Hit the KeyJack: stealing data from your daily wireless devices incognito - Archive ouverte HAL Access content directly
Conference Papers Year : 2016

Hit the KeyJack: stealing data from your daily wireless devices incognito

(1) , (1) , (2, 1)
1
2

Abstract

Internet of Things (IoT) is one of the most fast-growing field in high technologies nowadays. Therefore, lots of electronic devices include wireless connections with several communication protocols (WiFi, ZigBee, Sigfox, LoRa and so on). Nevertheless, designers of such components do not take care of security features most of the time while focusing on communication reliability (speed, throughput and low power consumption). As a consequence, several wireless IoT devices transmit data in plaintext creating lots of security breaches for both eavesdropping and data injection attacks. This work introduces KeyJack, a preliminary proof-of-concept of a solution aiming to eavesdrop wireless devices and hopefully perform injection attacks afterwards. KeyJack operates on widely-used devices: our keyboards! This solution is based on low-cost embedded electronics and gives an attacker or a white hat hacker the possibility to retrieve data from John Doe's computer. This work also shows that this approach could be used to any wireless device using 2.4GHz radio chips like the NRF24L01 from Nordic Semiconductor.
Fichier principal
Vignette du fichier
cesar16_fournier-et-al.pdf (2.36 Mo) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01383008 , version 1 (17-10-2016)

Licence

Attribution - NonCommercial - NoDerivatives - CC BY 4.0

Identifiers

  • HAL Id : hal-01383008 , version 1

Cite

Guillaume Fournier, Pierre Matoussowsky, Pascal Cotret. Hit the KeyJack: stealing data from your daily wireless devices incognito. Journées C&ESAR, Nov 2016, Rennes, France. ⟨hal-01383008⟩
491 View
477 Download

Share

Gmail Facebook Twitter LinkedIn More