sok security evaluation of home based iot deployments
play

SoK: Security Evaluation of Home-based IoT Deployments Omar Alrawi - PowerPoint PPT Presentation

SoK: Security Evaluation of Home-based IoT Deployments Omar Alrawi , Chaz Lever, Fabian Monrose, Manos Antonakakis 1 2 Alexa, unlock the front door. 3 Internet of Things 4 5 Prior Work Security Analysis of Emerging Smart Home


  1. SoK: Security Evaluation of Home-based IoT Deployments Omar Alrawi , Chaz Lever, Fabian Monrose, Manos Antonakakis 1

  2. 2

  3. Alexa, unlock the front door. 3

  4. Internet of Things 4

  5. 5

  6. Prior Work • Security Analysis of Emerging Smart Home Applications • DolphinAttack: Inaudible Voice Commands • Soteria: Automated IoT Safety and Security Analysis • Skill Squatting Attacks on Amazon Alexa • Rethinking Access Control and Authentication for the Home Internet of Things 6

  7. • Cloud endpoints • Exposed services • Mobile App Wouldn’t be nice to • Network know • Consumer report evaluation? 7

  8. Overview of Prior Work Studied Components Mitigations Unexplored Directions Devices Patching bugs Mobile app Cloud integration services Vendor responsibility Cloud services Network (by association) Network discovery protocols User control and visibility 8

  9. Device Mobile App IoT Components Cloud Endpoints Network 9

  10. Evaluating Off The Shelf Devices • Evaluation of IoT devices should be: • Objective • Transparent • Measurable • Reproducible • Device Representation • Media devices vs appliances • Easy to understand • Consumer oriented 10

  11. Lab Setup 11

  12. IoT Lab Evaluation Device UPnP services RCE vulnerability • Internet pairing CVE-2012-5958-65 Dropbear SSH RCE vulnerability • Configuration CVE-2013-4863 • Updateable • Exposed services • Vulnerable Services 12

  13. IoT Lab Evaluation • 12 different backends, 1 st Party Cloud Backends • Supports SSL v2/v3 • CVE-2013-4810 – RCE JBoss Server • Types of cloud backends • 1 st , 3 rd , or hybrid • TLS/SSL • Self-signed • Name mismatch • Vulnerable TLS/SSL version • Insecure protocols • Vulnerable software • Services 13

  14. IoT Lab Evaluation Mobile App • Permissions • Requested unused • Programming errors • Incorrect use of crypto • Hardcoded secrets • API keys for cloud services • Hardcoded Crypto key • uLi4/f4+Pb39.T19 • UMENG_MESSAGE_SECRET: … 14

  15. IoT Lab Evaluation Network • Protocols in use • Insecure Protocols • Custom Protocols • Encryption between • Device to Cloud • Device to Mobile App • Mobile App to Cloud • MITM Attack on • Device to Cloud • Partial Encryption Across the Internet • Device to Mobile App • No Encryption on the LAN • Mobile App to Cloud 15

  16. Scoring The Components Scorecard Rating Independent system components scoring Documented Modular 16

  17. Component Framework 17

  18. 18

  19. 19

  20. Evaluation Takeaways • Cloud managed • Auto update • Encrypted local traffic with authenticated services 20

  21. 21 What's Next? • Longitudinal analysis • Do updates improve the Things? • Accurate representation • Inducing device activities

  22. How Can You Access/Contribute? • Evaluation data is public • Feel free to reach out: • Request specific device evaluation • Sponsor devices for evaluation • Additional questions • Download our data • https://YourThings.info • Contact email: • contact@YourThings.info 22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend