SoK: Security Evaluation of Home-based IoT Deployments Omar Alrawi - - PowerPoint PPT Presentation

sok security evaluation of home based iot deployments
SMART_READER_LITE
LIVE PREVIEW

SoK: Security Evaluation of Home-based IoT Deployments Omar Alrawi - - PowerPoint PPT Presentation

SoK: Security Evaluation of Home-based IoT Deployments Omar Alrawi , Chaz Lever, Fabian Monrose, Manos Antonakakis 1 2 Alexa, unlock the front door. 3 Internet of Things 4 5 Prior Work Security Analysis of Emerging Smart Home


slide-1
SLIDE 1

SoK: Security Evaluation

  • f Home-based IoT

Deployments

1

Omar Alrawi, Chaz Lever, Fabian Monrose, Manos Antonakakis

slide-2
SLIDE 2

2

slide-3
SLIDE 3

Alexa, unlock the front door.

3

slide-4
SLIDE 4

Internet of Things

4

slide-5
SLIDE 5

5

slide-6
SLIDE 6

Prior Work

  • Security Analysis of Emerging Smart Home

Applications

  • DolphinAttack: Inaudible Voice Commands
  • Soteria: Automated IoT Safety and Security

Analysis

  • Skill Squatting Attacks on Amazon Alexa
  • Rethinking Access Control and Authentication for

the Home Internet of Things

6

slide-7
SLIDE 7

Wouldn’t be nice to know

  • Cloud endpoints
  • Exposed services
  • Mobile App
  • Network
  • Consumer report evaluation?

7

slide-8
SLIDE 8

Overview of Prior Work

Studied Components

Devices Cloud integration services Network (by association)

Mitigations

Patching bugs Vendor responsibility

Unexplored Directions

Mobile app Cloud services Network discovery protocols User control and visibility

8

slide-9
SLIDE 9

IoT Components

9

Device Mobile App Cloud Endpoints Network

slide-10
SLIDE 10

Evaluating Off The Shelf Devices

  • Evaluation of IoT devices should be:
  • Objective
  • Transparent
  • Measurable
  • Reproducible
  • Device Representation
  • Media devices vs appliances
  • Easy to understand
  • Consumer oriented

10

slide-11
SLIDE 11

Lab Setup

11

slide-12
SLIDE 12

IoT Lab Evaluation Device

  • Internet pairing
  • Configuration
  • Updateable
  • Exposed services
  • Vulnerable Services

12

UPnP services RCE vulnerability CVE-2012-5958-65 Dropbear SSH RCE vulnerability CVE-2013-4863

slide-13
SLIDE 13

IoT Lab Evaluation Cloud Backends

  • Types of cloud backends
  • 1st, 3rd, or hybrid
  • TLS/SSL
  • Self-signed
  • Name mismatch
  • Vulnerable TLS/SSL version
  • Insecure protocols
  • Vulnerable software
  • Services

13

  • 12 different backends, 1st Party
  • Supports SSL v2/v3
  • CVE-2013-4810 – RCE JBoss Server
slide-14
SLIDE 14

IoT Lab Evaluation Mobile App

  • Permissions
  • Requested unused
  • Programming errors
  • Incorrect use of crypto
  • Hardcoded secrets
  • API keys for cloud services

14

  • Hardcoded Crypto key
  • uLi4/f4+Pb39.T19
  • UMENG_MESSAGE_SECRET: …
slide-15
SLIDE 15

IoT Lab Evaluation Network

  • Protocols in use
  • Insecure Protocols
  • Custom Protocols
  • Encryption between
  • Device to Cloud
  • Device to Mobile App
  • Mobile App to Cloud
  • MITM Attack on
  • Device to Cloud
  • Device to Mobile App
  • Mobile App to Cloud

15

  • Partial Encryption Across the Internet
  • No Encryption on the LAN
slide-16
SLIDE 16

Scoring The Components

Scorecard system Rating components Independent scoring Modular Documented

16

slide-17
SLIDE 17

17

Component Framework

slide-18
SLIDE 18

18

slide-19
SLIDE 19

19

slide-20
SLIDE 20

Evaluation Takeaways

  • Cloud managed
  • Auto update
  • Encrypted local traffic

with authenticated services

20

slide-21
SLIDE 21

What's Next?

21

  • Longitudinal analysis
  • Do updates improve the Things?
  • Accurate representation
  • Inducing device activities
slide-22
SLIDE 22

How Can You Access/Contribute?

  • Evaluation data is public
  • Feel free to reach out:
  • Request specific device evaluation
  • Sponsor devices for evaluation
  • Additional questions
  • Download our data
  • https://YourThings.info
  • Contact email:
  • contact@YourThings.info

22