Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.4.719

Unlocking Shared Bike System by Exploiting an Application Log  

Cho, Junwan (Samsung Electronics)
Lee, Jeeun (KAIST)
Kim, Kwangjo (KAIST)
Abstract
Recently, there has been a growing market for shared mobility businesses that share 'transport' such as cars and bikes, and many operators offer a variety of services. However, if the fare can not be charged normally because of security vulnerability, the operator can not continue the business. So there should be no security loopholes. However, there is a lack of awareness and research on shared mobility security. In this paper, we analyzed security vulnerabilities exposed in application log of shared bike service in Korea. We could easily obtain the password of the bike lock and the encryption key of the AES-128 algorithm through the log, and confirmed the data generation process for unlocking using software reverse engineering. It is shown that the service can be used without charge with a success rate of 100%. This implies that the importance of security in shared mobility business and new security measures are needed.
Keywords
Shared bike; Dockless bike sharing system; Analyzing application log; Reverse engineering;
Citations & Related Records
연도 인용수 순위
  • Reference
1 SOCAR, "socar" https://www.socar.kr/, Apr. 2019.
2 Green Car, "green car" https://www.greencar.co.kr/, Apr. 2019.
3 Seoul Bike, "seoul bike" https://www.bikeseoul.com/, Apr. 2019.
4 Mobike, "mobike" https://mobike.com/kr/, Apr. 2019.
5 KICKGOING, "kickgoing" https://kickgoing.io/, Apr. 2019.
6 Mengting Wang, "Share Bike Use of Chinese Consumers," Master Thesis, Seoul National University, Feb. 2018.
7 Bluetooth SIG. Bluetooth Core Specification Version 5.1 [Internet]. Available: https://www.bluetooth.com/ko-kr/specifications/bluetooth-core-specification/, Apr. 2019.
8 Online Domain Tools, "online domain tools" http://aes.online-domain-tools.com/, Apr. 2019.
9 APK Decompile Online, "apk decompile online" https://www.apkdecompilers.com/, Apr. 2019.
10 IETF, "Internet Security Glossary," https://tools.ietf.org/html/rfc2828, Apr. 2019.
11 Google Play, "nrf connect for mobile" https://play.google.com/store/apps/details?id=no.nordicsemi.android.mcp&hl=ko, Apr. 2019.