to provide a paper for the proceedings following the above guidelines. A shepherd may be assigned to ensure the quality of the proceedings version of the paper.</p> <p>If your paper should not be published prior to the event, please notify the chairs. Submissions accompanied by non-disclosure agreement forms will not be considered. Accepted submissions will be treated as confidential prior to publication on the WOOT &lsquo;22 website; rejected submissions will be permanently treated as confidential.</p> <h3 id="policies-and-contact-information">Policies and Contact Information</h3> <p>Simultaneous submission of the same work to multiple competing academic venues, submission of previously published work without substantial novel contributions, or plagiarism constitutes dishonesty or fraud may lead to instant or later rejecion. Note: Work presented by the authors at industry conferences, such as Black Hat, is not considered to have been &ldquo;previously published&rdquo; for the purposes of WOOT &lsquo;22. We strongly encourage the submission of such work to WOOT &lsquo;22, particularly work that is well suited to a more formal and complete treatment in a published, peer-reviewed setting. In your submission, please do note any previous presentations of the work.</p> <h3 id="vulnerability-disclosure">Vulnerability Disclosure</h3> <p>If the submission describes, or otherwise takes advantage of, newly identified vulnerabilities (e.g., software vulnerabilities in a given program or design weaknesses in a hardware system) the authors should disclose these vulnerabilities to the vendors/maintainers of affected software or hardware systems prior to the CFP deadline. When disclosure is necessary, authors should include a statement within their submission and/or final paper about steps taken to fulfill the goal of disclosure.</p> <h3 id="ethical-considerations">Ethical Considerations</h3> <p>Submissions that describe experiments on human subjects, that analyze data derived from human subjects (even anonymized data), or that otherwise may put humans at risk should:</p> <ul> <li>Disclose whether the research received an approval or waiver from each of the authors’ institutional ethics review boards (e.g., an IRB).</li> <li>Discuss steps taken to ensure that participants and others who might have been affected by an experiment were treated ethically and with respect.</li> <li>If a paper raises significant ethical or legal concerns, including in its handling of personally identifiable information (PII) or other kinds of sensitive data, it might be rejected based on these concerns.</li> </ul> CFP: ACM CPSS 2022 https://francozappa.github.io/post/2022/cfp-cpss22/ Mon, 08 Nov 2021 00:00:00 +0000 https://francozappa.github.io/post/2022/cfp-cpss22/ <p>The call for papers for 8th ACM Cyber-Physical System Security Workshop (CPSS 2022) held in conjunction with ACM AsiaCCS'22 is closing in 1 month (December 3, 2021).</p> <p>Make sure to submit your awesome CPS security papers :D</p> <p>For more information see the CPSS <a href="https://illinois.adsc.com.sg/CPSS2022/" target="_blank" rel="noopener">website</a> and its <a href="https://illinois.adsc.com.sg/CPSS2022/CPSS%20CFP2022.pdf" target="_blank" rel="noopener">call for papers</a>.</p> Exploiting and Fixing the Bluetooth Standard https://francozappa.github.io/talk/exploiting-and-fixing-the-bluetooth-standard/ Thu, 21 Oct 2021 00:00:00 +0000 https://francozappa.github.io/talk/exploiting-and-fixing-the-bluetooth-standard/ <p>Bluetooth is a ubiquitous technology for low-power wireless communications. It is employed by billions of devices, including smartphones, laptops, wearables, and cars. As a technology, Bluetooth is specified in an open and quite complex standard. The standard defines two Bluetooth flavors; <em>Bluetooth Classic (BC)</em> for high throughput services and <em>Bluetooth Low Energy (BLE)</em> for low power ones. In addition, it specifies pairing (i.e., bootstrapping) and session establishment security mechanisms to protect the confidentiality, integrity, and authenticity of Bluetooth communication. One vulnerability in these mechanisms can be exploited on <em>all</em> Bluetooth devices as they must be compliant with the Bluetooth standard.</p> <p>This talk revisits our recent work about uncovering, exploiting, and fixing three critical vulnerabilities in the Bluetooth standard affecting BT and BLE. The vulns are KNOB (CVE-2019-9506), BIAS (CVE-2020-10135), and BLUR (CVE-2020-15802). KNOB affects both BT and BLE and enables to weaken and brute force Bluetooth&rsquo;s cryptographic keys. BIAS affects BT and allows to bypass Bluetooth&rsquo;s authentication. BLUR exploits the boundary between BT and BLE and results in cross-transport exploitation of BT and BLE. Despite our reports to the Bluetooth consortium (SIG), the presented vulnerabilities are either not patched or partially fixed.</p> Breaking and Fixing the Bluetooth Standard https://francozappa.github.io/talk/breaking-and-fixing-the-bluetooth-standard/ Thu, 01 Jul 2021 00:00:00 +0000 https://francozappa.github.io/talk/breaking-and-fixing-the-bluetooth-standard/ <p>Bluetooth is a ubiquitous technology for low-power wireless communications employed by billions of devices, including mobiles, wearables, and cars. Bluetooth is specified in a complex yet open standard that defines two transports: <em>Bluetooth Classic (BC)</em> for high throughput services and <em>Bluetooth Low Energy (BLE)</em> for very low power services. Being a pervasive technology, Bluetooth exposes a broad attack surface. Moreover, successful attacks on Bluetooth can achieve high-impact goals, such as identity thefts, privacy violations, and malicious device control. The security of Bluetooth communication heavily depends on the <em>Bluetooth standard</em>, which defines &ldquo;standard-compliant&rdquo; security mechanisms to protect the confidentiality, integrity, and availability of Bluetooth communications. Those mechanisms include <em>pairing</em> and <em>secure session establishment</em> protocols used to establish keys and protect the communication.</p> <p>This talk revisits our recent work about uncovering, exploring, and fixing three critical vulnerabilities in the Bluetooth standard. The vulnerabilities affect both BC and BLE, and we named them. KNOB (CVE-2019-9506), BIAS (CVE-2020-10135) and BLUR (CVE-2020-15802). As these vulnerabilities are <em>standard-compliant</em> (i.e., exploit specification flaws in the Bluetooth standard), they are effective on any Bluetooth device regardless of its hardware and software details. For example, in our experiments, we successfully exploited KNOB, BIAS, and BLUR on a broad set of devices, including Apple, Broadcom, Cypress, CSR, Google, Intel, Microsoft, and Qualcomm. Additionally, we successfully targeted all the major Bluetooth versions currently in the market (e.g., 4.0, 4.1, 4.2, 5.0, 5.1, and 5.2).</p> <p>Despite our reports to the Bluetooth consortium, the presented vulnerabilities are either not patched or partially fixed. Indeed, more work has to be done to secure the Bluetooth standard from its foundations.</p> EURECOM Digital Security opening for an Asst. Prof. https://francozappa.github.io/post/2021/eurecom-hiring-prof/ Fri, 25 Jun 2021 00:00:00 +0000 https://francozappa.github.io/post/2021/eurecom-hiring-prof/ <p>The Digital Security Department of EURECOM invites applications for a <em>tenured</em> position at the <em>Assistant Professor</em> level in the area of <em>Digital Security</em>. Full info <a href="https://www.eurecom.fr/en/job/digital-security" target="_blank" rel="noopener">here</a>.</p> <p>Please spread the word 😄 !</p> Why is Hard to Secure Mobile Proximity Services https://francozappa.github.io/talk/why-is-hard-to-secure-mobile-proximity-services/ Thu, 24 Jun 2021 00:00:00 +0000 https://francozappa.github.io/talk/why-is-hard-to-secure-mobile-proximity-services/ <p>Mobile devices such as phones, tablets, and wearables enable proximity services on a large scale. These services use wireless technologies (such as Wi-Fi and Bluetooth) to connect users within a specific range and exchange information. Proximity information ranges from general-purpose files and contacts to privacy-preserving COVID-19 proximity identifiers. Since these services affect millions of mobile users worldwide, their security against cyber threats is paramount. It is not pleasant if an attacker in proximity (or even remotely) can eavesdrop on private communication or tamper with personal data. However, adopting (even essential) security mechanisms for proximity services is easy in theory but pretty hard in practice. For example, it is challenging to provide confidentiality and authenticity while at the same time provide energy-efficient and accurate proximity tracing. On top of that, a usable proximity service has to scale well with the number of users and provide the same quality of services across different software and hardware ecosystems (e.g., Android and iOS) and usage condition (e.g., indoor and outdoor). In this talk, we look at two commercial proximity services. First, Google&rsquo;s Nearby Connections (NC) is an API to connect Android devices using a combination of Wi-Fi and Bluetooth and without requiring an Internet connection. Second, Google/Apple&rsquo;s Exposure Notification (EN) framework. EN powers most COVID-19 contact-tracing mobile applications in Europe, including the ones used in Italy, Germany, and Switzerland. Throughout the talk, the audience will learn, among others, real-world proximity services' architectures, pitfalls, vulnerabilities, attacks, countermeasures, and related research trends.</p> SecMT'21 Talk About Security of Proximity Services https://francozappa.github.io/post/2021/secmt21-talk/ Tue, 22 Jun 2021 00:00:00 +0000 https://francozappa.github.io/post/2021/secmt21-talk/ <p>I&rsquo;m glad to give a talk at the <a href="https://spritz.math.unipd.it/events/2021/ACNS_Workshop/index.html" target="_blank" rel="noopener">SecMT'21</a> workshop on mobile system security co-located with the <a href="https://sulab-sever.u-aizu.ac.jp/ACNS2021/" target="_blank" rel="noopener">ACNS'21</a> conference. Students can register to SecMT for <em>free</em> by filling this <a href="https://docs.google.com/forms/d/e/1FAIpQLSfwNOLR8AJmbJo5F954hTXvhsTfKXE3FvTVFr-OLmLcbWmTyg/viewform" target="_blank" rel="noopener">Google form</a>.</p> <p><strong>Talk title</strong>:</p> <p>Why is Hard to Secure Mobile Proximity Services</p> <p><strong>Talk abstract</strong>:</p> <p>Mobile devices such as phones, tablets, and wearables enable proximity services on a large scale. These services use wireless technologies (such as Wi-Fi and Bluetooth) to connect users within a specific range and exchange information. Proximity information ranges from general-purpose files and contacts to privacy-preserving COVID-19 proximity identifiers. Since these services affect millions of mobile users worldwide, their security against cyber threats is paramount. It is not pleasant if an attacker in proximity (or even remotely) can eavesdrop on private communication or tamper with personal data. However, adopting (even essential) security mechanisms for proximity services is easy in theory but pretty hard in practice. For example, it is challenging to provide confidentiality and authenticity while at the same time provide energy-efficient and accurate proximity tracing. On top of that, a usable proximity service has to scale well with the number of users and provide the same quality of services across different software and hardware ecosystems (e.g., Android and iOS) and usage condition (e.g., indoor and outdoor). In this talk, we look at two commercial proximity services. First, Google&rsquo;s Nearby Connections (NC) is an API to connect Android devices using a combination of Wi-Fi and Bluetooth and without requiring an Internet connection. Second, Google/Apple&rsquo;s Exposure Notification (EN) framework. EN powers most COVID-19 contact-tracing mobile applications in Europe, including the ones used in Italy, Germany, and Switzerland. Throughout the talk, the audience will learn, among others, real-world proximity services' architectures, pitfalls, vulnerabilities, attacks, countermeasures, and related research trends.</p> Starting at EURECOM https://francozappa.github.io/post/2021/eurecom-start/ Fri, 04 Jun 2021 00:00:00 +0000 https://francozappa.github.io/post/2021/eurecom-start/ <p>It is my pleasure to announce that since 1st of June I&rsquo;ve started my new adventure with <a href="https://www.eurecom.fr/" target="_blank" rel="noopener">EURECOM</a> and the <a href="http://s3.eurecom.fr/" target="_blank" rel="noopener">System Security Group (S3)</a>.</p> <p>I&rsquo;m thrilled and honored to have joined a team of talented and diverse people, and I&rsquo;m looking forward give my contribution!</p> <p>The location is also pretty amusing, and I feel closer to Italy than usual 😄</p> CFP for Hardwear.io USA 2021 is Open (Tips and Tricks) https://francozappa.github.io/post/2021/hw21-suggestions/ Fri, 19 Mar 2021 00:00:00 +0000 https://francozappa.github.io/post/2021/hw21-suggestions/ <p>Last year I had the pleasure to give a talk about <a href="https://hardwear.io/virtual-con-2020/speakers/from-the-bluetooth-standard-to-standard-compliant-0-days.php" target="_blank" rel="noopener">critical and standard-compliant Bluetooth flaws</a> at the virtual edition of <a href="https://hardwear.io/virtual-con-2020/" target="_blank" rel="noopener">Hardwear.io 2020</a>.</p> <p>The organizers recently opened the <a href="https://hardwear.io/usa-2021/cfp.php" target="_blank" rel="noopener">call-for-papers (CFP) for Hardwear.io USA 2021</a> and asked me to share my take on why you would want to submit your work to Hardwear.io and few tips and tricks to improve the quality of your presentation. What follow are some random and personal thoughts that might be useful for somebody and might overlap with what is already suggested in the CFP 😄</p> <h2 id="why-one-should-submit">Why one should submit?</h2> <ol> <li> <p>Hardwear.io is (still) a &ldquo;nichy&rdquo; venue where you present to a relatively small but relevant audience of experts.</p> </li> <li> <p>Hardwear.io&rsquo;s audience is a mix of folks from academia and industry. This is very helpful as it allows to get feedback from different angles and hear more voices.</p> </li> <li> <p>Hardwear.io enables to push the boundaries of interesting (yet less-mainstream) security topics such as embedded, industrial, hardware, and wireless systems.</p> </li> <li> <p>Hardwear.io is not only about talks and conferences, there is whole community surrounding it that is active every day and from which you can get advice.</p> </li> <li> <p>If you are a fan of merchandise (i.e., shirts, pins, magnets, &hellip;) then Hardwear.io is not going to disappoint you 🎉</p> </li> </ol> <h2 id="tips-and-tricks-to-strengthen-your-submission">Tips and Tricks to strengthen your submission</h2> <ul> <li>Clearly scope you work to one (or more) submission topic(s)</li> <li>Keep a mix of technical and non-technical content</li> <li>The non-technical content is useful to let non-expert reviewers appreciate your work (i.e., what you did)</li> <li>The technical part is needed to convince the expert reviewers that you actually did what you are presenting (i.e., how you did it)</li> <li>Make sure that other than explaining &ldquo;what&rdquo; you did and &ldquo;how&rdquo; you did it, you are also showing &ldquo;why&rdquo; your submission is important, needed, novel, and interesting.</li> <li>Look at the <a href="https://hardwear.io/usa-2021/cfp.php" target="_blank" rel="noopener">TIPS FOR SUBMITTING on the CFP</a></li> </ul> LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks https://francozappa.github.io/publication/2021/lightblue/ Thu, 18 Feb 2021 00:00:00 +0000 https://francozappa.github.io/publication/2021/lightblue/ Joining EURECOM S3 as an Assistant Professor in June 2021 https://francozappa.github.io/post/2020/eurecom-asstprof/ Wed, 02 Dec 2020 00:00:00 +0000 https://francozappa.github.io/post/2020/eurecom-asstprof/ <p>Starting from June 2021, I will join <a href="http://s3.eurecom.fr/" target="_blank" rel="noopener">EURECOM System Security Group (S3)</a> as an Assistant Professor. I will keep doing research on the security of wireless systems, mobile/embedded systems, and (industrial) internet of things. I will also teach the fabulous <a href="https://mobisec.reyammer.io/" target="_blank" rel="noopener">Mobile Systems and Smartphone Security (MOBISEC)</a> course, created by Yanick Fratantonio, starting from Sept 2021.</p> <p>I thank EURECOM faculty members for considering my candidature and eventually selecting me from a pool of talented applicants. Related to that, I give credit to Marc Dacier, Aurelien Francillon, Yanick Fratantonio, Davide Balzarotti, and Massimiliano Todisco for answering my questions and providing useful feedback and support during the interview process.</p> <p>I also acknowledge Mathias Payer, Kasper Rasmussen, Nils Tippenhauer, and Mauro Conti for supporting my candidature. Their support was instrumental and I will be pleased to keep collaborating with them in the future.</p> <p>I look forward to join EURECOM and the sunny French riviera and in the meantime I&rsquo;m ramping up my French knowledge. 🇫🇷 🏖 ⛰️</p> CFP: 2021 IEEE Workshop on Offensive Technologies (WOOT) https://francozappa.github.io/post/2021/cfp-woot21/ Fri, 27 Nov 2020 00:00:00 +0000 https://francozappa.github.io/post/2021/cfp-woot21/ <p>The call for papers for the 2021 IEEE Workshop on Offensive Technologies (WOOT) is open. Please submit your great research work and spread the word among attackers 🔥 😄 🔥</p> <p>Here are the deadlines:</p> <ul> <li>Abstract registration deadline: Wednesday, January 27, 2021, 11:59 AoE (Anywhere on Earth)</li> <li>Paper submission deadline: Friday, January 29, 2021, 11:59 AoE (Anywhere on Earth)</li> <li>Notification date: Monday, March 01, 2021</li> <li>Workshop date: Thursday, May 27, 2021</li> </ul> <p>Submission topics include, but are not limited to, attacks on and offensive research into:</p> <ul> <li>Hardware, including software-based exploitation of hardware vulnerabilities</li> <li>Virtualization and the cloud</li> <li>Network and distributed systems</li> <li>Operating systems</li> <li>Browser and general client-side security (runtimes, JITs, sandboxing)</li> <li>Application security</li> <li>Analysis of mitigations and automating how they can be bypassed</li> <li>Automating software testing such as fuzzing for novel targets</li> <li>Internet of Things</li> <li>Machine Learning</li> <li>Cyber-physical systems</li> <li>Privacy</li> <li>Cryptographic systems (practical attacks on deployed systems)</li> <li>Malware design, implementation and analysis</li> <li>Offensive applications of formal methods (solvers, symbolic execution)</li> </ul> <p>For more information about the CFP look <a href="https://www.ieee-security.org/TC/SP2021/SPW2021/WOOT21/" target="_blank" rel="noopener">here</a>.</p> Joining WOOT and SEC TPCs https://francozappa.github.io/post/2021/cfp-woot21-sec21/ Sun, 22 Nov 2020 00:00:00 +0000 https://francozappa.github.io/post/2021/cfp-woot21-sec21/ <p>I&rsquo;m thrilled to join the technical program committees of the <a href="https://www.ieee-security.org/TC/SP2021/SPW2021/WOOT21/" target="_blank" rel="noopener">Workshop on Offensive Technologies (WOOT)</a> and the <a href="https://www.usenix.org/conference/usenixsecurity21" target="_blank" rel="noopener">USENIX Security Symposium (SEC)</a>.</p> <p>Lots of good papers ahead 😄</p> <p align="center"> <iframe src="https://giphy.com/embed/13bUdxDy4jJUR2" width="480" height="270" frameBorder="0" class="giphy-embed" allowFullScreen></iframe><p><a href="https://giphy.com/gifs/care-paperwork-13bUdxDy4jJUR2"></a></p> Early Evidence of Effectiveness of Digital Contact Tracing for SARS-CoV-2 in Switzerland https://francozappa.github.io/publication/2020/cte-journal/ Thu, 01 Oct 2020 00:00:00 +0000 https://francozappa.github.io/publication/2020/cte-journal/ BLURtooth (BLUR Attacks) Disclosure https://francozappa.github.io/post/2020/blur-announce/ Fri, 25 Sep 2020 00:00:00 +0000 https://francozappa.github.io/post/2020/blur-announce/ <p>Since January 2020 we&rsquo;ve been working on a security analysis of Bluetooth cross-transport key-derivation (CTKD). In May 2020 we reported to the Bluetooth SIG a set of CTKD vulnerabilities and related attacks (i.e., the BLURtooth report about the BLUR attacks) and kept our findings private.</p> <p>The 10th of September 2020 the Bluetooth SIG posted the following security note without letting us know: <a href="https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/" target="_blank" rel="noopener">Bluetooth SIG Statement Regarding the Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy Vulnerability (BLURtooth)</a>.</p> <p>To clarify our position with respect to such security note we release <a href="https://hexhive.epfl.ch/BLURtooth/" target="_blank" rel="noopener">a public disclosure statement</a> and an updated version of the <a href="https://arxiv.org/abs/2009.11776" target="_blank" rel="noopener">BLURtooth technical report</a>. Enjoy!</p> <p>Bonus track:</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/LJzCYSdrHMI" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> BIAS and KNOB attacks against Bluetooth BR/EDR/LE https://francozappa.github.io/talk/bias-and-knob-attacks-against-bluetooth-br/edr/le/ Tue, 18 Aug 2020 00:00:00 +0000 https://francozappa.github.io/talk/bias-and-knob-attacks-against-bluetooth-br/edr/le/ <p>Bluetooth is a ubiquitous technology for low power wireless communications. Bluetooth runs on billions of devices including mobile, wearables, home automation, smart speakers, headsets, industrial and medical appliances, and vehicles. As a result, Bluetooth&rsquo;s attack surface is huge and includes significant threats such as identity thefts, privacy violations, and malicious device control. Bluetooth is a complex technology specified in an open standard. The standard defines two wireless stacks Bluetooth Classic for high throughput services (e.g., audio and voice) and Bluetooth Low Energy (BLE) for very low power services (e.g., localization, and monitoring). The standard defines security mechanisms to protect the confidentiality, integrity, and authenticity of Bluetooth communications. Those mechanisms include pairing to share a long term key among two devices, and secure session establishment to let two paired devices negotiate session keys to protect their communication. A single vulnerability in a standard-compliant security mechanism translates into billions of exploitable devices. This talk reviews several standard-compliant vulnerabilities that we recently uncovered on the key negotiation and authentication mechanisms of Bluetooth Classic and BLE. We also describe how to exploit such vulnerabilities to perform key negotiation attacks on Bluetooth Classic and BLE (KNOB attacks, CVE-2019-9506) and impersonation attacks on Bluetooth Classic (BIAS attacks, CVE-2020-10135). The attacks are presented together with a detailed description of the Bluetooth treat model and the affected security mechanism. We also explain how we implemented such attacks using low-cost hardware and open-source software and how we evaluated them on actual devices from the major vendors including Apple, Broadcom, Cypress, CSR, Google, Intel, Microsoft, and Qualcomm. Finally, we describe how the Bluetooth standard was amended after the disclosure of our attacks, our proposed countermeasures, and why most of the Bluetooth devices are still vulnerable to our attacks.