Paper 2017/584
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
Luka Malisa, Kari Kostiainen, Thomas Knell, David Sommer, and Srdjan Capkun
Abstract
We describe novel, adaptive user interface attacks, where the adversary attaches a small device to the interface that connects user input peripherals to the target system. The device executes the attack when the authorized user is performing safety-, or security-critical operations, by modifying or blocking user input, or injecting new events. Although the adversary fully controls the user input channel, to succeed he needs to overcome a number of challenges, including the inability to directly observe the state of the user interface and avoiding being detected by the legitimate user. We present new techniques that allow the adversary to do user interface state estimation and fingerprinting, and thus attack a new range of scenarios that previous UI attacks do not apply to. We evaluate our attacks on two different types of platforms: e-banking on general-purpose PCs, and dedicated medical terminals. Our evaluation shows that such attacks can be implemented efficiently, are hard for the users to detect, and would lead to serious violations of input integrity.
Metadata
- Available format(s)
- Publication info
- Published by the IACR in CHES 2017
- Contact author(s)
-
luka malisa @ inf ethz ch
kari kostiainen @ inf ethz ch - History
- 2017-06-20: received
- Short URL
- https://ia.cr/2017/584
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/584, author = {Luka Malisa and Kari Kostiainen and Thomas Knell and David Sommer and Srdjan Capkun}, title = {Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/584}, year = {2017}, url = {https://eprint.iacr.org/2017/584} }