L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing
@article{Park2022L2FuzzDB, title={L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing}, author={Haram Park and Carlos Nkuba Kayembe and Seunghoon Woo and Heejo Lee}, journal={2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)}, year={2022}, pages={343-354} }
Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) is a wireless technology used in billions of devices. Recently, several Bluetooth fuzzing studies have been conducted to detect vulnerabilities in Bluetooth devices, but they fall short of effectively generating malformed packets. In this paper, we propose L2FUZZ, a stateful fuzzer to detect vulnerabilities in Bluetooth BR/EDR Logical Link Control and Adaptation Protocol (L2CAP) layer. By selecting valid commands for each state and mutating only…
Figures and Tables from this paper
References
SHOWING 1-10 OF 44 REFERENCES
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets
- Computer ScienceUSENIX Security Symposium
- 2020
The potential of Frankenstein, a fuzzing framework based on advanced firmware emulation, is demonstrated by finding three zero-click vulnerabilities in the Broadcom and Cypress Bluetooth stack, which is used in most Apple devices, many Samsung smartphones, the Raspberry Pis, and many others.
SweynTooth: Unleashing Mayhem over Bluetooth Low Energy
- Computer ScienceUSENIX Annual Technical Conference
- 2020
A systematic and comprehensive testing framework, which, as an automated and general-purpose approach, can effectively fuzz any BLE protocol implementation, and calls a bunch of vulnerabilities as SWEYNTOOTH, which highlights the efficacy of the framework.
ToothPicker: Apple Picking in the iOS Bluetooth Stack
- Computer ScienceWOOT @ USENIX Security Symposium
- 2020
This paper builds the iOS in-process fuzzer ToothPicker and evaluates the implementation security of Apple’s Bluetooth protocols, finding a zero-click Remote Code Execution (RCE) that was fixed in iOS 13.5 and simple crashes.
BlueMirror: Reflections on Bluetooth Pairing and Provisioning Protocols
- Computer Science2021 IEEE Security and Privacy Workshops (SPW)
- 2021
It is shown that reflection attacks are possible against various pairing modes of BLE and Bluetooth Classic and several vulnerabilities in Bluetooth Mesh provisioning are uncovered, ranging from reflection attacks to cryptographic weaknesses.
Analysis of the packet transferring in L2CAP layer of Bluetooth v2.x+EDR
- Business2008 International Conference on Information and Automation
- 2008
This paper proposes a packet selection strategy in baseband layer to achieve the maximum throughput for L2CAP basic mode in different channel SNRs and applies it to transfer L2 CAP PDUs by 3-DH5 baseband packet for L 2CAP retransmission mode.
Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes
- Computer ScienceIEEE Access
- 2022
This paper presents VFUZZ, a protocol-aware blackbox fuzzing framework for quickly assessing vulnerabilities in Z-Wave devices, which assesses the target device capabilities and encryption support to guide seed selection and tests the target for new vulnerability discovery.
BIAS: Bluetooth Impersonation AttackS
- Computer Science2020 IEEE Symposium on Security and Privacy (SP)
- 2020
It is shown that the Bluetooth specification contains vulnerabilities enabling to perform impersonation attacks during secure connection establishment, including the lack of mandatory mutual authentication, overly permissive role switching, and an authentication procedure downgrade.
NFDFuzz: A Stateful Structure-Aware Fuzzer for Named Data Networking
- Computer ScienceICN
- 2020
In this work, the design of the NFD fuzzer is presented and an overview of its most salient implementation details are provided, to be effective and aware of the packet structure and the rules governing the NDN wire protocol.
BlueMaster: Bypassing and Fixing Bluetooth-based Proximity Authentication
- Computer Science
- 2019
The security pitfalls of Bluetooth-based proximity authentication is presented, and a method for analyzing the (in)security of the device proximity authentication methods is constructed and a vulnerability detection tool is released to help developers eliminate potential vulnerabilities.
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices
- Computer ScienceNDSS
- 2018
It is demonstrated that memory corruptions, a common class of security vulnerabilities, often result in different behavior on embedded devices than on desktop systems, reducing significantly the effectiveness of traditional dynamic testing techniques in general, and fuzzing in particular.