SlideShare a Scribd company logo
1 of 25
SensCrypt: A Secure Protocol for
Managing Low Power Fitness Trackers
Mahmudur Rahman
Bogdan Carbunar, Umut Topkara
1February 3, 2015
Social Sensor Networks
2
wear
Trackers
User
Social sensor
networks
Concerns
 Social sensor networks collect massive personal data
 Source of privacy and security concerns
 Information inferred :
 Locations visited
 Times of user fitness activities
 Times when the user is not at home [PRM]
 Company organizational profiles [TKS13]
[PRM] Please Rob Me. http://www://pleaserobme.com/.
[TSK13] Michael Kota Tsubouchi, Ryoma Kawajiri, and Masamichi Shimosaka. Working
relationship detection from fitbit sensor data. In Proceedings of the UbiComp ’13
Adjunct, pages 115–118, 2013. 3
System Model
4
(a) (b)
System components: (a) Fitbit and (b) Garmin
Adversary Model
5
 Inspect attack
 Listen on system communications
 Inject attack
 Modify, inject, jam system communications
 Capture attack
 Acquire trackers or bases of victims
 Launch other attacks (e.g., Inspect and Inject)
 JTAG attack
 Capture attack +
 Access the memory of captured devices
This Work
 Demonstrate vulnerabilities in the storage and
transmission of fitness data
 Develop tools to attack Fitbit Ultra and Garmin
Forerunner
 SensCrypt: Secure tracker data storage and transmission
6
Vulnerabilities
7
 Fitbit: cleartext login information
 Fitbit and Garmin: cleartext http data processing
 Garmin: faulty authentication during pairing
 Tracker does not authenticate the base
This Work
 Demonstrate vulnerabilities in the storage and
transmission of fitness data
 Develop tools to attack Fitbit Ultra and Garmin
Forerunner
 SensCrypt: Secure tracker data storage and transmission
8
Data Capture (TPDC) attack
9
TPDC outcome on Garmin which includes both GPS
coordinates, heart rate, speed and cadence
 Attack takes less than 13s on both Fitbit and Garmin
Injection (TI) attacks
10
TI outcome on Fitbit. The daily step count is unreasonably
high (167116 steps)
 Attack takes less than 18s on both Fitbit and Garmin
User Account Injection (UAI) attack
11Unreasonable daily step counts (12M+) in Fitbit
 Attack takes only 6s on average
This Work
 Demonstrate vulnerabilities in the storage and
transmission of fitness data
 Develop tools to attack Fitbit Ultra and Garmin
Forerunner
 SensCrypt: Secure tracker data storage and transmission
12
SensCrypt Architecture
13
Encrypted
sensor data
Storage Connectivity
Keys
Authentication
Tracker Base Webserver
Connectivity
Connectivity
Map
Authentication
Data Decoding
RecordData operation
14
Record i
Record i
1. T generates EKT (ctr, i)
2. T xors D[i] with EKT (ctr, i) and EKW (ctr, i)
mem[i] = D[i] EKT (ctr, i) EKW (ctr, i)
Tracker Memory Organization
15
F(KW, 1, i)
clean
F(KW, 1, n). . .
end(a)
start
F(KW, 2, 1) . . . F(KW, 2, i-1) F(KW, 1, i)) F(KW, 1, n)). . .
end
(b)
(a) After (i-1) records have been written
F(KW, 1, 1) . . . F(KW, 1, i-1)
start/clean
encData[1] . . . encData[i-1]
start/dirty
(b) After Upload occurs at state in (a)
Clean/dirty
Upload operation (Extension of Fitbit protocol)
16
1a. [SEND, Beacon]
6b. [TRQ-DATA, tracker id, fitness data]
.....
7b. [WRITE, tracker id, opcode]
7c. [WRITE, Data]
7a. [WRITE, tracker id, opcode]
.....
TRQ − DATA, idT, mem[dirty…clean]
WRITE, idT, EKT(ctr + 1, EKW(ctr + 1, i))
WRITE, idT, EKT(ctr + 1, EKW(ctr + 1, i))
Tracker T Base B
Webserver W
6a. [READ-TRQ, tracker id, opcode]
Sens.io Platform
17
 Prototype tracker:
 Arduino Uno Rev3
 External Bluetooth shield
 SanDisk card shield
Only $52
FitCrypt vs SensCrypt
18
Solutions Fitbit Garmin
SensCrypt 6.02 6.06
FitCrypt-RSA 2300 2300
FitCrypt-ECC 2520 2520
RecordData computation overhead in ms
RecordData:
 SensCrypt is 2-3 orders of magnitude more efficient
19
SensCrypt is 12 times faster than FitCrypt
FitCrypt vs SensCrypt (Cont.)
Solutions T W Communication
SensCrypt 502.13 190.4 153
FitCrypt (Fitbit) 904.56 177.36 162
FitCrypt (Garmin) 9366 322 1686
Upload:
SensCrypt is twice faster than Fitbit’s Upload protocol
Upload computation overhead in ms
Conclusions
20
 Demonstrated vulnerabilities in tracker from Fitbit
and Garmin
 Launched Inspect, Capture, Injection and JTAG-R
attacks
 Presented SensCrypt for secure fitness data storage
and transmission
 Developed cost efficient Sens.io tracker platform
21
Questions ? mrahm004@fiu.edu
22
Extra Slides
SensCrypt properties
23
 Ensure even wear of tracker memory
 No storage overhead on trackers
 Prevent JTAG-R, inspect attack, capture attacks and
also man-in-the-middle and replay attacks
 User friendly: The user is never involved
Reverse Engineering
24
Fitbit Upload
protocol
Garmin Pairing Procedure
25

More Related Content

Similar to SensCrypt.v5

ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiKuniyasu Suzaki
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Amazon Web Services
 
Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...NUS-ISS
 
Cutting-Edge Network Behavior Audit Technology from BMST
Cutting-Edge Network Behavior Audit Technology from BMSTCutting-Edge Network Behavior Audit Technology from BMST
Cutting-Edge Network Behavior Audit Technology from BMSTBMST
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Jason Shen
 
クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用Cybozucommunity
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018Ryu Yamashita
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018JOYZO
 
Internet of Things - Technicals
Internet of Things - TechnicalsInternet of Things - Technicals
Internet of Things - TechnicalsAndri Yadi
 
Edge intelligence slide share
Edge intelligence slide shareEdge intelligence slide share
Edge intelligence slide shareBit Stew Systems
 
Отчет Audit report RAPID7
 Отчет Audit report RAPID7 Отчет Audit report RAPID7
Отчет Audit report RAPID7Sergey Yrievich
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor FiorimTI Safe
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataJames Sirota
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijripublishers Ijri
 

Similar to SensCrypt.v5 (20)

Fit and Vulnerable
Fit and VulnerableFit and Vulnerable
Fit and Vulnerable
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
 
Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...
 
DDS Secure Intro
DDS Secure IntroDDS Secure Intro
DDS Secure Intro
 
Cutting-Edge Network Behavior Audit Technology from BMST
Cutting-Edge Network Behavior Audit Technology from BMSTCutting-Edge Network Behavior Audit Technology from BMST
Cutting-Edge Network Behavior Audit Technology from BMST
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
 
クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
 
Internet of Things - Technicals
Internet of Things - TechnicalsInternet of Things - Technicals
Internet of Things - Technicals
 
Edge intelligence slide share
Edge intelligence slide shareEdge intelligence slide share
Edge intelligence slide share
 
Отчет Audit report RAPID7
 Отчет Audit report RAPID7 Отчет Audit report RAPID7
Отчет Audit report RAPID7
 
Report PAPID 7
Report PAPID 7Report PAPID 7
Report PAPID 7
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
Cerita
CeritaCerita
Cerita
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
 
