论文标题
邪恶永远不会睡觉:关闭iPhone后无线恶意软件停留
Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones
论文作者
论文摘要
关闭iPhone时,大多数无线芯片都会保留。例如,在用户启动的关闭时,iPhone可以通过查找我的网络保持位置。如果电池电量较低,则iPhone会自动关闭并进入动力储备模式。但是,用户仍然可以访问其钱包中的信用卡,学生通行证和其他物品。我们分析Apple如何实现这些独立的无线功能,在iOS不运行时工作并确定其安全界限。在最近的iPhone上,蓝牙,近距离通信(NFC)和超宽带(UWB)在关闭电源后保持运行,并且所有三个无线芯片都可以直接访问安全元素。作为一个实用的示例,这对安全意味着什么,我们证明了将恶意软件加载到iPhone关闭时执行的蓝牙芯片上的可能性。
When an iPhone is turned off, most wireless chips stay on. For instance, upon user-initiated shutdown, the iPhone remains locatable via the Find My network. If the battery runs low, the iPhone shuts down automatically and enters a power reserve mode. Yet, users can still access credit cards, student passes, and other items in their Wallet. We analyze how Apple implements these standalone wireless features, working while iOS is not running, and determine their security boundaries. On recent iPhones, Bluetooth, Near Field Communication (NFC), and Ultra-wideband (UWB) keep running after power off, and all three wireless chips have direct access to the secure element. As a practical example what this means to security, we demonstrate the possibility to load malware onto a Bluetooth chip that is executed while the iPhone is off.