sok security evaluation
play

SoK: Security Evaluation of Home-based IoT Deployments Omar Alrawi - PowerPoint PPT Presentation

SoK: Security Evaluation of Home-based IoT Deployments Omar Alrawi , Chaz Lever, Fabian Monrose, Manos Antonakakis 1 2 Alexa, unlock the front door. 3 Internet of Things 4 Internet of Things 4 Internet of Things 4 Internet of Things


  1. SoK: Security Evaluation of Home-based IoT Deployments Omar Alrawi , Chaz Lever, Fabian Monrose, Manos Antonakakis 1

  2. 2

  3. Alexa, unlock the front door. 3

  4. Internet of Things 4

  5. Internet of Things 4

  6. Internet of Things 4

  7. Internet of Things 4

  8. Internet of Things 4

  9. Internet of Things 4

  10. Internet of Things 4

  11. Internet of Things 4

  12. 5

  13. Prior Work 6

  14. Prior Work • Security Analysis of Emerging Smart Home Applications 6

  15. Prior Work • Security Analysis of Emerging Smart Home Applications • DolphinAttack: Inaudible Voice Commands 6

  16. Prior Work • Security Analysis of Emerging Smart Home Applications • DolphinAttack: Inaudible Voice Commands • Soteria: Automated IoT Safety and Security Analysis 6

  17. Prior Work • Security Analysis of Emerging Smart Home Applications • DolphinAttack: Inaudible Voice Commands • Soteria: Automated IoT Safety and Security Analysis • Skill Squatting Attacks on Amazon Alexa 6

  18. Prior Work • Security Analysis of Emerging Smart Home Applications • DolphinAttack: Inaudible Voice Commands • Soteria: Automated IoT Safety and Security Analysis • Skill Squatting Attacks on Amazon Alexa • Rethinking Access Control and Authentication for the Home Internet of Things 6

  19. Wouldn ’ t be nice to know

  20. • Cloud endpoints Wouldn ’ t be nice to know

  21. • Cloud endpoints • Exposed services Wouldn ’ t be nice to know

  22. • Cloud endpoints • Exposed services • Mobile App Wouldn ’ t be nice to know

  23. • Cloud endpoints • Exposed services • Mobile App Wouldn ’ t be nice to • Network know

  24. • Cloud endpoints • Exposed services • Mobile App Wouldn ’ t be nice to • Network know • Consumer report evaluation?

  25. Overview of Prior Work Studied Components Mitigations Unexplored Directions Devices Patching bugs Mobile app Cloud integration services Vendor responsibility Cloud services Network (by association) Network discovery protocols User control and visibility 8

  26. Device Mobile App IoT Components Cloud Endpoints Network 9

  27. Evaluating Off The Shelf Devices 10

  28. Evaluating Off The Shelf Devices • Evaluation of IoT devices should be: • Objective • Transparent • Measurable • Reproducible 10

  29. Evaluating Off The Shelf Devices • Evaluation of IoT devices should be: • Objective • Transparent • Measurable • Reproducible • Device Representation • Media devices vs appliances 10

  30. Evaluating Off The Shelf Devices • Evaluation of IoT devices should be: • Objective • Transparent • Measurable • Reproducible • Device Representation • Media devices vs appliances • Easy to understand • Consumer oriented 10

  31. Lab Setup 11

  32. IoT Lab Evaluation Device 12

  33. IoT Lab Evaluation Device • Internet pairing 12

  34. IoT Lab Evaluation Device • Internet pairing • Configuration 12

  35. IoT Lab Evaluation Device • Internet pairing • Configuration • Updateable 12

  36. IoT Lab Evaluation Device • Internet pairing • Configuration • Updateable • Exposed services 12

  37. IoT Lab Evaluation Device • Internet pairing • Configuration • Updateable • Exposed services • Vulnerable Services 12

  38. IoT Lab Evaluation Device UPnP services RCE vulnerability • Internet pairing CVE-2012-5958-65 Dropbear SSH RCE vulnerability • Configuration CVE-2013-4863 • Updateable • Exposed services • Vulnerable Services 12

  39. IoT Lab Evaluation Cloud Backends 13

  40. IoT Lab Evaluation Cloud Backends • Types of cloud backends • 1 st , 3 rd , or hybrid 13

  41. IoT Lab Evaluation Cloud Backends • Types of cloud backends • 1 st , 3 rd , or hybrid • TLS/SSL • Self-signed • Name mismatch • Vulnerable TLS/SSL version 13

  42. IoT Lab Evaluation Cloud Backends • Types of cloud backends • 1 st , 3 rd , or hybrid • TLS/SSL • Self-signed • Name mismatch • Vulnerable TLS/SSL version • Insecure protocols 13

  43. IoT Lab Evaluation Cloud Backends • Types of cloud backends • 1 st , 3 rd , or hybrid • TLS/SSL • Self-signed • Name mismatch • Vulnerable TLS/SSL version • Insecure protocols • Vulnerable software • Services 13

  44. IoT Lab Evaluation • 12 different backends, 1 st Party Cloud Backends • Supports SSL v2/v3 • CVE-2013-4810 – RCE JBoss Server • Types of cloud backends • 1 st , 3 rd , or hybrid • TLS/SSL • Self-signed • Name mismatch • Vulnerable TLS/SSL version • Insecure protocols • Vulnerable software • Services 13

  45. IoT Lab Evaluation Mobile App 14

  46. IoT Lab Evaluation Mobile App • Permissions • Requested unused 14

  47. IoT Lab Evaluation Mobile App • Permissions • Requested unused • Programming errors • Incorrect use of crypto 14

  48. IoT Lab Evaluation Mobile App • Permissions • Requested unused • Programming errors • Incorrect use of crypto • Hardcoded secrets • API keys for cloud services 14

  49. IoT Lab Evaluation Mobile App • Permissions • Requested unused • Programming errors • Incorrect use of crypto • Hardcoded secrets • API keys for cloud services • Hardcoded Crypto key • uLi4/f4+Pb39.T19 • UMENG_MESSAGE_SECRET: … 14

  50. IoT Lab Evaluation Network 15

  51. IoT Lab Evaluation Network • Protocols in use • Insecure Protocols • Custom Protocols 15

  52. IoT Lab Evaluation Network • Protocols in use • Insecure Protocols • Custom Protocols • Encryption between • Device to Cloud • Device to Mobile App • Mobile App to Cloud 15

  53. IoT Lab Evaluation Network • Protocols in use • Insecure Protocols • Custom Protocols • Encryption between • Device to Cloud • Device to Mobile App • Mobile App to Cloud • MITM Attack on • Device to Cloud • Device to Mobile App • Mobile App to Cloud 15

  54. IoT Lab Evaluation Network • Protocols in use • Insecure Protocols • Custom Protocols • Encryption between • Device to Cloud • Device to Mobile App • Mobile App to Cloud • MITM Attack on • Device to Cloud • Partial Encryption Across the Internet • Device to Mobile App • No Encryption on the LAN • Mobile App to Cloud 15

  55. Scoring The Components Scorecard Rating Independent system components scoring Documented Modular 16

  56. Component Framework 17

  57. Component Framework 17

  58. Component Framework 17

  59. Component Framework 17

  60. Component Framework 17

  61. Component Framework 17

  62. Component Framework 17

  63. Component Framework 17

  64. Component Framework 17

  65. Component Framework 17

  66. Component Framework 17

  67. Component Framework 17

  68. Component Framework 17

  69. 18

  70. 18

  71. 19

  72. Evaluation Takeaways 20

  73. Evaluation Takeaways • Cloud managed • Auto update • Encrypted local traffic with authenticated services 20

  74. 21 What's Next?

  75. 21 What's Next? • Longitudinal analysis • Do updates improve the Things?

  76. 21 What's Next? • Longitudinal analysis • Do updates improve the Things? • Accurate representation • Inducing device activities

  77. How Can You Access/Contribute? • Evaluation data is public • Feel free to reach out: • Request specific device evaluation • Sponsor devices for evaluation • Additional questions • Download our data • https://YourThings.info • Contact email: • contact@YourThings.info 22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend