Skip to main content

2021 | OriginalPaper | Buchkapitel

Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems

verfasst von : Gennaro Avitabile, Daniele Friolo, Ivan Visconti

Erschienen in: Applied Cryptography and Network Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this work we show that an adversary can attack the integrity of contact tracing systems based on Google-Apple Exposure Notifications (GAEN) by leveraging blockchain technology. We show that through smart contracts there can be an on-line market where infected individuals interested in monetizing their status can upload to the servers of the GAEN-based systems some keys (i.e., TEKs) chosen by a non-infected adversary. In particular, the infected individual can anonymously and digitally trade the upload of TEKs without a mediator and without running risks of being cheated. This vulnerability can therefore be exploited to generate large-scale fake exposure notifications of at-risk contacts with serious consequences (e.g., jeopardizing parts of the health system, affecting results of elections, imposing the closure of schools, hotels or factories).
As main contribution, we design a smart contract with two collateral deposits that works, in general, on GAEN-based systems. We then also suggest the design of a more sophisticated smart contract, using DECO, that could be used to attack in a different way GAEN-based systems (i.e., this second smart contract can succeed even in case GAEN systems are repaired making ineffective the first smart contract).
Our work shows how to realize with GAEN-based systems (in particular with Immuni and SwissCovid), the terrorist attack to decentralized contact tracing systems envisioned by Vaudenay.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
EU eHealth Network: European Proximity Tracing. An Interoperability Architecture https://​lasec.​epfl.​ch/​people/​vaudenay/​swisscovid/​swisscovid-ana.​pdf.
 
2
For example, metadata include information useful to estimate the distance among the smartphones which clearly impacts on estimating the risk of a contact.
 
3
Google: Exposure Notification Reference Key Server https://​google.​github.​io/​exposure-notifications-server/​.
 
4
Sometimes for brevity we will just say GAEN systems.
 
6
Obviously, the smart contract can be adjusted so that, in case the buyer does not give his approval and the seller shows that she completed successfully her part of the contract, the expensive transactions costs due to the lack of help from the buyer are charged to the wallet of the buyer. A simple way to realize this could be asking for an additional deposit made by the buyer which could clearly cover the transaction costs of the seller in case the buyer does not give his approval and the seller shows that she successfully completed the upload procedure.
 
8
In GAEN, depending on the particular application, this time may amount to up 14 days if the adversary colludes with the authorities, and to one day assuming TEKs are properly mixed and anonymized prior to publication.
 
11
Indeed, see the case of UK that tried to develop a system without GAEN but had to give up https://​www.​bbc.​com/​news/​technology-53095336.
 
13
COVID-19 by itself caused a global economic crisis which led to lower wages and job losses. More details at https://​en.​wikipedia.​org/​wiki/​COVID-19_​recession.
 
14
The maximum number of TEKs that can be uploaded in one shot depends on the particular contact tracing system.
 
16
The one we used for signature verification is available at https://​github.​com/​tdrerup/​elliptic-curve-solidity.
 
17
The cost of 45000 of gas includes TEK extraction, hashing of the export file for signature verification, checking if the stored TEKs are in the extracted ones. To simplify the gas evaluation, we assume that \(\mathcal {B} \) stores only one TEK in the contract.
 
18
The infected person also commits a violation by allowing the injection of fake TEKs.
 
19
10 requirements for the evaluation of “Contact Tracing" apps https://​www.​ccc.​de/​en/​updates/​2020/​contact-tracing-requirements.
 
24
In Paparazzi attack, through passive antennas one can link pseudonyms used by an infected user tracing him over the duration of a TEK or for more days if the TEKs are linked. Therefore leaving open the possibility to link such data to a person’s real identity would be extremely incautious.
 
25
In this analysis, we refer only to contact tracing system data and messages exchanged via the blockchain during the execution of the attack. We do not take into account border-line situations as, for example, the case where there is only a single infected individual. We also ignore additional information that may help investigators figuring out who the seller is, for example how the money are spent after the trade.
 
26
Once a contact tracing system handles his public key to Google, it can completely rely on GAEN APIs to perform signature verification without storing the public key in clear to the app source code (see https://​developers.​google.​com/​android/​exposure-notifications/​exposure-key-file-format for more details).
 
27
Keeping a private state inside a smart contract is not possible and computationally intensive operations generate high costs.
 
29
Interestingly, in June the timeout of a TLS session with both Immuni and SwissCovid upload servers was limited to 5 min, but it has been then extended to two hours.
 
31
This can be inferred from the communication. For example, as in SwissCovid (see SwissCovid Server Controller: https://​github.​com/​DP-3T/​dp3t-sdk-backend/​blob/​a730a5b276591e5c​c8b6c609e2b0ba29​c6069eb6/​dpppt-backend-sdk/​dpppt-backend-sdk-ws/​src/​main/​java/​org/​dpppt/​backend/​sdk/​ws/​controller/​GaenController.​java), \(\mathsf {S}\) may reply \(\mathcal {P} \) with either a success message such as “200 OK" or an error message.
 
32
During the chunk splitting, some TEKs may be cut in half. The smart contract should take care of the first and the last bits of each chunk and reconstruct the missing information.
 
33
This change occurred in the 4th export file.
 
Literatur
1.
Zurück zum Zitat Auerbach, B., et al.: Inverse-sybil attacks in automated contact tracing. In: Proceedings of CT-RSA. volume to appear (2021) Auerbach, B., et al.: Inverse-sybil attacks in automated contact tracing. In: Proceedings of CT-RSA. volume to appear (2021)
2.
Zurück zum Zitat Avitabile, G., Friolo, D., Visconti, I.: Tenk-u: terrorist attacks for fake exposure notifications in contact tracing systems. IACR Cryptol. ePrint Arch. 2020, 1150 (2020) Avitabile, G., Friolo, D., Visconti, I.: Tenk-u: terrorist attacks for fake exposure notifications in contact tracing systems. IACR Cryptol. ePrint Arch. 2020, 1150 (2020)
3.
Zurück zum Zitat Baumgärtner, L., et al.: Mind the GAP: security and privacy risks of contact tracing apps. In: TrustCom 2020, Security Track, pp. 458–467 (2020) Baumgärtner, L., et al.: Mind the GAP: security and privacy risks of contact tracing apps. In: TrustCom 2020, Security Track, pp. 458–467 (2020)
4.
Zurück zum Zitat Dehaye, P., Reardon, J.: Proximity tracing in an ecosystem of surveillance capitalism. CoRR abs/2009.06077 (2020) Dehaye, P., Reardon, J.: Proximity tracing in an ecosystem of surveillance capitalism. CoRR abs/2009.06077 (2020)
5.
Zurück zum Zitat Dehaye, P., Reardon, J.: Swisscovid: a critical analysis of risk assessment by swiss authorities. CoRR abs/2006.10719 (2020) Dehaye, P., Reardon, J.: Swisscovid: a critical analysis of risk assessment by swiss authorities. CoRR abs/2006.10719 (2020)
6.
Zurück zum Zitat Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: the second-generation onion router. In: USENIX, pp. 303–320 (2004) Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: the second-generation onion router. In: USENIX, pp. 303–320 (2004)
9.
Zurück zum Zitat Iovino, V., Vaudenay, S., Vuagnoux, M.: On the effectiveness of time travel to inject Covid-19 alerts. In: Proceedings of CT-RSA. volume to appear (2021) Iovino, V., Vaudenay, S., Vuagnoux, M.: On the effectiveness of time travel to inject Covid-19 alerts. In: Proceedings of CT-RSA. volume to appear (2021)
12.
Zurück zum Zitat Leith, D.J., Farrell, S.: Coronavirus contact tracing: evaluating the potential of using bluetooth received signal strength for proximity detection. Comput. Commun. Rev. 50(4), 66–74 (2020)CrossRef Leith, D.J., Farrell, S.: Coronavirus contact tracing: evaluating the potential of using bluetooth received signal strength for proximity detection. Comput. Commun. Rev. 50(4), 66–74 (2020)CrossRef
16.
Zurück zum Zitat Nadahalli, T., Khabbazian, M., Wattenhofer, R.: Timelocked bribing. In: Financial Cryptography. volume to appear (2021) Nadahalli, T., Khabbazian, M., Wattenhofer, R.: Timelocked bribing. In: Financial Cryptography. volume to appear (2021)
21.
Zurück zum Zitat Tang, Q.: Privacy-preserving contact tracing: current solutions and open questions. CoRR abs/2004.06818 (2020) Tang, Q.: Privacy-preserving contact tracing: current solutions and open questions. CoRR abs/2004.06818 (2020)
23.
Zurück zum Zitat Vaudenay, S.: Analysis of DP3T. IACR Cryptol. ePrint Arch. 2020, 399 (2020) Vaudenay, S.: Analysis of DP3T. IACR Cryptol. ePrint Arch. 2020, 399 (2020)
24.
Zurück zum Zitat Vaudenay, S.: Centralized or decentralized? the contact tracing dilemma. IACR Cryptol. ePrint Arch. 2020, 531 (2020) Vaudenay, S.: Centralized or decentralized? the contact tracing dilemma. IACR Cryptol. ePrint Arch. 2020, 531 (2020)
29.
Zurück zum Zitat Zhang, F., Cecchetti, E., Croman, K., Juels, A., Shi, E.: Town crier: an authenticated data feed for smart contracts. In: ACM CCS (2016) Zhang, F., Cecchetti, E., Croman, K., Juels, A., Shi, E.: Town crier: an authenticated data feed for smart contracts. In: ACM CCS (2016)
30.
Zurück zum Zitat Zhang, F., Maram, D., Malvai, H., Goldfeder, S., Juels, A.: DECO: liberating web data using decentralized oracles for TLS. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) Proceedings of CCS 2020, pp. 1919–1938. ACM (2018) Zhang, F., Maram, D., Malvai, H., Goldfeder, S., Juels, A.: DECO: liberating web data using decentralized oracles for TLS. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) Proceedings of CCS 2020, pp. 1919–1938. ACM (2018)
Metadaten
Titel
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems
verfasst von
Gennaro Avitabile
Daniele Friolo
Ivan Visconti
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-78372-3_9