</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/2Sx-81wz9LA" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> WAC3 Presentation is Online https://francozappa.github.io/post/2020/wac320-video/ Wed, 12 Aug 2020 00:00:00 +0000 https://francozappa.github.io/post/2020/wac320-video/ <p>BIAS + KNOB attack against Bluetooth:</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/2Sx-81wz9LA" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <p>All the WAC talks are available on <a href="https://www.youtube.com/watch?v=XS_DZ5F-y3k&amp;list=PLeeS-3Ml-rppRzqiDB7l-TIyE-YSqXGR3" target="_blank" rel="noopener">YouTube</a></p> DP3T/GAEN for COVID-19 https://francozappa.github.io/project/gaen/ Fri, 07 Aug 2020 00:00:00 +0000 https://francozappa.github.io/project/gaen/ <p>The <a href="https://francozappa.github.io/publication/dp3t-preprint/paper.pdf" target="_blank" rel="noopener">Decentralized Privacy-Preserving Proximity Tracing (DP3T)</a> is a system that we developed for secure and privacy-preserving proximity tracing at large scale. DP3T provides a technological foundation to help slow the spread of SARS-CoV-2 by simplifying and accelerating the process of notifying people who might have been exposed to the virus so that they can take appropriate measures to break its transmission chain. DP3T is open-source and its <a href="https://github.com/DP-3T" target="_blank" rel="noopener">repos</a> and <a href="https://github.com/DP-3T/documents" target="_blank" rel="noopener">documents</a> are on GitHub.</p> <p>We also published a work titled <a href="https://www.medrxiv.org/content/medrxiv/early/2020/09/19/2020.09.07.20189274.full.pdf" target="_blank" rel="noopener">Early Evidence of Effectiveness of Digital Contact Tracing for SARS-CoV-2 in Switzerland</a> to show early findings about the effectiveness of digital contact tracing in Switzerland.</p> <p>Google and Apple developed the <a href="https://blog.google/inside-google/company-announcements/apple-google-exposure-notification-api-launches/" target="_blank" rel="noopener">GAEN (Google/Apple Exposure Notifications)</a> framework based on DP3T.</p> CFP: ACM AsiaCCS 2021 https://francozappa.github.io/post/2021/cfp-asiaccs21/ Wed, 05 Aug 2020 00:00:00 +0000 https://francozappa.github.io/post/2021/cfp-asiaccs21/ <p>I&rsquo;m glad to serve as a TPC member for <a href="https://asiaccs2021.comp.polyu.edu.hk/" target="_blank" rel="noopener">ACM AsiaCCS 2021</a>. The first round of submission deadline is approaching (21 August 2020), indeed submit your great research works!</p> <p>Those are the important dates:</p> <ul> <li>1st round deadlines <ul> <li>Paper submission: 21 August 2020</li> <li>Author notification: 24 October 2020</li> <li>Camera ready due to: 25 November 2020</li> </ul> </li> <li>2st round deadlines <ul> <li>Paper submission: 11 December 2020</li> <li>Author notification: 15 February 2021</li> <li>Camera ready due to: 15 March 2021</li> </ul> </li> <li>Conference date: June 7-11, 2021</li> </ul> WAC3 Talk About KNOB and BIAS Attacks https://francozappa.github.io/post/2020/wac320-talk/ Tue, 21 Jul 2020 00:00:00 +0000 https://francozappa.github.io/post/2020/wac320-talk/ <p>I&rsquo;m glad to give a talk about the <a href="https://francozappa.github.io/project/knob/" target="_blank" rel="noopener">KNOB</a> and <a href="https://francozappa.github.io/project/bias/" target="_blank" rel="noopener">BIAS</a> attacks on Bluetooth at the third <a href="https://crypto.iacr.org/2020/wac.php" target="_blank" rel="noopener">Workshop on Attacks in Cryptography (WAC)</a> co-located with<br> <a href="https://crypto.iacr.org/2020/" target="_blank" rel="noopener">CRYPTO 2020</a>. The Workshop will be held online on Zoom the 16th of August 2020, and my talk will be from 13:20 to 14:00 (EDT) in the Attacks on Standards session (session IV).</p> <p>This is the talk abstract:</p> <blockquote> <p>Bluetooth is a ubiquitous technology for low power wireless communications. Bluetooth runs on billions of devices including mobile, wearables, home automation, smart speakers, headsets, industrial and medical appliances, and vehicles. As a result, Bluetooth&rsquo;s attack surface is huge and includes significant threats such as identity thefts, privacy violations, and malicious device control.</p> <p>Bluetooth is a complex technology specified in an open standard. The standard defines two wireless stacks Bluetooth Classic for high throughput services (e.g., audio and voice) and Bluetooth Low Energy (BLE) for very low power services (e.g., localization, and monitoring). The standard defines security mechanisms to protect the confidentiality, integrity, and authenticity of Bluetooth communications. Those mechanisms include pairing to share a long term key among two devices, and secure session establishment to let two paired devices negotiate session keys to protect their communication. A single vulnerability in a standard-compliant security mechanism translates into billions of exploitable devices.</p> <p>This talk reviews several standard-compliant vulnerabilities that we recently uncovered on the key negotiation and authentication mechanisms of Bluetooth Classic and BLE. We also describe how to exploit such vulnerabilities to perform key negotiation attacks on Bluetooth Classic and BLE (KNOB attacks, CVE-2019-9506) and impersonation attacks on Bluetooth Classic (BIAS attacks, CVE-2020-10135). The attacks are presented together with a detailed description of the Bluetooth treat model and the affected security mechanism. We also explain how we implemented such attacks using low-cost hardware and open-source software and how we evaluated them on actual devices from the major vendors including Apple, Broadcom, Cypress, CSR, Google, Intel, Microsoft, and Qualcomm. Finally, we describe how the Bluetooth standard was amended after the disclosure of our attacks, our proposed countermeasures, and why most of the Bluetooth devices are still vulnerable to our attacks.</p> </blockquote> <p>For more details about the KNOB and BIAS attacks have a look at the related research papers:</p> <ul> <li><em>The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation of Bluetooth BR/EDR</em>, USENIX Security 2019.</li> <li><em>Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy</em>, ACM TOPS 2020.</li> <li><em>BIAS: Bluetooth Impersonation AttackS</em>, IEEE S&amp;P 2020.</li> </ul> <p>Please join the virtual WAC, and thanks <a href="https://eyalro.net/" target="_blank" rel="noopener">Eyal Ronen</a> and <a href="https://www.mathyvanhoef.com/" target="_blank" rel="noopener">Mathy Vanhoef</a> for organizing it and for the invitation!</p> NSS 2020 Extended Call For Papers https://francozappa.github.io/post/2020/nss20-cfp-ext/ Mon, 06 Jul 2020 00:00:00 +0000 https://francozappa.github.io/post/2020/nss20-cfp-ext/ <p>The Network and System Security (NSS) 2020 conference paper submission deadline has been extended to <strong>15 September 2020 (Anywhere on Earth)</strong></p> <p>Please submit your research work!</p> <p>You can find more information in the <a href="http://nsclab.org/nss2020/index.html" target="_blank" rel="noopener">NSS website</a> and specifically in the <a href="http://nsclab.org/nss2020/cfp.html" target="_blank" rel="noopener">CFP section</a>.</p> Tutor Island: Matematica & Codice https://francozappa.github.io/post/2020/tutor-island/ Sat, 20 Jun 2020 00:00:00 +0000 https://francozappa.github.io/post/2020/tutor-island/ <p>Condivido con piacere <a href="https://www.youtube.com/channel/UCKkzN06obaHk8mt3iBTp6qw" target="_blank" rel="noopener">Tutor Island</a> il nuovo canale YouTube del mio amico e collega Paolo. Su questo canale potrete trovare tutorial in Italiano (e prossimamente anche in Inglese) su argomenti matematici, informatici e ingegneristici. Per esempio linko qui sotto una playlist con un corso per ingegneri che vogliono programmare in MATLAB/Octave:</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/2ro75VG9UWs" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <p>Paolo è un bravissimo insegnante e divulgatore scientifico con anni di esperienza alle spalle sia universitaria che professionale. Paolo ha anche esperienza in ambito informatico e dai sui video sicuramente imparerete molto di più che l&rsquo;argomento centrale del video. Il canale di Paolo è anche molto curato dal punto di vista audio, video e grafico e questo non guasta mai 😄</p> <p>Tutor Island offre materiale esclusivo per studenti con una piccola donazione su <a href="https://www.patreon.com/tutorisland" target="_blank" rel="noopener">Patreon</a>. Potete seguire il feed del canale, oltre che su YouTube, su <a href="https://twitter.com/tutor_island" target="_blank" rel="noopener">Twitter</a> e <a href="https://www.facebook.com/tutorislandfb/" target="_blank" rel="noopener">Facebook</a>.</p> <p>🏖 ☀ 🏝</p> CFP: Conference on Network and System Security (NSS) https://francozappa.github.io/post/2020/cfp-nss20/ Mon, 08 Jun 2020 00:00:00 +0000 https://francozappa.github.io/post/2020/cfp-nss20/ <p>I&rsquo;m glad to serve as a TPC member and publicity co-chair for the <em>14th International Conference on Network and System Security (NSS)</em>. The conference focuses on network and system security and welcomes papers from a broad range of topics including:</p> <ul> <li>Active Defense Systems</li> <li>Analysis, Benchmark of Security Systems</li> <li>Applied Cryptography</li> <li>Authentication</li> <li>Privacy and Anonymity Technologies</li> <li>Secure Cryptographic Protocols and Applications</li> <li>Security Notions, Approaches, and Paradigms</li> <li>Steganography and Steganalysis</li> <li>Blockchain and Cryptocurrency</li> <li>Smart Contract</li> <li>Digital Forensics</li> <li>Cyber Hacking and Protection</li> <li>Hardware Security</li> <li>Intrusion Detection and Prevention</li> <li>AI/Machine Learning Security</li> <li>Software Security</li> <li>Security Policy</li> <li>Security and Privacy in Social Networks</li> <li>Trusted Computing</li> <li>Watermarking and Digital Rights Management</li> <li>Location Privacy</li> <li>Security For Critical Infrastructures</li> <li>RFID/NFC Security</li> <li>Security Infrastructure</li> <li>Security and Privacy For Digital Health</li> <li>Viruses and Malware</li> <li>Intellectual Property Rights Protection</li> <li>Cyber-Physical Security</li> </ul> <p>You can find more information in the <a href="http://nsclab.org/nss2020/index.html" target="_blank" rel="noopener">Conference website</a> and specifically in the <a href="http://nsclab.org/nss2020/cfp.html" target="_blank" rel="noopener">CFP section</a>.