Sneaking RFID Anuradha Jambunathan 276786 Computer Security Seminar

  • Slides: 35
Download presentation
Sneaking RFID Anuradha Jambunathan – 276786 Computer Security Seminar BIT WS 06/07 12/4/2020 Sneaking

Sneaking RFID Anuradha Jambunathan – 276786 Computer Security Seminar BIT WS 06/07 12/4/2020 Sneaking RFID-Anuradha J 1

Agenda What is RFID? n RFID vs Barcode n RFID System Architecture n Uses

Agenda What is RFID? n RFID vs Barcode n RFID System Architecture n Uses of RFID Systems n RFID Threats & Attacks n Protection Against Attacks n Conclusion n 12/4/2020 Sneaking RFID-Anuradha J 2

What is RFID ? Acronym for Radio Frequency Identification. n Automatic Identification Procedure n

What is RFID ? Acronym for Radio Frequency Identification. n Automatic Identification Procedure n RFID uses radio waves to automatically identify people or other objects. n Useful for tracking the associated object. n 12/4/2020 Sneaking RFID-Anuradha J 3

RFID Vs BARCODE n Technology Used Ø RFID - Radio Technology Ø BARCODE -

RFID Vs BARCODE n Technology Used Ø RFID - Radio Technology Ø BARCODE - Optical Technology n Line of Sight Reading Ø RFID - Doesn’t Require Line of Sight – Pass through Barriers Ø BARCODE – Requires Line of Sight reading n Efficiency Ø RFID - Multiple tags read simultaneously Ø BARCODE - One at a Time 12/4/2020 Sneaking RFID-Anuradha J 4

RFID Vs BARCODE n Storage Ø RFID Ø Large amount of Storage Ø Ability

RFID Vs BARCODE n Storage Ø RFID Ø Large amount of Storage Ø Ability to Read and Write Ø BARCODE Ø Only be Read n Cost Ø RFID is expensive compared to 12/4/2020 Sneaking RFID-Anuradha J BARCODE 5

RFID System Architecture 12/4/2020 Sneaking RFID-Anuradha J 6

RFID System Architecture 12/4/2020 Sneaking RFID-Anuradha J 6

RFID Components RFID Tag or Transponder Ø Actual data carrying device of an RFID

RFID Components RFID Tag or Transponder Ø Actual data carrying device of an RFID system. Ø Combination of Transmitter and Responder Types of RFID Tags Ø Passive Tag Ø Active Tag 12/4/2020 Sneaking RFID-Anuradha J 7

RFID Components Ø Passive RFID Tag Do not have Internal Battery Power Short Range

RFID Components Ø Passive RFID Tag Do not have Internal Battery Power Short Range Communications Read Only Tags Ø Active RFID Tag Have Own Internal Battery Long Range Communications Read/Write Tags 12/4/2020 Sneaking RFID-Anuradha J 8

RFID Components RFID Reader Ø Antenna, Transceiver and Decoder Ø Sends Signals to Query

RFID Components RFID Reader Ø Antenna, Transceiver and Decoder Ø Sends Signals to Query Tag data Ø Read or Read/Write the tags RFID Middleware Ø Data processing Ø Connects to Backend Database 12/4/2020 Sneaking RFID-Anuradha J 9

Common Uses of RFID Systems Hospitals Track Patient Location Track Expensive & Critical equipments

Common Uses of RFID Systems Hospitals Track Patient Location Track Expensive & Critical equipments Pet identification Animal Identification Purpose Control Rabies – Portugal Gov Retail stores Monitor & Control Inventory Supply Chain Management 12/4/2020 Sneaking RFID-Anuradha J 10

Common Uses of RFID Systems Traffic Monitoring Roadside RFID readers to collect signals Passports

Common Uses of RFID Systems Traffic Monitoring Roadside RFID readers to collect signals Passports The first RFID passports were issued by Malaysia in 1998 Records the travel history of entries and exists Human implants 12/4/2020 Sneaking RFID-Anuradha J 11

RFID Threats Sniffing -- Skimming of digital passports Spoofing -- SQL injection, Buffer Overflow

RFID Threats Sniffing -- Skimming of digital passports Spoofing -- SQL injection, Buffer Overflow attacks Denial of Service -- e. g. . Hospital applications 12/4/2020 Sneaking RFID-Anuradha J 12

RFID Threats Replay Attacks -- Man in the Middle Attack -- e. g. Passport

RFID Threats Replay Attacks -- Man in the Middle Attack -- e. g. Passport Readers Unwanted Tracking -- Tracking without the Knowledge 12/4/2020 Sneaking RFID-Anuradha J 13

Real World Scenarios n In Retail Stores Ø Attacker purchase product that has RFID

Real World Scenarios n In Retail Stores Ø Attacker purchase product that has RFID tag attached Ø Writes a virus in Blank RFID Tag Ø Attaches the Virus Tag to the product Ø Whole Product database system is infected 12/4/2020 Sneaking RFID-Anuradha J 14

Real World Scenarios n In Pet Ø Pet with RFID Tag attached Ø Writes

Real World Scenarios n In Pet Ø Pet with RFID Tag attached Ø Writes a virus in Pet RFID Tag Ø Asks for Pet Scan Ø Database system is infected Ø Newly-tagged animals also infected 12/4/2020 Sneaking RFID-Anuradha J 15

Real World Scenarios n In Airport Baggage system Ø Baggage handling Systems with RFID

Real World Scenarios n In Airport Baggage system Ø Baggage handling Systems with RFID tags Ø Easier to read at greater distances Ø Virus Tag attached to baggage Ø Whole Database system is infected Ø E. g. Smugglers or terrorists to hide their baggage 12/4/2020 Sneaking RFID-Anuradha J 16

RFID Passports n Advantages Ø Avoid human errors by immigration officials Ø Efficiency of

RFID Passports n Advantages Ø Avoid human errors by immigration officials Ø Efficiency of processing passenger data Ø Safeguard against counterfeit passports n Problems n Skimming n Eavesdropping 12/4/2020 Sneaking RFID-Anuradha J 17

Problems with RFID Systems n Lots of Source Code Ø RFID tags – Power

Problems with RFID Systems n Lots of Source Code Ø RFID tags – Power constraint Ø RFID middleware – Millions of Code Ø Software Bugs n Generic Protocols and Facilities Ø RFID middleware on existing internet architecture Ø Internet attacks 12/4/2020 Sneaking RFID-Anuradha J 18

Problems with RFID Systems n Back-End Databases Ø Data Collection Centre – Core Part

Problems with RFID Systems n Back-End Databases Ø Data Collection Centre – Core Part Ø Critical part of the RFID system Ø Databases have their own unique attacks n High-Value Data Ø Extremely confidential Data Ø Eg. Data on e-passports Ø Harms tagged real-world objects n False Sense of Security 12/4/2020 Sneaking RFID-Anuradha J 19

RFID-Based Exploits RFID tags directly exploits back-end RFID Middleware n Manipulation of less than

RFID-Based Exploits RFID tags directly exploits back-end RFID Middleware n Manipulation of less than 1 K bits of on-tag RFID data can exploit security holes in RFID middleware n RFID Middleware attacks requires more cleverness than resources 12/4/2020 Sneaking RFID-Anuradha J 20

RFID Attacks The Main types of RFID Exploits : ØSQL Injection Attack ØBuffer Overflow

RFID Attacks The Main types of RFID Exploits : ØSQL Injection Attack ØBuffer Overflow Attack ØCode Insertion Attack 12/4/2020 Sneaking RFID-Anuradha J 21

SQL Injection Attack “A SQL Injection attack is a form of attack that comes

SQL Injection Attack “A SQL Injection attack is a form of attack that comes from user input that has not been checked to see that it is valid. The objective is to fool the database system into running malicious code that will reveal sensitive information” RFID tag written with a virus, can attack the backend database used by the RFID middleware n It may be possible to trigger the database into executing SQL code that is stored on the tag. This process is referred to as SQL injection 12/4/2020 Sneaking RFID-Anuradha J 22

SQL Injection Attack Once a virus, worm, or other malware has entered the database,

SQL Injection Attack Once a virus, worm, or other malware has entered the database, subsequent tags written from the database may be infected and the problem may spread. n Example: Airport Baggage System Attack Which uses the RFID tag attached to the baggage n 12/4/2020 Sneaking RFID-Anuradha J 23

SQL Injection Attack Ø Suppose the airport middleware has a template for queries

SQL Injection Attack Ø Suppose the airport middleware has a template for queries "Look up the next flight to " where is the airport code written on the tag when the bag was checked in. Ø The middleware then builds a query from the fetched data. Ø Suppose the bag has a bogus tag with data "LHR; shutdown“ 12/4/2020 Sneaking RFID-Anuradha J 24

SQL Injection Attack n Incorrectly filtered escape characters “This form of SQL injection attack

SQL Injection Attack n Incorrectly filtered escape characters “This form of SQL injection attack takes place when the user input data is not properly filtered for escape characters and is directly passed on into the SQL query” Example: Stmt: = “SELECT * FROM users WHERE name = “’+ username + ’”; ” The Above SQL Stmt can cause problems in Authentication systems 12/4/2020 Sneaking RFID-Anuradha J 25

Buffer Overflow Attack “A buffer overflow is an anomalous condition where a process attempts

Buffer Overflow Attack “A buffer overflow is an anomalous condition where a process attempts to store data beyond the boundaries of a fixed length buffer. ” Ø Results Writing extra information or executable code on adjacent memory locations. Ø The overwritten data may include other buffers, variables and program flow data. 12/4/2020 Sneaking RFID-Anuradha J 26

Buffer Overflow - Causes Improper use of languages such as C or C++ that

Buffer Overflow - Causes Improper use of languages such as C or C++ that are considered to be non memory-safe. Ø Functions without bounds checking like strcpy, strlen, gets etc Ø Functions with null termination problems like strncpy, strncat etc Ø User- created functions with pointer bugs Ø 12/4/2020 Sneaking RFID-Anuradha J 27

Buffer Overflow Attack - Example Ø Attacker entering intentionally longer data than actually allocated

Buffer Overflow Attack - Example Ø Attacker entering intentionally longer data than actually allocated in the Buffer Example in RFID system Suppose an application uses 128 -byte tags Attacker tries to use a 512 -byte fake tag or an even larger one Buffer Overflow Attack 12/4/2020 Sneaking RFID-Anuradha J 28

Exploitations of Buffer Overflow Classified as : ØStack - Based exploitation ØHeap - Based

Exploitations of Buffer Overflow Classified as : ØStack - Based exploitation ØHeap - Based exploitation 12/4/2020 Sneaking RFID-Anuradha J 29

Exploitations of Buffer Overflow Stack - Based exploitation Ø Manipulate the program by overwriting

Exploitations of Buffer Overflow Stack - Based exploitation Ø Manipulate the program by overwriting a local variable or Return address on the stack Heap - Based exploitation Ø Generally do not contain return addresses such as the stack Ø Overwrite internal structures such as linked list and pointers 12/4/2020 Sneaking RFID-Anuradha J 30

Code Insertion Attack Malicious code injected into an application by an attacker, using any

Code Insertion Attack Malicious code injected into an application by an attacker, using any of scripting languages like VBScript, Java. Script, Perl etc Special Characters in Input data like <>. '%; )(&+Inserting malicious URLs 12/4/2020 Sneaking RFID-Anuradha J 31

Protect against RFID Attacks Code review Ø Rigorous Code Review of Middleware Code Bounds

Protect against RFID Attacks Code review Ø Rigorous Code Review of Middleware Code Bounds checking Ø Proper bounds checking either by programmer or compiler Ø Right choice of programming language Ø This Prevents against buffer Overflow attacks 12/4/2020 Sneaking RFID-Anuradha J 32

Protect against RFID Attacks Parameter binding Ø Ø Ø Use Stored procedures Bound parameters

Protect against RFID Attacks Parameter binding Ø Ø Ø Use Stored procedures Bound parameters using the PREPARE statement are not treated as a value Prevents against SQL Injection Attack Sanitize the input Ø Use built-in data sanitizing available functions Limit Database Permissions Ø Ø Ø Offer limited rights Tables should be made read-only or inaccessible The execution of multiple SQL statements in a single query. 12/4/2020 Sneaking RFID-Anuradha J 33

Conclusion We have Discussed Ø RFID in General Ø RFID Attacks Ø Prevention solutions

Conclusion We have Discussed Ø RFID in General Ø RFID Attacks Ø Prevention solutions “Talking barcodes that change our lives” BBC NEWS 12/4/2020 Sneaking RFID-Anuradha J 34

Danke Schön 12/4/2020 Sneaking RFID-Anuradha J 35

Danke Schön 12/4/2020 Sneaking RFID-Anuradha J 35