SlideShare a Scribd company logo
1 of 26
Mahmudur Rahman, Bogdan Carbunar, Madhusudan Banik
HotPETs`13
 Motivation
 Background & System Model
 Reverse Engineering
 Fitbit Communication Protocol
 FitBite: Attacking Fitbit
 FitLock: Protecting Fitbit
 Analysis
 Experiments
 Emergence of social sensor networks (SSN)
 SSN- source of significant privacy and security issues
 Health insurance companies are moving toward
providing discounts to customers that use trackers to
prove a healthy lifestyle [1].
The tracker mainly consists of four IC chips:
 (i) a MMA7341L 3-axis MEMS accelerometer,
 (ii) a MSP430F2618 low power TI MCU consisting of 92 KB
of flash and 96 KB of RAM,
 (iii) a nRF24API 2.4 GHz RF chip supporting the ANT
protocol (1 Mbits/sec, 15 ft transmission range),
 (iv) a MEMS altimeter to count the number of floors climbed.
 The base: a bridge between trackers and the online social network.
 Trackers communicate to bases over ANT
 ANT is 2.4 GHz bidirectional wireless Personal Area Network
(PAN) communications technology optimized for transferring low-
data rate, low-latency data between multiple ANT-enabled devices.
 Two types of attackers:
(i) External attackers
(ii) Insiders
 Our assumption: Fitbit service (e.g. the webserver) does not
collude with attackers.
 Relied on information from libfitbit [6] for open source health
hardware access.
 Used Service Logs which is stored in cleartext files to understand
the functionality of Fitbit.
 Implemented a USB based filter Driver that separately logs the
data flowing to and from the base.
Memory Banks
 Two types: Read banks and Write banks.
 During the upload session, the webserver reads data from 6 memory
banks, writes on 2 banks and clears data from 5 banks.
 Read bank #1: stores the daily user fitness records.
 Write bank #0 stores 64 bytes concerning the device settings as
specified on the user’s Fitbit account.
 Write bank #1 stores 16 bytes that contain the daily user fitness records
Opcodes and Responses
 The communication is embedded in XML blocks that contain base64
encoded opcodes – commands for the tracker.
 Opcodes are 7 bytes long.
 Retrieve device information (TRQ-REQ): opcode [0x24, 000000].
 Read/write tracker memory (READ-TRQ): Read opcode [0x22,
index, 00000] and Write opcode [0x23, index, datalen,0000].
 Erase memory: (ERASE): opcode [0x25, index, t, 0].
 Successful Response: opcode [0x41, 000000].
Tracker Base Fitbit WebServer
1a. [SEND, Beacon]
1b. [PING, Tracker],[ESTABLISH, Link]
2. [BS-INFO, Client id, Platform data]
3. [TRQ-REQ, tracker id, opcode]
4a. [TRQ-REQ, tracker id, opcode]
4b. [TRQ-INFO, tracker id, tracker info]
5. [READ-TRQ, tracker id, opcode]
6a. [READ-TRQ, tracker id, opcode]
6b. [TRQ-DATA, tracker id, fitness data]
(Cont…)
Tracker Base Fitbit WebServer
8b. [ERASE, tracker id, opcode]
10. [CLOSE, connection]
9. [CLEAR, response]
11. [SLEEP, beacon]
7a. [WRITE, tracker id, opcode]
7b. [WRITE, tracker id, opcode]
7c. [WRITE, Data]
8a. [ERASE, tracker id, opcode]
8c. [ERASE, Data]
 Two modules: The Base module and the tracker module.
 The Base Module (BM) is used to retrieve data from the
tracker, inject false values and upload them into the account of
the corresponding user on the webserver.
 The Tracker Module (TM) is used to read and write the
tracker data.
 Tracker Private Data Capture (TPDC).
 Tracker Injection (TI) Attack.
 User Account Injection (UAI) Attack.
 Free Badges
 Free Financial Awards
Earndit points and available gift cards
Battery drain for three operation modes
Battery Depletion Attack
The BindTrackerUser protocol
UploadData Protocol
 REQ ∈ {TRQ-REQ, READ-TRQ, WRITE, ERASE, CLOSE}
 RESP ∈ {TRQ-INFO, TRQ-DATA, CLEAR}
TrackerFitbit WebServer
idT, EskT (REQ, Swst, Cws)
idT, EskT (RESP, Swst, CT )
 Claim #1: Without physical access to the tracker, an attacker
cannot hijack the tracker during the BindTrackerUser
procedure.
 Claim#2: FitLock prevents Battery Depletion attack.
Snapshot of Testbed for FitLock
(a) (b)
Fig:(a) Encryption time overhead on Xperia. (b) Decryption time
overhead on webserver (Dell laptop).
 FitLock adds an overhead of 37ms, accounting for 2.4.% of Fitbit’s
time.
In current work, we
 Studied security and privacy issues of Fitbit.
 Developed FitBite to launch both passive and active attacks on
Fitbit.
 Proposed FitLock, a Fitbit extension that defends against FitBite.
 Implemented FitLock and shown that FitLock introduces a
negligible end-to-end overhead on Fitibit (2.4%).
 [1] Cotton Delo. Insurance Giant WellPoint Commits to Facebook With Fitness
Tracker. AdAge digital, 2012.
 [2] FitBite and FitLock: Attacks and defenses on Fitbit Tracker.
http://users.cis.fiu.edu/~mrahm004/fitlock.
 [3] Ant message protocol and usage.
http://www.sparkfun.com/datasheets/Wireless/Nordic/ANT-UserGuide.pdf.
 [4] Fitbit. http://fitbit.com/.
 [5] Earndit: We reward you for exercising. http://earndit.com/.
 [6] OpenYou libfitbit. https://github.com/openyou/libfitbit/
Fit and Vulnerable