IOT Forensics
IOT ForensicsIOT Forensics
IOT Forensics
 

Recently uploaded

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

SensCrypt.v5

  • 1. SensCrypt: A Secure Protocol for Managing Low Power Fitness Trackers Mahmudur Rahman Bogdan Carbunar, Umut Topkara 1February 3, 2015
  • 3. Concerns  Social sensor networks collect massive personal data  Source of privacy and security concerns  Information inferred :  Locations visited  Times of user fitness activities  Times when the user is not at home [PRM]  Company organizational profiles [TKS13] [PRM] Please Rob Me. http://www://pleaserobme.com/. [TSK13] Michael Kota Tsubouchi, Ryoma Kawajiri, and Masamichi Shimosaka. Working relationship detection from fitbit sensor data. In Proceedings of the UbiComp ’13 Adjunct, pages 115–118, 2013. 3
  • 4. System Model 4 (a) (b) System components: (a) Fitbit and (b) Garmin
  • 5. Adversary Model 5  Inspect attack  Listen on system communications  Inject attack  Modify, inject, jam system communications  Capture attack  Acquire trackers or bases of victims  Launch other attacks (e.g., Inspect and Inject)  JTAG attack  Capture attack +  Access the memory of captured devices
  • 6. This Work  Demonstrate vulnerabilities in the storage and transmission of fitness data  Develop tools to attack Fitbit Ultra and Garmin Forerunner  SensCrypt: Secure tracker data storage and transmission 6
  • 7. Vulnerabilities 7  Fitbit: cleartext login information  Fitbit and Garmin: cleartext http data processing  Garmin: faulty authentication during pairing  Tracker does not authenticate the base
  • 8. This Work  Demonstrate vulnerabilities in the storage and transmission of fitness data  Develop tools to attack Fitbit Ultra and Garmin Forerunner  SensCrypt: Secure tracker data storage and transmission 8
  • 9. Data Capture (TPDC) attack 9 TPDC outcome on Garmin which includes both GPS coordinates, heart rate, speed and cadence  Attack takes less than 13s on both Fitbit and Garmin
  • 10. Injection (TI) attacks 10 TI outcome on Fitbit. The daily step count is unreasonably high (167116 steps)  Attack takes less than 18s on both Fitbit and Garmin
  • 11. User Account Injection (UAI) attack 11Unreasonable daily step counts (12M+) in Fitbit  Attack takes only 6s on average
  • 12. This Work  Demonstrate vulnerabilities in the storage and transmission of fitness data  Develop tools to attack Fitbit Ultra and Garmin Forerunner  SensCrypt: Secure tracker data storage and transmission 12
  • 13. SensCrypt Architecture 13 Encrypted sensor data Storage Connectivity Keys Authentication Tracker Base Webserver Connectivity Connectivity Map Authentication Data Decoding
  • 14. RecordData operation 14 Record i Record i 1. T generates EKT (ctr, i) 2. T xors D[i] with EKT (ctr, i) and EKW (ctr, i) mem[i] = D[i] EKT (ctr, i) EKW (ctr, i)
  • 15. Tracker Memory Organization 15 F(KW, 1, i) clean F(KW, 1, n). . . end(a) start F(KW, 2, 1) . . . F(KW, 2, i-1) F(KW, 1, i)) F(KW, 1, n)). . . end (b) (a) After (i-1) records have been written F(KW, 1, 1) . . . F(KW, 1, i-1) start/clean encData[1] . . . encData[i-1] start/dirty (b) After Upload occurs at state in (a) Clean/dirty
  • 16. Upload operation (Extension of Fitbit protocol) 16 1a. [SEND, Beacon] 6b. [TRQ-DATA, tracker id, fitness data] ..... 7b. [WRITE, tracker id, opcode] 7c. [WRITE, Data] 7a. [WRITE, tracker id, opcode] ..... TRQ − DATA, idT, mem[dirty…clean] WRITE, idT, EKT(ctr + 1, EKW(ctr + 1, i)) WRITE, idT, EKT(ctr + 1, EKW(ctr + 1, i)) Tracker T Base B Webserver W 6a. [READ-TRQ, tracker id, opcode]
  • 17. Sens.io Platform 17  Prototype tracker:  Arduino Uno Rev3  External Bluetooth shield  SanDisk card shield Only $52
  • 18. FitCrypt vs SensCrypt 18 Solutions Fitbit Garmin SensCrypt 6.02 6.06 FitCrypt-RSA 2300 2300 FitCrypt-ECC 2520 2520 RecordData computation overhead in ms RecordData:  SensCrypt is 2-3 orders of magnitude more efficient
  • 19. 19 SensCrypt is 12 times faster than FitCrypt FitCrypt vs SensCrypt (Cont.) Solutions T W Communication SensCrypt 502.13 190.4 153 FitCrypt (Fitbit) 904.56 177.36 162 FitCrypt (Garmin) 9366 322 1686 Upload: SensCrypt is twice faster than Fitbit’s Upload protocol Upload computation overhead in ms
  • 20. Conclusions 20  Demonstrated vulnerabilities in tracker from Fitbit and Garmin  Launched Inspect, Capture, Injection and JTAG-R attacks  Presented SensCrypt for secure fitness data storage and transmission  Developed cost efficient Sens.io tracker platform
  • 23. SensCrypt properties 23  Ensure even wear of tracker memory  No storage overhead on trackers  Prevent JTAG-R, inspect attack, capture attacks and also man-in-the-middle and replay attacks  User friendly: The user is never involved

Editor's Notes

  1. Before jumping into the system model, let’s discuss the adversary model at first. We assume that … and does not collude with attackers.
  2. The goal of this research work was to significantly extend the state-of-the-art approaches to (detect)……
  3. The goal of this research work was to significantly extend the state-of-the-art approaches to (detect)……
  4. The goal of this research work was to significantly extend the state-of-the-art approaches to (detect)……