Watching IoTs that watch us Danny Y. Huang Assistant Professor - - PowerPoint PPT Presentation

watching iots
SMART_READER_LITE
LIVE PREVIEW

Watching IoTs that watch us Danny Y. Huang Assistant Professor - - PowerPoint PPT Presentation

Watching IoTs that watch us Danny Y. Huang Assistant Professor Collaborators: Gunes es Acar, Noah Apthorpe, Frank Li Li, Hooman Mohajeri Moghaddam, Arunesh Mathur, Ben Burgess, Prateek Mittal, Arvind Narayanan, Edward Felten, Nick Feamster


slide-1
SLIDE 1

Watching IoTs that watch us

Danny Y. Huang

Assistant Professor

Collaborators: Gunes es Acar, Noah Apthorpe, Frank Li Li, Hooman Mohajeri Moghaddam, Arunesh Mathur, Ben Burgess, Prateek Mittal, Arvind Narayanan, Edward Felten, Nick Feamster

slide-2
SLIDE 2

Video: I’m watching my TV while it is watching me

slide-3
SLIDE 3

Video: I’m watching my TV while it is watching me

Kbps Adobe Marketing Cloud Time (10x)

slide-4
SLIDE 4

Many consumers are concerned about IoT security and privacy

Internet What data? From whom? To whom?

slide-5
SLIDE 5

Analyzing devices’ operational network traffic in lab

WiFi hotspot tcpdump Are connections correctly encrypted? Which Internet service is device talking to? What data is being sent by device? Ethernet router IoT device

slide-6
SLIDE 6

Difficult to study IoT security and privacy at scale

slide-7
SLIDE 7

Crowdsource IoT traffic at scale

usa sable le tool that offers insight on IoT security and privacy collect anonymiz ized network traffic data develop open-source tool Io IoT T In Inspector

slide-8
SLIDE 8

Downloading and running IoT Inspector

https://iotinspector.org

slide-9
SLIDE 9

Downloading and running IoT Inspector

slide-10
SLIDE 10

Insights from an independent user

“Here is what the Prin rinceton IoT IoT In Insp spector tracked in a 20 minute time span on Ira’s Roku.” (October 4, 2019)

Ira Flatow

Host of Science Friday

Ins Insig ight – Ira’s Roku TV constantly communicated with advertising and tracking services

slide-11
SLIDE 11

Video: IoT Inspector showing network activities of Roku TV

Kbps Adobe Marketing Cloud Time (10x)

slide-12
SLIDE 12

IoT Inspector: usable system to crowdsource IoT network traffic at scale

IoT IoT In Insp spector Se Server Researchers analyze traffic & device labels IoT IoT In Insp spector Clie lient (W (Win indows, macOS, Lin Linux) Users view network activities and label devices (https://iotinspector.org)

slide-13
SLIDE 13

Strawman: capturing network traffic by creating a WiFi hotpsot

slide-14
SLIDE 14

Our technique: passive traffic analysis via ARP spoofing

2 gratuitous spoofed ARP pkt per 2 sec Use TCP ACK # to infer missing packets

slide-15
SLIDE 15

Contributions of IoT Inspector

Tool

54,000+ Internet-connected devices 12,000+ device labels 10+ organizations requesting data access

Dataset Insight

5,400+ anonymous users since April ’19 Still gaining users and collecting data Security: Non-encryption, exposed local services Privacy: Tracking on smart TVs

Us User ers Col Colla laborators

slide-16
SLIDE 16

Insight: Found potential MITM vulnerabilities

36% of devices* communicate over HTTP (port 80)

Covering 69 out of 81 vendors Examples: Lutron, iHome, Amazon, Roku

10% of devices* that used SSL/TLS used

  • utdated versions (e.g., SSL 3.0 and TLS 1.0)

Covering 26 vendors Examples: Amazon, Vizio, Samsung

On-path attacker can see your traffic

(i.e., man-in-the-middle attack)

* weighted by the number of devices for each vendor

slide-17
SLIDE 17

Insight: Some local ports are unused and could be exploited

Listen:80/HTTP Listen:22/SSH

Shell access?!

slide-18
SLIDE 18

Insight: Some local ports are unused and could be exploited

Top

  • p Lo

Local l Ports % devices 8008/HTTP 8443/MQTT 80/HTTP 22/SSH 139/SMB

slide-19
SLIDE 19

Insight: Some local ports are unused and could be exploited

Top

  • p Lo

Local l Ports % devices 8008/HTTP 36% 8443/MQTT 36% 80/HTTP 31% 22/SSH 8% 139/SMB 6%

slide-20
SLIDE 20

Insight: Some local ports are unused and could be exploited

Top

  • p Lo

Local l Ports % devices Top

  • p Unused Lo

Local l Ports % unused 8008/HTTP 36% 22/SSH 100% 8443/MQTT 36% 8081/HTTP 100% 80/HTTP 31% 23/Telnet 96% 22/SSH 8% 443/HTTPS 93% 139/SMB 6% 139/SMB 92% Potential security vulnerability

slide-21
SLIDE 21

Insight: Tracking on smart TVs

417 smart TVs in the dataset

22% of registered domains contacted by these smart TVs are advertising/tracking services, based on Disconnect List

Most TVs talk to what advertising/tracking companies?

A: Google B: Amazon C: Facebook D: Others

slide-22
SLIDE 22

Insight: Tracking on smart TVs

417 smart TVs in the dataset

22% of registered domains contacted by these smart TVs are advertising/tracking services, based on Disconnect List

scorecardresearch.com fwmrm.net doubleclick.net

34%

  • f smart TVs

14%

  • f smart TVs

5%

  • f smart TVs
slide-23
SLIDE 23

Limitation of IoT Inspector’s dataset

What sensitive data is shared? From which smart TV apps?

slide-24
SLIDE 24

Challenges of analyzing smart TV traffic in lab

tcpdump

slide-25
SLIDE 25

Challenges of analyzing smart TV traffic in lab

tcpdump

How to analyze the traffic of TV apps at scale?

slide-26
SLIDE 26

Automating interactions with smart TVs

network traffic remote control commands HDMI capture card HDMI output

slide-27
SLIDE 27

Findings: sensitive data shared with ad/tracking services

% apps % apps Ad ID App name Serial number Zip code City or state

slide-28
SLIDE 28

Findings: sensitive data shared with ad/tracking services

% apps % apps Ad ID 32% App name 20% Serial number 11% Zip code 1% City or state 1%

slide-29
SLIDE 29

Findings: sensitive data shared with ad/tracking services

% apps % apps Ad ID 32% Android ID 39% App name 20% Ad ID 22% Serial number 11% Serial number 10% Zip code 1% MAC address 5% City or state 1% WiFi SSID 2%

slide-30
SLIDE 30

Limited ad tracking (Roku) / No interest-based ads (Amazon)

slide-31
SLIDE 31

Poll: What happens when you disable ad tracking?

% apps % apps Ad ID 32% Android ID 39% App name 20% Ad ID 22% Serial number 11% Serial number 10% Zip code 1% MAC address 5% City or state 1% WiFi SSID 2%

A B C D

All zero!

slide-32
SLIDE 32

Finding: 0 apps sent Ad ID under “limited tracking”

% apps % apps Ad ID 32% Android ID 39% App name 20% Ad ID 22% Serial number 11% Serial number 10% Zip code 1% MAC address 5% City or state 1% WiFi SSID 2%

0% 0%

slide-33
SLIDE 33

Privacy for children?

September 4, 2019 The “FTC and New York Attorney General allege that YouTube violated the COPPA Rule by collecting personal information—in the form of per ersistent id iden enti tifie iers that are used to track users across the Internet—from viewers of ch child ild-directed apps, with ithout first notifying parents and getting their con

  • nsent.”
slide-34
SLIDE 34

Privacy for children?

September 4, 2019 The “FTC and New York Attorney General allege that YouTube violated the COPPA Rule by collecting personal information—in the form of per ersistent id iden enti tifie iers that are used to track users across the Internet—from viewers of ch child ild-directed apps, with ithout first notifying parents and getting their con

  • nsent.”
slide-35
SLIDE 35

Findings from smart TV study: privacy leaks in child-directed apps

Number of apps

1,882 1,183

Number of child-directed apps

470 220

Number of child-directed apps that leaked persistent IDs

34 34 23 23

slide-36
SLIDE 36

Findings from smart TV study: privacy leaks in child-directed apps

Number of apps

1,882 1,183

Number of child-directed apps

470 220

Number of child-directed apps that leaked persistent IDs

34 34 23 23

slide-37
SLIDE 37

Examples of persistent IDs in child-directed apps

Leaked

Android ID

Leaked

Android ID Serial Number

slide-38
SLIDE 38

Examples of persistent IDs in child-directed apps

Leaked

Ad ID Serial Number

Leaked

Ad ID Serial Number

slide-39
SLIDE 39

Summary of current work

Tool

54,000+ Internet-connected devices 12,000+ device labels 10+ organizations requesting data access

Dataset Insight

5,400+ anonymous users since April ’19 Still gaining users and collecting data Security: Non-encryption, exposed local services Privacy: Tracking on smart TVs

Us User ers Col Colla laborators

slide-40
SLIDE 40

Next steps: Yelp for IoT devices

Yelp for IoT devices

  • Transparency for consumers
  • Cybersecurity insurance?
  • Minimal security standards?

Sharing data with community What properties do consumers care about?

slide-41
SLIDE 41

Next steps: IoT supply chain analysis

Who makes an IoT device?

  • Original Equipment Manufacturer (OEM)?
  • Which devices share same config/code?

Same TLS libraries?

Provides consumers with transparency

==

?

slide-42
SLIDE 42

Ongoing work: see https://iotinspector.org/projects

Enterprise device identification

  • Passive network traffic
  • Active scans
  • Hardware metadata (e.g., OUI)

IoT firewall

  • Limitations of commercial firewalls and MUD
  • Develop automated rules
  • Blocks per device or connection

Usability

  • Privacy perception of users?
  • How to raise user awareness?

security privacy

Third-party identification

  • What companies do devices talk to?
  • First-party? Third-party?

misc

Healthcare

  • Can we infer human health status using

network traffic from IoT devices?

Education

  • How to let students access IoT testbeds

remotely and run experiments?