Loading [MathJax]/extensions/MathMenu.js
SafeChain: Securing Trigger-Action Programming From Attack Chains | IEEE Journals & Magazine | IEEE Xplore

SafeChain: Securing Trigger-Action Programming From Attack Chains


Abstract:

The proliferation of the Internet of Things (IoT) is reshaping our lifestyle. With IoT sensors and devices communicating with each other via the Internet, people can cust...Show More

Abstract:

The proliferation of the Internet of Things (IoT) is reshaping our lifestyle. With IoT sensors and devices communicating with each other via the Internet, people can customize automation rules to meet their needs. Unless carefully defined, however, such rules can easily become points of security failure as the number of devices and complexity of rules increase. Device owners may end up unintentionally providing access or revealing private information to unauthorized entities due to complex chain reactions among devices. Prior work on trigger-action programming either focuses on conflict resolution or usability issues or fails to accurately and efficiently detect such attack chains. This paper explores the security vulnerabilities when users have the freedom to customize automation rules using trigger-action programming. We define two broad classes of attack-privilege escalation and privacy leakage -and present a practical model-checking-based system called SafeChain that detects hidden attack chains exploiting the combination of rules. Built upon existing model-checking techniques, SafeChain identifies attack chains by modeling the IoT ecosystem as a finite-state machine. To improve practicability, SafeChain avoids the need to accurately model an environment by frequently rechecking the automation rules given the current states and employs rule-aware optimizations to further reduce overhead. Our comparative analysis shows that SafeChain can efficiently and accurately identify attack chains, and our prototype implementation of SafeChain can verify 100 rules in less than 1 s with no false positives.
Published in: IEEE Transactions on Information Forensics and Security ( Volume: 14, Issue: 10, October 2019)
Page(s): 2607 - 2622
Date of Publication: 15 February 2019

ISSN Information:

Funding Agency:


Contact IEEE to Subscribe

References

References is not available for this document.