Proceedings ArticleDOI
Security Analysis of Emerging Smart Home Applications
Earlence Fernandes,Jaeyeon Jung,Atul Prakash +2 more
- pp 636-654
Reads0
Chats0
TLDR
This paper analyzed Samsung-owned SmartThings, which has the largest number of apps among currently available smart home platforms, and supports a broad range of devices including motion sensors, fire alarms, and door locks, and discovered two intrinsic design flaws that lead to significant overprivilege in SmartApps.Abstract:Â
Recently, several competing smart home programming frameworks that support third party app development have emerged. These frameworks provide tangible benefits to users, but can also expose users to significant security risks. This paper presents the first in-depth empirical security analysis of one such emerging smart home programming platform. We analyzed Samsung-owned SmartThings, which has the largest number of apps among currently available smart home platforms, and supports a broad range of devices including motion sensors, fire alarms, and door locks. SmartThings hosts the application runtime on a proprietary, closed-source cloud backend, making scrutiny challenging. We overcame the challenge with a static source code analysis of 499 SmartThings apps (called SmartApps) and 132 device handlers, and carefully crafted test cases that revealed many undocumented features of the platform. Our key findings are twofold. First, although SmartThings implements a privilege separation model, we discovered two intrinsic design flaws that lead to significant overprivilege in SmartApps. Our analysis reveals that over 55% of SmartApps in the store are overprivileged due to the capabilities being too coarse-grained. Moreover, once installed, a SmartApp is granted full access to a device even if it specifies needing only limited access to the device. Second, the SmartThings event subsystem, which devices use to communicate asynchronously with SmartApps via events, does not sufficiently protect events that carry sensitive information such as lock codes. We exploited framework design flaws to construct four proof-of-concept attacks that: (1) secretly planted door lock codes, (2) stole existing door lock codes, (3) disabled vacation mode of the home, and (4) induced a fake fire alarm. We conclude the paper with security lessons for the design of emerging smart home programming frameworks.read more
Citations
More filters
Proceedings ArticleDOI
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
TL;DR: Two new attacks are discovered: voice squatting in which the adversary exploits the way a skill is invoked and voice masquerading in which a malicious skill impersonates the VPA service or a legitimate skill during the user's conversation with the service to steal her personal information.
Proceedings Article
Sensitive Information Tracking in Commodity IoT
Z. Berkay Celik,Leonardo Babun,Amit Kumar Sikder,Hidayet Aksu,Gang Tan,Patrick McDaniel,A. Selcuk Uluagac +6 more
TL;DR: SainT as mentioned in this paper is a static taint analysis tool for IoT applications, which operates in three phases; translation of platform-specific IoT source code into an intermediate representation (IR), identifying sensitive sources and sinks, and performing static analysis to identify sensitive data flows.
Journal ArticleDOI
Internet of Things: Survey on Security and Privacy
TL;DR: This work focuses on IoT intrinsic vulnerabilities and their implications to the fundamental information security challenges in confidentiality, integrity, and availability.
Proceedings ArticleDOI
Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes
TL;DR: An information-flow model is built to analyze how often IFTTT recipes involve potential integrity or secrecy violations, which suggests users need to be both informed about and protected from these emerging threats to which they could be unwittingly exposing themselves.
Proceedings ArticleDOI
Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment
TL;DR: This work proposes a decentralized system of data management for IoT devices where all data access permission is en-forced using smart contracts and the audit trail of data access is stored in the blockchain.
References
More filters
Proceedings ArticleDOI
Android permissions demystified
TL;DR: Stowaway, a tool that detects overprivilege in compiled Android applications, is built and finds that about one-third of applications are overprivileged.
Proceedings ArticleDOI
Soot: a Java bytecode optimization framework
TL;DR: Soot, a framework for optimizing Java* bytecode, is implemented in Java and supports three intermediate representations for representing Java bytecode: Baf, a streamlined representation of bytecode which is simple to manipulate; Jimple, a typed 3-address intermediate representation suitable for optimization; and Grimp, an aggregated version of Jimple suitable for decompilation.
Proceedings ArticleDOI
Android permissions: user attention, comprehension, and behavior
TL;DR: It is found that current Android permission warnings do not help most users make correct security decisions, however, a notable minority of users demonstrated both awareness of permission warnings and reasonable rates of comprehension.
Proceedings ArticleDOI
Analyzing inter-application communication in Android
TL;DR: This work examines Android application interaction and identifies security risks in application components and provides a tool, ComDroid, that detects application communication vulnerabilities and found 34 exploitable vulnerabilities.
Proceedings ArticleDOI
PScout: analyzing the Android permission specification
TL;DR: An analysis of the permission system of the Android smartphone OS is performed and it is found that a trade-off exists between enabling least-privilege security with fine-grained permissions and maintaining stability of the permissions specification as the Android OS evolves.