</p> <p>NSS 2020 deadlines:</p> <ul> <li>Paper submission <strong>15 July 2020 (Anywhere on Earth)</strong></li> <li>Notification of acceptance <strong>15 August 2020</strong></li> <li>Camera-ready paper submission <strong>20 October 2020</strong></li> <li>Conference location and date <strong>Melbourne Australia, 24–27 November 2020</strong></li> </ul> Bluetooth BIAS Attacks https://francozappa.github.io/project/bias/ Mon, 18 May 2020 00:00:00 +0000 https://francozappa.github.io/project/bias/ <p>In 2020 we disclosed the <a href="https://francozappa.github.io/about-bias/" target="_blank" rel="noopener">Bluetooth Impersonation AttackS (BIAS)</a>, a family of high impact attacks affecting Bluetooth&rsquo;s authentication protocols. The attacks allow impersonating any Bluetooth device during secure session establishment without knowing the long term pairing key. The BIAS attacks are tracked with <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10135" target="_blank" rel="noopener">CVE-2019-9506</a></p> <h2 id="ieee-sp-oakland-2020-paper-teaser">IEEE S&amp;P (Oakland) 2020 Paper Teaser</h2> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/fASGU7Og5_4" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <h2 id="ieee-sp-oakland-2020-paper-presentation">IEEE S&amp;P (Oakland) 2020 Paper Presentation</h2> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/bVbBDnruv7M" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <h2 id="bias--knob-attack-against-bluetooth-iacr-attacks-in-crypto">BIAS + KNOB attack against Bluetooth IACR Attacks in Crypto</h2> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/2Sx-81wz9LA" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <h2 id="from-bluetooth-standard-to-standard-compliant-0-days-hardweario">From Bluetooth Standard to Standard Compliant 0-days Hardwear.io</h2> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/ZVSbF11uxuk" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> Slides and video from our hardwear.io 2020 talk https://francozappa.github.io/post/2020/knob-hw20-material/ Sun, 10 May 2020 00:00:00 +0000 https://francozappa.github.io/post/2020/knob-hw20-material/ <p>Here are the <a href="https://francozappa.github.io/talk/hwio20/slides.pdf" target="_blank" rel="noopener">slides</a> and the recording of our hardwear.io talk titled <em>From Bluetooth Standard to Standard-Compliant 0-days</em>:</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/ZVSbF11uxuk" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> From the Bluetooth Standard to Standard-Compliant 0-days https://francozappa.github.io/talk/from-the-bluetooth-standard-to-standard-compliant-0-days/ Thu, 30 Apr 2020 00:00:00 +0000 https://francozappa.github.io/talk/from-the-bluetooth-standard-to-standard-compliant-0-days/ <p>Bluetooth is a ubiquitous technology for low power wireless communications. Bluetooth runs on billions of devices, including mobile, wearables, home automation, smart speakers, headsets, industrial and medical appliances, and vehicles. As a result, Bluetooth&rsquo;s attack surface is huge and includes significant threats such as identity thefts, privacy violations, and malicious device control.</p> <p>Bluetooth is a complex technology specified in an open standard. The standard defines two wireless stacks Bluetooth &ldquo;classic&rdquo; BR/EDR for high throughput services (e.g., audio and voice) and Bluetooth Low Energy (BLE) for very low power services (e.g., localization, and monitoring). The standard defines security mechanisms to protect Bluetooth communications. Those mechanisms include pairing to share a long term key among two devices, and secure session establishment to let two paired devices negotiate session keys. It is paramount that those standard security mechanisms provide security guarantees that they promise, such as confidentiality, authenticity, and integrity of data. A single vulnerability in a standard security mechanism translates into billions of exploitable devices.</p> <p>This talk describes how we managed to find and exploit standard-compliant 0-days in the Bluetooth standard. We describe, in detail, the Bluetooth security architecture, including its main components (Host, Controller) and protocols (HCI, LMP, and SMP). Then we talk about the Key Negotiation of Bluetooth (KNOB) attack on Bluetooth &ldquo;classic&rdquo; BR/EDR [CVE-2019-9506] and its extension to BLE. The KNOB attacks are enabled by standard-compliant 0-days in the key negotiation protocols of Bluetooth &ldquo;classic&rdquo; BR/EDR and BLE. In particular, those protocols allow to negotiate keys with very low entropy (strength), and they do not protect the integrity of entropy negotiation. Using the KNOB attack, a man-in-the-middle attacker can force a Bluetooth &ldquo;classic&rdquo; BR/EDR session key to 1 byte of entropy, and a BLE long term key to 7 bytes of entropy. Such low entropy values are unacceptable in 2020 and can easily (for BLE) or trivially (for BR/EDR) be brute-forced.</p> <p>As a result of our attacks, a remote attacker gets access to private data and inserts valid malicious data on Bluetooth &ldquo;classic&rdquo; BR/EDR and BLE secure connection. The exploits are effective on any standard compliant Bluetooth device regardless of software, hardware vendors and versions, Bluetooth version, supported security features, or security mode in use. As a result of our disclosure in 2019, the Bluetooth SIG amended the standard by requiring 7 bytes of entropy as minimum entropy value for Bluetooth BR/EDR (as for BLE). Only some vendors, including Intel, Google, Apple, and Microsoft, patched a subset of their products to address the KNOB attack, and in the talk, we describe some of those patches and why they are not effective. We also describe why the majority of low-end devices that we tested remains vulnerable to the 1-byte entropy downgrade. We conclude the talk describing the main lessons that we learned while finding and exploiting Bluetooth standard compliant 0 days.</p> <p>The KNOB attacks were identified, investigated, and demonstrated by Daniele Antonioli, Nils Tippenhauer, and Kasper Rasmussen, more information at <a href="https://knobattack.com" target="_blank" rel="noopener">https://knobattack.com</a>.</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/ZVSbF11uxuk" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> Decentralized Privacy-Preserving Proximity Tracing https://francozappa.github.io/publication/2020/dp3t-deb/ Sun, 26 Apr 2020 00:00:00 +0000 https://francozappa.github.io/publication/2020/dp3t-deb/ Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy https://francozappa.github.io/post/2020/knob-tops/ Sun, 26 Apr 2020 00:00:00 +0000 https://francozappa.github.io/post/2020/knob-tops/ <p>Our new paper <a href="https://francozappa.github.io/publication/knob-ble/" target="_blank" rel="noopener">Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy</a> will appear in the <a href="https://dl.acm.org/journal/tops" target="_blank" rel="noopener">ACM Transactions on Privacy and Security</a>.</p> <p>Our paper extends our previous work on the <a href="https://knobattack.com" target="_blank" rel="noopener">KNOB attack on Bluetooth BR/EDR</a> to Bluetooth Low Energy (BLE), presents an updated evaluation of the KNOB attack for Bluetooth BR/EDR and discusses some of the countermeasures put in place by vendors such as Google and Apple after the disclosure of the KNOB attack and the amendment of the Bluetooth standard.</p> Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy https://francozappa.github.io/publication/2020/knob-ble/ Sun, 26 Apr 2020 00:00:00 +0000 https://francozappa.github.io/publication/2020/knob-ble/ Bluetooth Impersonation AttackS (BIAS) at IEEE S&P 2020 https://francozappa.github.io/post/2020/bias-announce/ Thu, 16 Apr 2020 00:00:00 +0000 https://francozappa.github.io/post/2020/bias-announce/ <p>Our paper <a href="https://francozappa.github.io/publication/bias/" target="_blank" rel="noopener">Bluetooth Impersonation AttackS (BIAS)</a> will be presented at the <a href="https://www.ieee-security.org/TC/SP2020//index.html" target="_blank" rel="noopener">IEEE Symposium on Security and Privacy (IEEE S&amp;P) 2020</a>.</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/fASGU7Og5_4" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <p>More information are available in the <a href="https://francozappa.github.io/about-bias" target="_blank" rel="noopener">BIAS website</a></p> <p>The BIAS code will be also uploaded soon! Stay tuned and unbiased 😄</p> KNOB Attacks Talk at Hardwear.io 2020 https://francozappa.github.io/post/2020/knob-hw20/ Sun, 05 Apr 2020 00:00:00 +0000 https://francozappa.github.io/post/2020/knob-hw20/ <p>I&rsquo;m glad to give a talk titled <a href="https://hardwear.io/virtual-con-2020/speakers/from-the-bluetooth-standard-to-standard-compliant-0-days.php" target="_blank" rel="noopener">From the Bluetooth Standard to Standard Compliant 0-days</a> together with <a href="https://nebelwelt.net/" target="_blank" rel="noopener">Mathias Payer</a> at the virtual edition of <a href="https://hardwear.io/virtual-con-2020/" target="_blank" rel="noopener">Hardwear.io 2020</a>.</p> <p>Our talk covers, among others, the technical details behind the <a href="https://knobattack.com/" target="_blank" rel="noopener">Key Negotiation Of Bluetooth (KNOB) attack on Bluetooth BR/EDR</a>, its extension to BLE, and the countermeasures adopted by vendors, such as Google and Apple, to mitigate the KNOB attacks.</p> <p>Please join us at the virtual conference! 😄</p> BIAS: Bluetooth Impersonation AttackS https://francozappa.github.io/publication/2020/bias/ Thu, 26 Mar 2020 00:00:00 +0000 https://francozappa.github.io/publication/2020/bias/ InspiredResearch Newsletter University of Oxford https://francozappa.github.io/post/2020/knob-ir/ Fri, 10 Jan 2020 00:00:00 +0000 https://francozappa.github.io/post/2020/knob-ir/ <p>The <a href="https://www.cs.ox.ac.uk/innovation/inspiredresearch/InspiredResearch-winter2019.pdf" target="_blank" rel="noopener">In<em>spired</em>Research (Winter 2019 Issue 15)</a> twice-yearly newsletter from the Computer Science Department of the University of Oxford features a nice article about the KNOB attack by <a href="https://www.cs.ox.ac.uk/people/kasper.rasmussen/" target="_blank" rel="noopener">Prof. Kasper Rasmussen</a>.</p> Security Engineering Third Edition (SEv3) https://francozappa.github.io/post/2019/knob-sev3/ Sat, 07 Dec 2019 00:00:00 +0000 https://francozappa.github.io/post/2019/knob-sev3/ <p>Recently, I&rsquo;ve stumbled upon the webpage about <a href="https://www.cl.cam.ac.uk/~rja14/book.html" target="_blank" rel="noopener">Security Engineering &ndash; Third Edition (SEv3)</a> by <a href="https://www.cl.cam.ac.uk/~rja14/" target="_blank" rel="noopener">Prof. Ross Anderson</a>. I&rsquo;m particularly attached to this book, as it is the <em>first</em> book about information security that I bought (I bought SEv2 in 2012), and it was very helpful to introduce me to security engineering (coming from an EE background) and to tackle my <a href="https://francozappa.github.io/publication/master-thesis/thesis.pdf" target="_blank" rel="noopener">master thesis about Random Number Generators</a>. Actually, I have to thank <a href="https://ece.umass.edu/faculty/wayne-burleson" target="_blank" rel="noopener">Prof. Wayne Burleson</a> for the book recommendation!</p> <p>I&rsquo;m very proud that the <a href="https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch5-oct12.pdf" target="_blank" rel="noopener">Cryptography Chapter of SEv3</a> (so far 😄) includes a discussion about the <a href="https://knobattack.com/" target="_blank" rel="noopener">KNOB attack</a> in the subsection about Diffie-Hellman key establishment (5.7.2.2). I look forward to read SEv3 once is ready!</p> Postdoc with Mathias Payer's HexHive group at EPFL https://francozappa.github.io/post/2019/epfl-postdoc/ Fri, 29 Nov 2019 14:28:36 +0800 https://francozappa.github.io/post/2019/epfl-postdoc/ <p>Next January I will join as a postdoc <a href="https://nebelwelt.net/" target="_blank" rel="noopener">Mathias Payer</a>&rsquo;s <a href="https://hexhive.epfl.ch/" target="_blank" rel="noopener">HexHive</a> group at <a href="https://www.epfl.ch/en/" target="_blank" rel="noopener">EPFL</a>.</p> <p>Looking forward to start a new adventure, and meet old and new friends.</p> <p>😆</p> KNOB Attack References and Advisories https://francozappa.github.io/post/2019/knob-references/ Thu, 17 Oct 2019 00:00:00 +0000 https://francozappa.github.io/post/2019/knob-references/ <p>I&rsquo;ve collected a list of references and advisories about the KNOB attack from several hardware and software providers and organizations. You can find it in the last paragraph of the <a href="https://knobattack.com/" target="_blank" rel="noopener">&ldquo;Are my Devices Vulnerable?&rdquo; section of knobattack.com</a>.</p> <p>Please let me know if any link in the list is wrong and/or broken, and if you find other relevant links!</p> Video of my KNOB Attack Presentation at USENIX Security 2019 https://francozappa.github.io/post/2019/knob-sec-video/ Mon, 07 Oct 2019 00:00:00 +0000 https://francozappa.github.io/post/2019/knob-sec-video/ <p>Title of the paper: <em>The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR</em>:</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/v9Xg9XcnNh0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <p>More info at <a href="https://knobattack.com/" target="_blank" rel="noopener">knobattack.com</a></p> Bluetooth blues: KNOB Attack Explained https://francozappa.github.io/talk/bluetooth-blues-knob-attack-explained/ Sat, 14 Sep 2019 00:00:00 +0000 https://francozappa.github.io/talk/bluetooth-blues-knob-attack-explained/ <p>In this interview we present the KNOB attack as part of the CyberWire&rsquo;s Research Saturday session.</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/_XvjXZCc1DU" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <p>Alternative <a href="https://thecyberwire.com/podcasts/research-saturday/102/notes" target="_blank" rel="noopener">link</a>.</p> KNOB Attack Interview with Dave Bittner (CyberWire) https://francozappa.github.io/post/2019/knob-cyberwire/ Sat, 14 Sep 2019 00:00:00 +0000 https://francozappa.github.io/post/2019/knob-cyberwire/ <p>Today CyberWire aired my <a href="https://thecyberwire.com/podcasts/cw-podcasts-rs-2019-09-14.html" target="_blank" rel="noopener">interview</a> about the <a href="https://knobattack.com/" target="_blank" rel="noopener">KNOB attack</a> with <a href="https://twitter.com/bittner" target="_blank" rel="noopener">Dave Bittner</a>.</p> Design, Implementation, and Evaluation of Secure Cyber-Physical and Wireless Systems https://francozappa.github.io/publication/2019/phd-thesis/ Tue, 27 Aug 2019 00:00:00 +0000 https://francozappa.github.io/publication/2019/phd-thesis/ PhD at SUTD Completed! https://francozappa.github.io/post/2019/phd-completed/ Tue, 27 Aug 2019 00:00:00 +0000 https://francozappa.github.io/post/2019/phd-completed/ <p>I&rsquo;m glad to announce that I&rsquo;ve completed my PhD in Computer Science at SUTD about <em>Design, Implementation, and Evaluation of Secure Cyber-Physical and Wireless Systems</em>. I&rsquo;ve uploaded my <a href="https://francozappa.github.io/publication/phd-thesis/thesis.pdf" target="_blank" rel="noopener">thesis</a> and the <a href="https://francozappa.github.io/publication/phd-thesis/slides.pdf" target="_blank" rel="noopener">slides</a> of my final presentation. For more information have a look <a href="https://francozappa.github.io/publication/phd-thesis/" target="_blank" rel="noopener">here</a>.</p> <p>🎶 😆 🎶</p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/kHx5hCVN26E" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <p>🎶 😆 🎶</p> KNOB Attack Add Slave Patch for poc-internalblue https://francozappa.github.io/post/2019/knob-repo3/ Mon, 26 Aug 2019 00:00:00 +0000 https://francozappa.github.io/post/2019/knob-repo3/ <p>I&rsquo;ve pushed the <a href="https://github.com/francozappa/knob/tree/master/poc-internalblue" target="_blank" rel="noopener">code</a> to perform the KNOB attack also when the Nexus 5 is the Bluetooth slave responding to the first LMP packet. To switch between different attack modes have a look at the updated <a href="https://github.com/francozappa/knob/blob/master/poc-internalblue/README.md" target="_blank" rel="noopener">README</a>.</p> <p>For more information visit <a href="https://knobattack.com/" target="_blank" rel="noopener">knobattack.com</a></p> Bluetooth KNOB Attacks https://francozappa.github.io/project/knob/ Tue, 20 Aug 2019 00:00:00 +0000 https://francozappa.github.io/project/knob/ <p>In 2019 we disclosed two families of high impact attacks affecting the entropy negotiation protocols of Bluetooth Classic (BC) and Bluetooth Low Energy (BLE). We named the attacks Key Negotiation of Bluetooth (KNOB) attacks. They are tracked as <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9506" target="_blank" rel="noopener">CVE-2019-9506</a>.</p> <p>Our first work titled <a href="https://www.usenix.org/system/files/sec19-antonioli.pdf" target="_blank" rel="noopener">The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation of Bluetooth BR/EDR</a> explains how to exploit BC&rsquo;s entropy negotiation to downgrade the entropy of a Bluetooth security key to 1 byte and then brute-force it.</p> <p>In a follow-up work titled <a href="https://francozappa.github.io/publication/knob-ble/paper.pdf" target="_blank" rel="noopener">Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy</a> we analyzed also BLE and found that it is vulnerable as well to the KNOB attacks. In this case the attacker can downgrade the entropy of BLE security key to 7 bytes and then brute-force it.</p> <h2 id="usenix-security-2019-paper-presentation">USENIX Security 2019 Paper Presentation</h2> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/v9Xg9XcnNh0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <h2 id="bluetooth-blues-knob-attack-explained--research-saturday">Bluetooth blues: KNOB attack explained. — Research Saturday</h2> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/_XvjXZCc1DU" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <h2 id="bias--knob-attack-against-bluetooth-iacr-attacks-in-crypto">BIAS + KNOB attack against Bluetooth IACR Attacks in Crypto</h2> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/2Sx-81wz9LA" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> <h2 id="from-bluetooth-standard-to-standard-compliant-0-days-hardweario">From Bluetooth Standard to Standard Compliant 0-days Hardwear.io</h2> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/ZVSbF11uxuk" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> KNOB Attack FAQ https://francozappa.github.io/post/2019/knob-faq/ Mon, 19 Aug 2019 00:00:00 +0000 https://francozappa.github.io/post/2019/knob-faq/ <p>In this post I&rsquo;m trying to address some discussion points and misconceptions about the KNOB attack.</p> <h2 id="attribution">Attribution</h2> <blockquote> <p>Researchers from CISPA discovered the KNOB attack</p> </blockquote> <p><strong>Partially true</strong>. The KNOB attack was discovered by myself (Daniele Antonioli) from SUTD, Nils Ole Tippenhauer from CISPA, and Kasper Rasmussen from the University of Oxford. In particular, I&rsquo;ve identified the vulnerability back in <em>May 2018</em> while I was working with Kasper on <a href="https://francozappa.github.io/publication/rearby/" target="_blank" rel="noopener">Nearby Connections</a> at the University of Oxford, and I wrote the first exploit in <em>October 2018</em> while I was visiting Nils (my former advisor at SUTD) at CISPA. I&rsquo;d like to thank the researchers from CISPA who kindly lent me their Bluetooth devices.</p> <h2 id="attack">Attack</h2> <blockquote> <p>The KNOB attack is performed while two Bluetooth BR/EDR devices are pairing</p> </blockquote> <p><strong>False</strong>. The KNOB attack targets the connection phase and can be conducted between two devices are already paired. See also <a href="https://francozappa.github.io/publication/knob/slides.pdf" target="_blank" rel="noopener">slide 6</a></p> <blockquote> <p>The KNOB attack can only be used to spy Bluetooth communications</p> </blockquote> <p><strong>Partially true</strong>. The KNOB attack can also be used to inject valid ciphertext, e.g., to impersonate a legitimate Bluetooth device.</p> <blockquote> <p>The KNOB attack reduces the encryption key size to 1 byte</p> </blockquote> <p><strong>False</strong>. The encryption key size stays the same (16 bytes). The KNOB attack reduces the <em>entropy (randomness)</em> of the key to 1 byte. For example the key <code>0xa395a045bf2410983b4309214598beaf</code> (16 byte of entropy) is reduced to <code>0xa3000000000000000000000000000000</code> (1 byte of entropy) and not to <code>0xa3</code>.</p> <blockquote> <p>The KNOB attack is theoretical</p> </blockquote> <p><strong>False</strong>. The KNOB attack exploits an actual vulnerability in the key negotiation protocol of Bluetooth (BR/EDR). As it is an attack at the <em>architectural</em> level, all standard compliant devices are potentially vulnerable. Back in 2018 we performed the KNOB attack on more than 20 Bluetooth devices, and all of them were vulnerable. You can test if your device is vulnerable by using our <a href="https://github.com/francozappa/knob/tree/master/poc-internalblue" target="_blank" rel="noopener">PoC</a>.</p> <blockquote> <p>The attacker has to be &ldquo;local&rdquo; or in a &ldquo;privileged&rdquo; position</p> </blockquote> <p><strong>False</strong>. The KNOB attack can be conducted remotely. For obvious reasons the attacker has to be in Bluetooth range, but this does not imply a privileged position.</p> <blockquote> <p>Internalblue enabled the discovery of the KNOB attack</p> </blockquote> <p><strong>False</strong>. I&rsquo;ve discovered the vulnerability while I was analyzing <a href="https://francozappa.github.io/publication/rearby/" target="_blank" rel="noopener">Nearby Connections</a> and reading the Bluetooth specification in May 2018. Then, while I was looking at devices with an open source Bluetooth firmware, I&rsquo;ve stumbled upon the Internalblue v0.1. To implement the attack I had to <a href="https://github.com/francozappa/knob/tree/master/poc-internalblue" target="_blank" rel="noopener">extend Internalblue</a> to support LMP packet injection, and develop some <a href="https://github.com/francozappa/knob/tree/master/e0" target="_blank" rel="noopener">extra code for E0</a>. Nevertheless, <a href="https://github.com/seemoo-lab/internalblue" target="_blank" rel="noopener">Internalblue</a> is an awesome project, I recommend it, and I thank <a href="http://tech.mantz-it.com/" target="_blank" rel="noopener">Dennis</a> and <a href="http://nerdine.org/" target="_blank" rel="noopener">Jiska</a> for releasing it to the public.</p> <h2 id="implementation">Implementation</h2> <blockquote> <p>The researchers did not implement the attack</p> </blockquote> <p><strong>False</strong>. We implemented the KNOB attack and our implementation generates the same effects of a remote KNOB attack conducted over the air. This is nice because we have a reliable and cheap attack setup that can be reproduced without the need of signal manipulation and jamming techniques, and SDR. If you want to reproduce the attack look at our <a href="https://github.com/francozappa/knob" target="_blank" rel="noopener">repo</a>.</p> <blockquote> <p>The researchers implemented only the firmware attack</p> </blockquote> <p><strong>False</strong>. We implement the remote attack by patching the firmware of one of the victim devices (Nexus 5). Our patches simulate the effect of a remote MitM attack and they do not change any firmware logic. This allows us to test the effect of a remote MitM attack on actual devices without having to perform the attack over the air.</p> KNOB Attack Code for E0 and Slides from SEC19 are Online https://francozappa.github.io/post/2019/knob-repo2/ Sun, 18 Aug 2019 00:00:00 +0000 https://francozappa.github.io/post/2019/knob-repo2/ <p>The <a href="https://github.com/francozappa/knob/tree/master/e0" target="_blank" rel="noopener">code</a> that we developed to validate and brute force <a href="https://en.wikipedia.org/wiki/E0_%28cipher%29" target="_blank" rel="noopener">E0</a> encryption keys is online.</p> <p>The <a href="https://francozappa.github.io/publication/knob/slides.pdf" target="_blank" rel="noopener">slides</a> of my KNOB attack SEC19 talk are also online. As we can see from the slides, the KNOB attack is <em>not</em> conducted while two Bluetooth devices are pairing, but when two devices are connecting (establishing a new encrypted session). Bluetooth (BR/EDR) is a technology with a <em>pair-once</em> <em>connect-multiple-times</em> paradigm. For example, you pair your smartphone with your car once, and then every day you connect the two and the devices negotiate a new (fresh) encryption key.</p> <p>For more information visit <a href="https://knobattack.com/" target="_blank" rel="noopener">knobattack.com</a></p> KNOB Attack Repository is Online https://francozappa.github.io/post/2019/knob-repo/ Fri, 16 Aug 2019 00:00:00 +0000 https://francozappa.github.io/post/2019/knob-repo/ <p>Our <a href="https://github.com/francozappa/knob" target="_blank" rel="noopener">KNOB repository</a> is online, and it includes our <a href="https://github.com/francozappa/knob/tree/master/poc-internalblue" target="_blank" rel="noopener">PoC</a>.</p> <p>For more information visit <a href="https://knobattack.com/" target="_blank" rel="noopener">knobattack.com</a></p> Key Negotiation Of Bluetooth (KNOB) Attack https://francozappa.github.io/post/2019/knob-announce/ Wed, 14 Aug 2019 00:00:00 +0000 https://francozappa.github.io/post/2019/knob-announce/ <p>The embargo is over! The information about <em>The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR</em>, including our research paper, CVE details, and media coverage, are publicly available at <a href="https://knobattack.com/" target="_blank" rel="noopener">knobattack.com</a></p> My PhD Defense at SUTD https://francozappa.github.io/post/2019/phd-defense/ Mon, 10 Jun 2019 11:28:36 +0800 https://francozappa.github.io/post/2019/phd-defense/ <p>Soon I&rsquo;m going to defend my PhD thesis at SUTD. Feel free to join!</p> <p>Date and time:</p> <blockquote> <p>Friday, 5 July 2019, 10:00 - 11:00 (AM)</p> </blockquote> <p>Venue:</p> <blockquote> <p>Think Tank 20 (2.305)</p> </blockquote> <p>Title of the talk:</p> <blockquote> <p>Design, Implementation, and Evaluation of Secure Cyber-Physical and Wireless System</p> </blockquote> <p>Abstract:</p> <blockquote> <p>In the first part of the presentation we will talk about our recent contributions in the area of wireless systems security. Wireless systems are used to transmit (sensitive) information and to manage and monitor systems remotely. In our recent works we focus on three problems to advance the security of wireless systems: effectiveness of deployed physical layer features as defense mechanisms, complexity and accessibility of wireless technologies, and security evaluations of wireless protocols. Firstly, we present a theoretical and empirical comparisons between b/n/ac amendments of IEEE 802.11 (WLAN). Our goal is to estimate and measure whether or not modern physical layer features, such as MIMO and beamforming, could be used to as defense mechanism. Afterwards, we will talk about our security analysis of Nearby Connections, a proprietary API for proximity-based services developed by Google. This API uses a combination of Bluetooth and Wi-Fi, and it is included in all Android devices since version 4.0 and all Android Things devices. Our analysis uncovers the proprietary (security) mechanisms of Nearby Connections and it is based on our reverse-engineering of its implementation. We demonstrate that Nearby Connections is vulnerable to critical threats by implementing attacks where we maliciously manipulate Nearby Connections and we extend the connection range to devices that are not nearby. Prior to publication we disclosed our findings to Google and we suggested them effective countermeasures. In the last part of the presentation we will summarize our contributions in the area of cyber-physical systems (CPS). In particular we will introduce MiniCPS, a toolkit for real-time CPS simulation and emulation and its related projects and use cases.</p> </blockquote> NDSS 2019 YouTube video of the presentation https://francozappa.github.io/post/2019/ndss19-video/ Wed, 03 Apr 2019 00:00:00 +0000 https://francozappa.github.io/post/2019/ndss19-video/ <p>My NDSS 2019 presentation of <em>Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google&rsquo;s &ldquo;Nearby Connections&rdquo; on Android</em></p> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/h5geJLoQIsU" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation of Bluetooth BR/EDR https://francozappa.github.io/publication/2019/knob/ Mon, 01 Apr 2019 00:00:00 +0000 https://francozappa.github.io/publication/2019/knob/ NDSS 2019 in San Diego https://francozappa.github.io/post/2019/ndss19-conf/ Tue, 26 Feb 2019 11:28:36 +0800 https://francozappa.github.io/post/2019/ndss19-conf/ <p>This week I&rsquo;ve been in San Diego CA for the <a href="https://www.ndss-symposium.org/" target="_blank" rel="noopener">The Network and Distributed System Security Symposium (NDSS) 2019</a> conference.</p> <p>I&rsquo;ve presented our paper about <a href="https://francozappa.github.io/publication/rearby/paper.pdf" target="_blank" rel="noopener">Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android</a>.</p> <p>Please have a look at the <a href="https://francozappa.github.io/publication/rearby/slides.pdf" target="_blank" rel="noopener">slides</a>, at the, <a href="https://github.com/francozappa/REarby/tree/master/poc-hostapd" target="_blank" rel="noopener">Soft AP manipulation PoC</a> and the <a href="https://www.reddit.com/r/netsec/comments/aye2q9/nearby_threats_reversing_analyzing_and_attacking/" target="_blank" rel="noopener">reddit thread</a>.</p> CFP: Cyber-Physical System SECurity (CPS-SEC) Workshop 2019 https://francozappa.github.io/post/2019/cfp-cps-sec19/ Thu, 14 Feb 2019 00:00:00 +0000 https://francozappa.github.io/post/2019/cfp-cps-sec19/ <p>Recently, I&rsquo;ve accepted the invitation to join the <a href="https://cns2019.ieee-cns.org/workshop/cps-sec-international-workshop-cyber-physical-systems-security" target="_blank" rel="noopener">IEEE CPS-SEC workshop</a> TPC. CPS-SEC is co-located with the <a href="https://cns2019.ieee-cns.org/" target="_blank" rel="noopener">IEEE CNS conference</a> . From the official website:</p> <blockquote> <p>The IEEE International Workshop on Cyber-Physical Systems Security (CPS-Sec) will be held in conjunction with the IEEE Conference on Communications and Network Security (CNS) 2019 in Washington, D.C., USA, on 10-12 June, 2019.</p> </blockquote> <blockquote> <p>Nowadays, the correct functioning of information systems represents a fundamental milestone for the well-being of modern economies and societies. The scientific evolution of digital, analog, and physical components with the interactions between networks created the Cyber-Physical Systems (CPS). Even though the benefits of the cyber and physical world interactions are noticeable, new security challenges have arisen: typical vulnerabilities from the cyber domain emerged in CPS. Cyber-attacks over CPS pose different security challenges. In particular, classic Information Technology (IT) cyber security tools are considered partially or totally ineffective in CPS scenarios because complex cyber-physical attacks could avoid security detection methodologies developed specifically for the IT world. The prevention, detection, and mitigation of cyber-attacks encompass both the physical and the cyber layers of a system: to this end, approaches to securing CPS consider techniques adopted in the physical domain and in the cyber space.</p> </blockquote> <blockquote> <p>Following the success of the previous editions, the IEEE International Workshop on Cyber-Physical Systems Security 2019 (CPS-Sec 2019) aims to represent a forum for researchers and practitioners from industry and academia interested in the areas of CPS security. CPS-Sec 2019 seeks novel submissions describing practical and theoretical solutions to the cyber-physical security challenges. A submission may represent any CPS domain, including embedded systems, Internet of Things (IoT), Industrial Internet of Things (IIoT), SCADA Systems, Smart-Grid Systems, Critical Infrastructure, Automotive and Transportation Systems, Medical applications.</p> </blockquote> <ul> <li>Important dates: <ul> <li>Submission Deadline: 15 March, 2019 (extended)</li> <li>Notification of Acceptance: 26 March, 2019</li> <li>Camera-Ready: 2 April, 2019</li> </ul> </li> </ul> Slides https://francozappa.github.io/slides/example/ Tue, 05 Feb 2019 00:00:00 +0000 https://francozappa.github.io/slides/example/ <h1 id="create-slides-in-markdown-with-wowchemy">Create slides in Markdown with Wowchemy</h1> <p><a href="https://wowchemy.com/" target="_blank" rel="noopener">Wowchemy</a> | <a href="https://owchemy.com/docs/managing-content/#create-slides" target="_blank" rel="noopener">Documentation</a></p> <hr> <h2 id="features">Features</h2> <ul> <li>Efficiently write slides in Markdown</li> <li>3-in-1: Create, Present, and Publish your slides</li> <li>Supports speaker notes</li> <li>Mobile friendly slides</li> </ul> <hr> <h2 id="controls">Controls</h2> <ul> <li>Next: <code>Right Arrow</code> or <code>Space</code></li> <li>Previous: <code>Left Arrow</code></li> <li>Start: <code>Home</code></li> <li>Finish: <code>End</code></li> <li>Overview: <code>Esc</code></li> <li>Speaker notes: <code>S</code></li> <li>Fullscreen: <code>F</code></li> <li>Zoom: <code>Alt + Click</code></li> <li><a href="https://github.com/hakimel/reveal.js#pdf-export" target="_blank" rel="noopener">PDF Export</a>: <code>E</code></li> </ul> <hr> <h2 id="code-highlighting">Code Highlighting</h2> <p>Inline code: <code>variable</code></p> <p>Code block:</p> <pre><code class="language-python">porridge = &quot;blueberry&quot; if porridge == &quot;blueberry&quot;: print(&quot;Eating...&quot;) </code></pre> <hr> <h2 id="math">Math</h2> <p>In-line math: $x + y = z$</p> <p>Block math:</p> <p>$$ f\left( x \right) = ;\frac{{2\left( {x + 4} \right)\left( {x - 4} \right)}}{{\left( {x + 4} \right)\left( {x + 1} \right)}} $$</p> <hr> <h2 id="fragments">Fragments</h2> <p>Make content appear incrementally</p> <pre><code>{{% fragment %}} One {{% /fragment %}} {{% fragment %}} **Two** {{% /fragment %}} {{% fragment %}} Three {{% /fragment %}} </code></pre> <p>Press <code>Space</code> to play!</p> <span class="fragment " > One </span> <span class="fragment " > **Two** </span> <span class="fragment " > Three </span> <hr> <p>A fragment can accept two optional parameters:</p> <ul> <li><code>class</code>: use a custom style (requires definition in custom CSS)</li> <li><code>weight</code>: sets the order in which a fragment appears</li> </ul> <hr> <h2 id="speaker-notes">Speaker Notes</h2> <p>Add speaker notes to your presentation</p> <pre><code class="language-markdown">{{% speaker_note %}} - Only the speaker can read these notes - Press `S` key to view {{% /speaker_note %}} </code></pre> <p>Press the <code>S</code> key to view the speaker notes!</p> <aside class="notes"> <ul> <li>Only the speaker can read these notes</li> <li>Press <code>S</code> key to view</li> </ul> </aside> <hr> <h2 id="themes">Themes</h2> <ul> <li>black: Black background, white text, blue links (default)</li> <li>white: White background, black text, blue links</li> <li>league: Gray background, white text, blue links</li> <li>beige: Beige background, dark text, brown links</li> <li>sky: Blue background, thin dark text, blue links</li> </ul> <hr> <ul> <li>night: Black background, thick white text, orange links</li> <li>serif: Cappuccino background, gray text, brown links</li> <li>simple: White background, black text, blue links</li> <li>solarized: Cream-colored background, dark green text, blue links</li> </ul> <hr> <section data-noprocess data-shortcode-slide data-background-image="/media/boards.jpg" > <h2 id="custom-slide">Custom Slide</h2> <p>Customize the slide style and background</p> <pre><code class="language-markdown">{{&lt; slide background-image=&quot;/media/boards.jpg&quot; &gt;}} {{&lt; slide background-color=&quot;#0000FF&quot; &gt;}} {{&lt; slide class=&quot;my-style&quot; &gt;}} </code></pre> <hr> <h2 id="custom-css-example">Custom CSS Example</h2> <p>Let&rsquo;s make headers navy colored.</p> <p>Create <code>assets/css/reveal_custom.css</code> with:</p> <pre><code class="language-css">.reveal section h1, .reveal section h2, .reveal section h3 { color: navy; } </code></pre> <hr> <h1 id="questions">Questions?</h1> <p><a href="https://github.com/wowchemy/wowchemy-hugo-modules/discussions" target="_blank" rel="noopener">Ask</a></p> <p><a href="https://wowchemy.com/docs/managing-content/#create-slides" target="_blank" rel="noopener">Documentation</a></p> Reversing and Attacking Google Nearby https://francozappa.github.io/project/rearby/ Sat, 02 Feb 2019 17:46:49 +0800 https://francozappa.github.io/project/rearby/ <p>In 2019 in a paper titled <a href="https://francozappa.github.io/publication/rearby/paper.pdf" target="_blank" rel="noopener">Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android</a> we uncovered issues on Nearby Connections, an proprietary Google API included in all Android devices. The API is used to provide proximity-based services using a combination of Bluetooth and Wi-Fi wireless technologies.</p> <p>We developed an open-sourced <a href="https://github.com/francozappa/REarby" target="_blank" rel="noopener">REarby</a>, a toolkit to automate reverse engineering and attacking Nearby Connections.</p> <h2 id="ndss-2019-paper-presentation">NDSS 2019 Paper Presentation</h2> <div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"> <iframe src="https://www.youtube.com/embed/h5geJLoQIsU" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe> </div> Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android https://francozappa.github.io/publication/2019/rearby/ Sat, 02 Feb 2019 00:00:00 +0000 https://francozappa.github.io/publication/2019/rearby/ NDSS 2019 camera-ready and PoC attack code https://francozappa.github.io/post/2019/ndss19-cr/ Wed, 23 Jan 2019 00:00:00 +0000 https://francozappa.github.io/post/2019/ndss19-cr/ <p>The camera-ready version of <em>Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google&rsquo;s &ldquo;Nearby Connections&rdquo; on Android</em> is available <a href="https://francozappa.github.io/publication/rearby/paper.pdf" target="_blank" rel="noopener">here</a></p> <p>We also released a <a href="https://github.com/francozappa/REarby/tree/master/poc-hostapd" target="_blank" rel="noopener">proof of concept code</a> to perform the <em>Soft AP manipulation attack</em>. The code was previously disclosed to Google. In summary, the attack allows a malicious Nearby Connections server (advertiser) to redirect a client to a malicious Internet connected access point. As a result the attacker can reconfigure the wireless network interface of the victim via DHCP and gets access to all the Wi-Fi traffic (even traffic from non Nearby Connections applications).</p> Academic day_night and search https://francozappa.github.io/post/2018/theme-daynight-search/ Sun, 02 Dec 2018 11:28:36 +0800 https://francozappa.github.io/post/2018/theme-daynight-search/ <p>Recently <a href="https://github.com/gcushen" target="_blank" rel="noopener">gcushen</a> updated <a href="https://github.com/gcushen/hugo-academic" target="_blank" rel="noopener">Academic</a> (the theme that I&rsquo;m using to build this website with <code>hugo</code>) with two useful features that I recommend to use: <code>day_night</code> and <code>search</code>.</p> <p><code>day_night</code> allows the reader to toggle light and dark color themes for the website. If you look at the top navigation bar on the right you should spot an icon with either a moon (to switch to a dark theme) or a sun (to switch to a light theme).</p> <p><code>search</code> allows to search the website using keywords such as minicps or rearby. This functionality is accessed by clicking the magnifying glass icon close to the theme switch icon or by using <code>vim</code>-like shortcuts: <code>/</code> enables search and <code>Esc</code> disables it. Currently, this functionality can be supported using built-in Fuse (client-side) or Agolia (server-side). I&rsquo;m using the first option.</p> <p>If you are browsing from a mobile device the icons can be found by tapping the global menu icon.</p> Our Paper is Accepted for NDSS 2019 https://francozappa.github.io/post/2018/ndss19/ Thu, 15 Nov 2018 00:00:00 +0000 https://francozappa.github.io/post/2018/ndss19/ <p>I&rsquo;m very happy to announce that our paper titled <em>Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google&rsquo;s &ldquo;Nearby Connections&rdquo; on Android</em> has been accepted for the <a href="https://www.ndss-symposium.org/" target="_blank" rel="noopener">The Network and Distributed System Security Symposium (NDSS)</a>. Here you can download a <a href="http://www.cs.ox.ac.uk/files/10367/ndss19-paper367.pdf" target="_blank" rel="noopener">pre-print</a>. Here is the list of <a href="https://www.ndss-symposium.org/ndss2019/accepted-papers/" target="_blank" rel="noopener">accepted papers for NDSS 2019</a> Soon I&rsquo;ll update more material such an exploit PoC code.</p> <p>Congratulations to <a href="https://www.cs.ox.ac.uk/people/kasper.rasmussen/" target="_blank" rel="noopener">Kasper</a> and <a href="https://tippenhauer.de/" target="_blank" rel="noopener">Nils</a> and thank you for the help.</p> Visiting Researcher at CISPA, University of Saarbrücken https://francozappa.github.io/post/2018/cispa-visiting/ Thu, 23 Aug 2018 11:28:36 +0800 https://francozappa.github.io/post/2018/cispa-visiting/ <p>As part of my PhD I&rsquo;ve recently joined as a visiting researcher the <a href="https://cispa.saarland/" target="_blank" rel="noopener">CISPA – Helmholtz-Zentrum, Saarbruecken</a> 🇩🇪.</p> <p>I&rsquo;m going to spend six months there, supervised by <a href="https://cispa.saarland/people/nils.tippenhauer/" target="_blank" rel="noopener">Prof. N.O. Tippenhauer</a>.</p> Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot https://francozappa.github.io/publication/2018/cpsbot-preprint/ Thu, 26 Apr 2018 00:00:00 +0000 https://francozappa.github.io/publication/2018/cpsbot-preprint/ State-Aware Anomaly Detection for Industrial Control Systems https://francozappa.github.io/publication/2018/state-anomaly-detection/ Mon, 05 Mar 2018 00:00:00 +0000 https://francozappa.github.io/publication/2018/state-anomaly-detection/ HowTo: Connect to the SUTD's eduroam using (Arch) Linux https://francozappa.github.io/post/2018/sutd-eduroam/ Sat, 27 Jan 2018 11:28:36 +0800 https://francozappa.github.io/post/2018/sutd-eduroam/ <p>After the <a href="https://francozappa.github.io/post/sutd-vpn-student/" target="_blank" rel="noopener">post about connecting to SUTD&rsquo;s VPN</a> is now time to connect eduroam! Again, SUTD&rsquo;s IT support for (Arch) Linux at the time of writing is <em>none</em>.</p> <p>SUTD runs a setup with only username-password (no certificates required) and the connection can be established using the GUI of NetworkManager. If your WiFi card is on and eduroam is in your range you should see the <code>eduroam</code> SSID on the list of the available WiFi networks. If you attempt to connect then all you need to do is enter your <code>username</code> and <code>password</code>. As usual, PhD student and staff are separated into different namespaces. Use the username <code>[email protected]</code> if you are a staff member or <code>[email protected]</code> if you are a student (<code>xxxxxxx</code> is your 7-digits student id). The password should be the same as the one you are using to connect to the Internet from SUTD.</p> <p>Your NetworkManager Wi-Fi Security screen should look like this (<code>username</code> and <code>password</code> are obscured):</p> <p> <figure > <div class="d-flex justify-content-center"> <div class="w-100" ><img src="https://francozappa.github.io/img/posts/sutd-eduroam.png" alt="SUTD eduroam" loading="lazy" data-zoomable /></div> </div></figure> </p> <p>🐧</p> HowTo: Connect to the SUTD's VPN using (Arch) Linux as a Student https://francozappa.github.io/post/2018/sutd-vpn/ Sat, 20 Jan 2018 11:28:36 +0800 https://francozappa.github.io/post/2018/sutd-vpn/ <p>I&rsquo;ve recently came across the problem of connecting to the SUTD VPN server from overseas. SUTD&rsquo;s IT support for (Arch) Linux at the time of writing is <em>none</em>, and after a bit of research I&rsquo;ve found a quick and easy solution.</p> <p>SUTD runs <em>Pulse Connect Secure (PCS)</em> server, a commercial solution known as <em>Juniper SSL VPN</em>. Luckily there is an open-source client that supports PCS named <em>OpenConnect</em>. Arch has an <code>openconnect</code> package and a NetworkManager plugin called <code>networkmanager-openconnect</code>. Install both packages trough your package manager.</p> <p>Then you can use the (user-friendly?) NetworkManager GUI to add the new VPN setup. Use the openconnect profile and all the default options (eg: no need of Realm, and Certificates). Point your <code>Gateway</code> to <code>https://sutdvpn.sutd.edu.sg/dana-na/auth/url_0/welcome.cgi</code> and your GUI screen should look like this:</p> <p> <figure > <div class="d-flex justify-content-center"> <div class="w-100" ><img src="https://francozappa.github.io/img/posts/sutd-vpn-student.png" alt="SUTD VPN Student" loading="lazy" data-zoomable /></div> </div></figure> </p> <p>Then save it and you will be prompted to accept a certificate. Once you accept it you can enter your username (student_id eg: <code>1001234</code>) and passwords (same as the <code>SUTD_Student</code> network&rsquo;s one). Once you are connected your GUI should present you a message to confirm that. You can manually check it using <code>ifconfig</code> and <code>route</code> commands. If you encounter problems try to have a look <a href="https://wiki.archlinux.org/index.php?title=Pulse_Connect_Secure&amp;mobileaction" target="_blank" rel="noopener">here</a> or post a comment below.</p> <p>P.S. Thanks to <a href="http://people.sutd.edu.sg/~nils_tippenhauer/connecting-to-sutd-vpn-from-linux/" target="_blank" rel="noopener">Nils&rsquo;s post</a> from which I&rsquo;ve started my research, this post should update it with an easier setup!</p> <p>🐧</p> Visiting Researcher at the University of Oxford https://francozappa.github.io/post/2018/oxford-visiting/ Sun, 14 Jan 2018 11:28:36 +0800 https://francozappa.github.io/post/2018/oxford-visiting/ <p>As part of my PhD I&rsquo;ve recently joined as a visiting researcher the <a href="https://www.cs.ox.ac.uk/" target="_blank" rel="noopener">Department of Computer Science, University of Oxford</a> 🇬🇧.</p> <p>I&rsquo;m going to spend around six months there, supervised by <a href="https://www.cs.ox.ac.uk/people/kasper.rasmussen/" target="_blank" rel="noopener">Prof. Kasper Rasmussen</a> and co-supervised by <a href="https://www.cs.ox.ac.uk/people/ivan.martinovic/" target="_blank" rel="noopener">Prof. Ivan Martinovic</a>.</p> <p>I&rsquo;m very excited!</p> SAC 2018 https://francozappa.github.io/post/2018/sac18/ Thu, 21 Dec 2017 11:28:36 +0800 https://francozappa.github.io/post/2018/sac18/ <p>I&rsquo;m happy to announce that our paper titled <em>State-Aware Anomaly Detection for Industrial Control Systems</em> has been accepted for the <a href="https://www.sigapp.org/sac/sac2018/" target="_blank" rel="noopener">Symposium On Applied Computing (SAC) 2018</a> conference.</p> <p>Congratulations to <a href="http://people.sutd.edu.sg/~1001407/?page_id=10&amp;lang=en" target="_blank" rel="noopener">Hamid</a>, and the co-authors!</p> Institutional Email Issue https://francozappa.github.io/post/2017/email-issues/ Sun, 26 Nov 2017 11:28:36 +0800 https://francozappa.github.io/post/2017/email-issues/ <p>For some <!-- STUpiD --> reasons my <code>[email protected]</code> email address was deactivated <em>without notice</em> sometime at the end of October 2017. Unfortunately I&rsquo;ve discovered it only this week and I&rsquo;m still trying to reactivate it. I apologize if you recently got an error message while trying to send me an email to that address.</p> <p>Please use the <code>[email protected]</code> address instead. I ❤️ ✉️</p> S317: MiniCPS Challenges https://francozappa.github.io/post/2017/minicps-s3-code/ Tue, 21 Nov 2017 14:28:36 +0800 https://francozappa.github.io/post/2017/minicps-s3-code/ <p>I recently open-sourced the code that I developed for the MiniCPS challenges for the SWaT Security Showdown (S3) event in 2017.</p> <p><a href="https://github.com/scy-phy/minicps/tree/master/examples/s3-2017" target="_blank" rel="noopener">Here</a> is the code.</p> <p>The <code>init.sh</code> contains the list of commands that I run on a local testing machine and on the remote AWS instances that we used during the event. The attackers were provided with the VPN credentials to access two different subnetworks in a <em>mixed</em> MiniCPS simulation eg: water treatment (SWaT) and water distribution (WaDI).</p> <p>The code is expecting to find the four files (flags) in the <code>/root/flags</code> folder named <code>wadi1</code>, <code>wadi2</code>, <code>flag2</code>, and <code>flag3</code>. Indeed you have to create those files and write the string flags.</p> <p>The relevant information to start and stop the challenges are in the <code>README.md</code>. In general, I like to use a <code>Makefile</code> as a launcher for the various commands. If you open the file, you will find several targets. To test the challenges locally use:</p> <pre><code>make local </code></pre> <p>Please let me know if you find any bugs or missing files.</p> MiniCPS Framework https://francozappa.github.io/project/minicps/ Tue, 07 Nov 2017 17:46:49 +0800 https://francozappa.github.io/project/minicps/ <p><a href="https://dl.acm.org/citation.cfm?id=2808715" target="_blank" rel="noopener">MiniCPS</a> is a framework that we developed to simulate/emulate Cyber-Physical Systems, including Industrial Control System. MiniCPS is open source and available on <a href="https://github.com/scy-phy/minicps" target="_blank" rel="noopener">Github</a>. The framework is build on top of <a href="http://mininet.org/" target="_blank" rel="noopener">Mininet</a>.</p> <p>We used the framework in several other projects such as the development of novel attacks (e.g., <a href="https://arxiv.org/pdf/1802.00152" target="_blank" rel="noopener">ICS botnets</a>), countermeasures (e.g., <a href="https://dl.acm.org/citation.cfm?id=2994493" target="_blank" rel="noopener">high-interaction ICS honeypots</a>), and gamified ICS security competitions (e.g., <a href="https://dl.acm.org/citation.cfm?id=3140253" target="_blank" rel="noopener">S3 ICS CTF</a>).</p> Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3 https://francozappa.github.io/publication/2017/s3/ Wed, 01 Nov 2017 00:00:00 +0000 https://francozappa.github.io/publication/2017/s3/ Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN https://francozappa.github.io/publication/2017/wifi-mimo/ Sat, 07 Oct 2017 00:00:00 +0000 https://francozappa.github.io/publication/2017/wifi-mimo/ ST Engineering Poster Award at FIRST Industry Workshop 2017 https://francozappa.github.io/post/2017/first17/ Wed, 26 Jul 2017 11:28:36 +0800 https://francozappa.github.io/post/2017/first17/ <p>I&rsquo;m happy to announce that my poster titled <a href="files/posters/cps-spc16.pdf">Towards high-interaction virtual ICS honeypots-in-a-box</a> won the <a href="https://www.stengg.com/en/electronics/" target="_blank" rel="noopener">ST Engineering</a> Poster Award at the <a href="https://gradevents.sutd.edu.sg/first/" target="_blank" rel="noopener">FIRST industry workshop</a>, held at SUTD. This is a special gift one day before my 30th birthday! Here I&rsquo;m sharing a picture from the award ceremony:</p> <p> <figure > <div class="d-flex justify-content-center"> <div class="w-100" ><img src="https://francozappa.github.io/img/posts/first17-award.jpg" alt="FIRST17 Award Ceremony" loading="lazy" data-zoomable /></div> </div></figure> </p> <p>Congratulations also to <a href="http://people.sutd.edu.sg/~1001407/?page_id=10&amp;lang=en" target="_blank" rel="noopener">Hamid</a> who won one award:</p> <p> <figure > <div class="d-flex justify-content-center"> <div class="w-100" ><img src="https://francozappa.github.io/img/posts/first17-hamid.jpg" alt="FIRST17 Hamid and Me" loading="lazy" data-zoomable /></div> </div></figure> </p> <p>and <a href="http://people.sutd.edu.sg/~eyasugetahun/" target="_blank" rel="noopener">Eyasu</a> who managed to win two awards:</p> <p> <figure > <div class="d-flex justify-content-center"> <div class="w-100" ><img src="https://francozappa.github.io/img/posts/first17-eyasu.jpg" alt="FIRST17 Eyasu and Me" loading="lazy" data-zoomable /></div> </div></figure> </p> Future of Science, Technology and Policy Workshop https://francozappa.github.io/post/2017/smart17/ Mon, 17 Jul 2017 11:28:36 +0800 https://francozappa.github.io/post/2017/smart17/ <p>Recently I was selected as a <em>mentor</em> for the cybersecurity track of the <em>Future of Science, Technology and Policy</em> Workshop, organized by <a href="https://smart.mit.edu/" target="_blank" rel="noopener">SMART</a>. I had the privilege to supervision six graduate and post-graduate colleagues with different backgrounds:</p> <ol> <li>Jukka Isohätälä from NUS (Physics and CS)</li> <li>Nikhil Mallareddy from MIT (Environmental Engineering)</li> <li>Ioannis Fousekis from ETH (EECS and Economics)</li> <li>Michael Wicki from ETH (Political sciences and Economics)</li> <li>Fabian Willibaldf rom ETH (Environmental Engineering)</li> <li>Jay Prakash from SUTD (EECS)</li> </ol> <p>I&rsquo;m presenting the summary of our activities of day 2 related to cybersecurity organized at my institution <a href="https://www.sutd.edu.sg/" target="_blank" rel="noopener">SUTD</a>:</p> <p>We started knowing about Singapore&rsquo;s Cyber-Security Agency (CSA). In particular, we were introduced to Singapore cybersecurity strategies and long-term plans.Then we heard the personal story of a cybersecurity startup founder and we discovered common and effective threats in the cybersecurity landscape. Finally, we heard two presentations from two SUTD cybersecurity professors about novel cybersecurity problems and solutions, such as cyber-physical systems, IoT and adversarial machine learning. We understood the importance of education and awareness when talking about cybersecurity.</p> <p>After lunch we visited SUTD&rsquo;s world-class cybersecurity facilites. We started from <a href="https://itrust.sutd.edu.sg/" target="_blank" rel="noopener">iTrust</a>, SUTD&rsquo;s cybersecurity research centre. iTrust covers a broad range of topics spanning from theoretical to applied cybersecurity. The range of research area covered spans from traditional computer security to domain-specific areas such as: industrial control systems, Internet of Things, and autonomous vehicles.</p> <p>iTrust in collaboration with the Singapore government and private industries has developed four state-of-the-art testbeds. Those testbed allow researchers to apply and evaluate their ideas in realistic and safe environment. We now briefly comment of each of the testbed. The Secure Water Treatment testbed is the oldest and it includes advanced sub-processes such as Ultrafiltration and Reverse Osmosis. The water treated by SWaT is one of the sources of the second oldest testbed: the Water Distribution (WaDi) testbed. WaDi is a miniaturized reproduction of a water distribution facility with six consumers tanks with independent demands patters. WaDi can be used to simulated water leakages, water-hammer attacks and water contamination. Both SWaT and WaDi can be powered by EPIC the smart grid testbed. EPIC is the newest and less-know testbed at SUTD and several researchers are actively working to evaluate it. Finally, we visited the Internet-of-Things testbed that includes an anechoic chamber to perform radio tests and several Commercial-Off-The-Shelf devices (such as IP camera, smart thermostats and smart lamps) to recreate a smart home environment.</p> <p>Overall it was a very rich experience. We understand that coming up with a cybersecurity policy is a hard problem for several independent reasons such as cross-disciplinary knowledge, funding, awareness, and education.</p> <p>Here I&rsquo;m sharing a picture with all the participants from SUTD:</p> <p> <figure > <div class="d-flex justify-content-center"> <div class="w-100" ><img src="https://francozappa.github.io/img/posts/smart17-sutd.jpg" alt="SMART SUTD" loading="lazy" data-zoomable /></div> </div></figure> </p> <p>More pictures <a href="https://www.instagram.com/explore/tags/fstp2017/" target="_blank" rel="noopener">here</a></p> Legacy-Compliant Data Authentication for Industrial Control System Traffic https://francozappa.github.io/publication/2017/legacy-authentication/ Sat, 01 Jul 2017 00:00:00 +0000 https://francozappa.github.io/publication/2017/legacy-authentication/ Towards high-interaction virtual ICS honeypots-in-a-box https://francozappa.github.io/publication/2016/honeypot/ Fri, 01 Jan 2016 00:00:00 +0000 https://francozappa.github.io/publication/2016/honeypot/ <p>This paper won the <strong>Research excellence award by ST Engineering during the FIRST workshop in 2017</strong>.</p> MiniCPS: A toolkit for security research on CPS networks https://francozappa.github.io/publication/2015/minicps/ Thu, 01 Jan 2015 00:00:00 +0000 https://francozappa.github.io/publication/2015/minicps/ Design and Testing of Random Number Generators (RNG) https://francozappa.github.io/publication/2013/master-thesis/ Tue, 01 Jan 2013 00:00:00 +0000 https://francozappa.github.io/publication/2013/master-thesis/ On-chip lightweight implementation of reduced NIST randomness test suite https://francozappa.github.io/publication/2013/nist-randomness/ Tue, 01 Jan 2013 00:00:00 +0000 https://francozappa.github.io/publication/2013/nist-randomness/ https://francozappa.github.io/admin/config.yml Mon, 01 Jan 0001 00:00:00 +0000 https://francozappa.github.io/admin/config.yml