More Related Content

Similar to Fit and Vulnerable

Tank water level & monitoring solution based on the STM32L476 MCU
Tank water level & monitoring solution based on the STM32L476 MCUTank water level & monitoring solution based on the STM32L476 MCU
Tank water level & monitoring solution based on the STM32L476 MCUJulio César Carrasquel
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyeSAT Journals
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiKuniyasu Suzaki
 
Chapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptxChapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptx40NehaPagariya
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSHASHANK WANKHADE
 
Smart automatic petrol pump system based on internet of things
Smart automatic petrol pump system based on internet of things Smart automatic petrol pump system based on internet of things
Smart automatic petrol pump system based on internet of things IJECEIAES
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
 
Industrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningVEDLIoT Project
 
18CS44-MES-Module3-ppt.pdf
18CS44-MES-Module3-ppt.pdf18CS44-MES-Module3-ppt.pdf
18CS44-MES-Module3-ppt.pdfMohd Saifudeen
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guideSigfox
 
Introduction to trace viewer
Introduction to trace viewerIntroduction to trace viewer
Introduction to trace viewerLaura Villarreal
 
Embedded systems class notes
Embedded systems  class notes Embedded systems  class notes
Embedded systems class notes Dr.YNM
 
On-line IDACS for Embedded Real Time Application
On-line IDACS for Embedded Real Time ApplicationOn-line IDACS for Embedded Real Time Application
On-line IDACS for Embedded Real Time ApplicationAM Publications
 

Similar to Fit and Vulnerable (20)

SensCrypt.v5
SensCrypt.v5SensCrypt.v5
SensCrypt.v5
 
Tank water level & monitoring solution based on the STM32L476 MCU
Tank water level & monitoring solution based on the STM32L476 MCUTank water level & monitoring solution based on the STM32L476 MCU
Tank water level & monitoring solution based on the STM32L476 MCU
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technology
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
 
Chapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptxChapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptx
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
Smart automatic petrol pump system based on internet of things
Smart automatic petrol pump system based on internet of things Smart automatic petrol pump system based on internet of things
Smart automatic petrol pump system based on internet of things
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 
Industrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine Learning
 
Micro controller
Micro controllerMicro controller
Micro controller
 
18CS44-MES-Module3-ppt.pdf
18CS44-MES-Module3-ppt.pdf18CS44-MES-Module3-ppt.pdf
18CS44-MES-Module3-ppt.pdf
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guide
 
Intel core i5
Intel core i5Intel core i5
Intel core i5
 
ATS SmartFR
ATS SmartFRATS SmartFR
ATS SmartFR
 
Ijetr042175
Ijetr042175Ijetr042175
Ijetr042175
 
Introduction to trace viewer
Introduction to trace viewerIntroduction to trace viewer
Introduction to trace viewer
 
Embedded systems class notes
Embedded systems  class notes Embedded systems  class notes
Embedded systems class notes
 
6
66
6
 
On-line IDACS for Embedded Real Time Application
On-line IDACS for Embedded Real Time ApplicationOn-line IDACS for Embedded Real Time Application
On-line IDACS for Embedded Real Time Application
 

Recently uploaded

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 

Recently uploaded (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Fit and Vulnerable

  • 1. Mahmudur Rahman, Bogdan Carbunar, Madhusudan Banik HotPETs`13
  • 2.  Motivation  Background & System Model  Reverse Engineering  Fitbit Communication Protocol  FitBite: Attacking Fitbit  FitLock: Protecting Fitbit  Analysis  Experiments
  • 3.  Emergence of social sensor networks (SSN)  SSN- source of significant privacy and security issues  Health insurance companies are moving toward providing discounts to customers that use trackers to prove a healthy lifestyle [1].
  • 4.
  • 5. The tracker mainly consists of four IC chips:  (i) a MMA7341L 3-axis MEMS accelerometer,  (ii) a MSP430F2618 low power TI MCU consisting of 92 KB of flash and 96 KB of RAM,  (iii) a nRF24API 2.4 GHz RF chip supporting the ANT protocol (1 Mbits/sec, 15 ft transmission range),  (iv) a MEMS altimeter to count the number of floors climbed.
  • 6.  The base: a bridge between trackers and the online social network.  Trackers communicate to bases over ANT  ANT is 2.4 GHz bidirectional wireless Personal Area Network (PAN) communications technology optimized for transferring low- data rate, low-latency data between multiple ANT-enabled devices.
  • 7.  Two types of attackers: (i) External attackers (ii) Insiders  Our assumption: Fitbit service (e.g. the webserver) does not collude with attackers.
  • 8.  Relied on information from libfitbit [6] for open source health hardware access.  Used Service Logs which is stored in cleartext files to understand the functionality of Fitbit.  Implemented a USB based filter Driver that separately logs the data flowing to and from the base.
  • 9. Memory Banks  Two types: Read banks and Write banks.  During the upload session, the webserver reads data from 6 memory banks, writes on 2 banks and clears data from 5 banks.  Read bank #1: stores the daily user fitness records.  Write bank #0 stores 64 bytes concerning the device settings as specified on the user’s Fitbit account.  Write bank #1 stores 16 bytes that contain the daily user fitness records
  • 10. Opcodes and Responses  The communication is embedded in XML blocks that contain base64 encoded opcodes – commands for the tracker.  Opcodes are 7 bytes long.  Retrieve device information (TRQ-REQ): opcode [0x24, 000000].  Read/write tracker memory (READ-TRQ): Read opcode [0x22, index, 00000] and Write opcode [0x23, index, datalen,0000].  Erase memory: (ERASE): opcode [0x25, index, t, 0].  Successful Response: opcode [0x41, 000000].
  • 11. Tracker Base Fitbit WebServer 1a. [SEND, Beacon] 1b. [PING, Tracker],[ESTABLISH, Link] 2. [BS-INFO, Client id, Platform data] 3. [TRQ-REQ, tracker id, opcode] 4a. [TRQ-REQ, tracker id, opcode] 4b. [TRQ-INFO, tracker id, tracker info] 5. [READ-TRQ, tracker id, opcode] 6a. [READ-TRQ, tracker id, opcode] 6b. [TRQ-DATA, tracker id, fitness data] (Cont…)
  • 12. Tracker Base Fitbit WebServer 8b. [ERASE, tracker id, opcode] 10. [CLOSE, connection] 9. [CLEAR, response] 11. [SLEEP, beacon] 7a. [WRITE, tracker id, opcode] 7b. [WRITE, tracker id, opcode] 7c. [WRITE, Data] 8a. [ERASE, tracker id, opcode] 8c. [ERASE, Data]
  • 13.  Two modules: The Base module and the tracker module.  The Base Module (BM) is used to retrieve data from the tracker, inject false values and upload them into the account of the corresponding user on the webserver.  The Tracker Module (TM) is used to read and write the tracker data.
  • 14.  Tracker Private Data Capture (TPDC).  Tracker Injection (TI) Attack.
  • 15.  User Account Injection (UAI) Attack.
  • 16.  Free Badges  Free Financial Awards Earndit points and available gift cards
  • 17. Battery drain for three operation modes Battery Depletion Attack
  • 19. UploadData Protocol  REQ ∈ {TRQ-REQ, READ-TRQ, WRITE, ERASE, CLOSE}  RESP ∈ {TRQ-INFO, TRQ-DATA, CLEAR} TrackerFitbit WebServer idT, EskT (REQ, Swst, Cws) idT, EskT (RESP, Swst, CT )
  • 20.  Claim #1: Without physical access to the tracker, an attacker cannot hijack the tracker during the BindTrackerUser procedure.  Claim#2: FitLock prevents Battery Depletion attack.
  • 21. Snapshot of Testbed for FitLock
  • 22. (a) (b) Fig:(a) Encryption time overhead on Xperia. (b) Decryption time overhead on webserver (Dell laptop).
  • 23.  FitLock adds an overhead of 37ms, accounting for 2.4.% of Fitbit’s time.
  • 24. In current work, we  Studied security and privacy issues of Fitbit.  Developed FitBite to launch both passive and active attacks on Fitbit.  Proposed FitLock, a Fitbit extension that defends against FitBite.  Implemented FitLock and shown that FitLock introduces a negligible end-to-end overhead on Fitibit (2.4%).
  • 25.  [1] Cotton Delo. Insurance Giant WellPoint Commits to Facebook With Fitness Tracker. AdAge digital, 2012.  [2] FitBite and FitLock: Attacks and defenses on Fitbit Tracker. http://users.cis.fiu.edu/~mrahm004/fitlock.  [3] Ant message protocol and usage. http://www.sparkfun.com/datasheets/Wireless/Nordic/ANT-UserGuide.pdf.  [4] Fitbit. http://fitbit.com/.  [5] Earndit: We reward you for exercising. http://earndit.com/.  [6] OpenYou libfitbit. https://github.com/openyou/libfitbit/