Abstract:
The proliferation of the Internet of Things (IoT) is reshaping our lifestyle. With IoT sensors and devices communicating with each other via the Internet, people can cust...Show MoreMetadata
Abstract:
The proliferation of the Internet of Things (IoT) is reshaping our lifestyle. With IoT sensors and devices communicating with each other via the Internet, people can customize automation rules to meet their needs. Unless carefully defined, however, such rules can easily become points of security failure as the number of devices and complexity of rules increase. Device owners may end up unintentionally providing access or revealing private information to unauthorized entities due to complex chain reactions among devices. Prior work on trigger-action programming either focuses on conflict resolution or usability issues or fails to accurately and efficiently detect such attack chains. This paper explores the security vulnerabilities when users have the freedom to customize automation rules using trigger-action programming. We define two broad classes of attack-privilege escalation and privacy leakage -and present a practical model-checking-based system called SafeChain that detects hidden attack chains exploiting the combination of rules. Built upon existing model-checking techniques, SafeChain identifies attack chains by modeling the IoT ecosystem as a finite-state machine. To improve practicability, SafeChain avoids the need to accurately model an environment by frequently rechecking the automation rules given the current states and employs rule-aware optimizations to further reduce overhead. Our comparative analysis shows that SafeChain can efficiently and accurately identify attack chains, and our prototype implementation of SafeChain can verify 100 rules in less than 1 s with no false positives.
Published in: IEEE Transactions on Information Forensics and Security ( Volume: 14, Issue: 10, October 2019)
Funding Agency:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Attack Chain ,
- Trigger-action Programming ,
- False Positive ,
- Accuracy Of Model ,
- Internet Of Things ,
- Conflict Resolution ,
- State Machine ,
- Model Checking ,
- Privacy Leakage ,
- Device Ownership ,
- Environmental Changes ,
- Service Providers ,
- False Negative ,
- Triggering ,
- False Alarm ,
- Security Policy ,
- Static Analysis ,
- Internet Of Things Devices ,
- Attribute Values ,
- Surveillance Cameras ,
- Smart Home ,
- Number Of Private ,
- Dependency Graph ,
- Class Of Attacks ,
- Light Bulb ,
- Temporal Logic ,
- Large-scale Evaluation ,
- Combinatorial Explosion
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Attack Chain ,
- Trigger-action Programming ,
- False Positive ,
- Accuracy Of Model ,
- Internet Of Things ,
- Conflict Resolution ,
- State Machine ,
- Model Checking ,
- Privacy Leakage ,
- Device Ownership ,
- Environmental Changes ,
- Service Providers ,
- False Negative ,
- Triggering ,
- False Alarm ,
- Security Policy ,
- Static Analysis ,
- Internet Of Things Devices ,
- Attribute Values ,
- Surveillance Cameras ,
- Smart Home ,
- Number Of Private ,
- Dependency Graph ,
- Class Of Attacks ,
- Light Bulb ,
- Temporal Logic ,
- Large-scale Evaluation ,
- Combinatorial Explosion
- Author Keywords