Skip to main content

Session Replication Attack Through QR Code Sniffing in Passkey CTAP Registration

  • Conference paper
  • First Online:
ICT Systems Security and Privacy Protection (SEC 2024)

Abstract

Passkey is an authentication method to supplement passwords and leverages the open standard fast identity online (FIDO) and public key cryptography technology to ensure security. In this study, we uncover vulnerabilities within the Passkey registration process by employing the FIDO client to authenticator protocol (CTAP) method using a PC and an authenticator. We emphasize the risks of unauthorized individuals exploiting vulnerabilities in Chromium-based browsers to initiate concurrent registration processes, register their own Passkeys instead of legitimate users’, and the lack of registration success acknowledgment from the server to the authenticator. Considering these vulnerabilities, we implement a session replication attack, which is a local attack, through QR code sniffing during Passkey CTAP registration, and employed physical proximity and Wi-Fi jamming attacks within the Passkey registration process. We elucidate methods that enable these attacks and categorize the attack scenarios based on the smartphone of the victim. Our experimental results indicate a notable success rate for attackers, exceeding 87% for victims with Android phones and more than 67% success for victims with iPhones. We disclosed the vulnerabilities identified in Chromium-based browsers to Google.

Supported by the Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No. 2021-0-00511, Robust AI and Distributed Attack Detection for Edge AI Security and No. 2021-0-00565, Development of User identity certification and management technology for self-sovereign identity applications).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Android Source: Mac randomization behavior. https://source.android.com/docs/core/connect/wifi-mac-randomization-behavior

  2. Apple Developer: Meet passkeys - wwdc22. https://developer.apple.com/videos/play

  3. Apple Developer: Passkeys. https://developer.apple.com/passkeys/

  4. Apple Developer: Question about passkey fido ctap protocol. https://developer.apple.com/forums/thread/727059

  5. Hardwear.io: Bluetooth le link layer relay attacks (2022). https://hardwear.io/netherlands-2022/presentation/bluetooth-LE-link-layer-relay-attacks.pdf

  6. Martin, J., et al.: A study of mac address randomization in mobile devices and when it fails. arXiv preprint arXiv:1703.02874 (2017)

  7. Milliken, J., Selis, V., Yap, K.M., Marshall, A.: Impact of metric selection on wireless deauthentication dos attack performance. IEEE Wireless Commu. Lett. 2(5), 571–574 (2013)

    Article  Google Scholar 

  8. Papapanagiotou, I., Nahum, E.M., Pappas, V.: Smartphones vs. laptops: comparing web browsing behavior and the implications for caching. In: Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, pp. 423–424 (2012)

    Google Scholar 

  9. Pearman, S., et al.: Let’s go in for a closer look: observing passwords in their natural habitat. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 295–310. CCS 2017, Association for Computing Machinery, New York, NY, USA (2017). https://doi.org/10.1145/3133956.3133973

  10. Qian, C., Koo, H., Oh, C., Kim, T., Lee, W.: Slimium: debloating the chromium browser with feature subsetting. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 461–476. CCS 2020, Association for Computing Machinery, New York, NY, USA (2020). https://doi.org/10.1145/3372297.3417866

  11. Staat, P., Jansen, K., Zenger, C., Elders-Boll, H., Paar, C.: Analog physical-layer relay attacks with application to bluetooth and phase-based ranging. In: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 60–72 (2022)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daeseon Choi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, D., Kim, S., Ryu, G., Choi, D. (2024). Session Replication Attack Through QR Code Sniffing in Passkey CTAP Registration. In: Pitropakis, N., Katsikas, S., Furnell, S., Markantonakis, K. (eds) ICT Systems Security and Privacy Protection. SEC 2024. IFIP Advances in Information and Communication Technology, vol 710. Springer, Cham. https://doi.org/10.1007/978-3-031-65175-5_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-65175-5_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-65174-8

  • Online ISBN: 978-3-031-65175-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics