Towards Examining The Security Cost of Inexpensive Smart Home IoT Devices

被引:1
作者
OConnor, T. J. [1 ]
Jessee, Dylan [1 ]
Campos, Daniel [1 ]
机构
[1] Florida Inst Technol, Melbourne, FL 32901 USA
来源
2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC | 2023年
关键词
internet of things; security and privacy; secure software development;
D O I
10.1109/COMPSAC57700.2023.00196
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A myriad of security challenges has accompanied the rapid proliferation of internet-of-things (IoT) smart-home devices. While smart-home security cameras, locks, digital speakers, and thermostats offer the promise of security, their naive implementations often introduce vulnerability into our digitally connected lives. We argue that the consumer demand for inexpensive IoT has led to a supply of grossly insecure devices. To examine this hypothesis, we examine the security of five inexpensive IoT devices from three separate vendors. In all five devices, our work uncovers immature software security efforts. Our findings discover new vulnerabilities, document legacy vulnerabilities due to software bill of materials (SBOM) issues, explore security mitigations in firmware, and examine the unsecured communication within the ecosystems of the devices. Our analysis discusses the root causes of these vulnerabilities. While these results indicate a snapshot of an immature and naive state of IoT software, there are several software development lifecycle processes that vendors can immediately implement to overcome the root causes of these vulnerabilities.
引用
收藏
页码:1293 / 1298
页数:6
相关论文
共 31 条
  • [1] Alhazmi A., COMPUTERS SOFTWARE A
  • [2] A Replication Study for IoT Privacy Preferences
    Alhazmi, Ahmed
    Kilani, Ghassen
    Allen, William
    OConnor, T. J.
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (IEEE COINS 2021), 2021, : 45 - 52
  • [3] [Anonymous], 2021, AM RING IS LARG CIV
  • [4] Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
  • [5] arstechnica, POL CAN GET YOUR RIN
  • [6] Bowles N., 2018, NEW YORK TIMES
  • [7] Campos D., 2021, CYBER SECURITY EXPER
  • [8] IoT Malware Ecosystem in the Wild: A Glimpse into Analysis and Exposures
    Choi, Jinchun
    Anwar, Afsah
    Alasmary, Hisham
    Spaulding, Jeffrey
    Nyang, DaeHun
    Mohaisen, Aziz
    [J]. SEC'19: PROCEEDINGS OF THE 4TH ACM/IEEE SYMPOSIUM ON EDGE COMPUTING, 2019, : 413 - 418
  • [9] D. of Justice Computer Crime & Intellectual Property Section Criminal Division, 2017, SEC YOUR INT THINGS
  • [10] Exploring How Privacy and Security Factor into IoT Device Purchase Behavior
    Emami-Nacini, Pardis
    Dixon, Henry
    Agarwal, Yuvraj
    Cranor, Lorrie Faith
    [J]. CHI 2019: PROCEEDINGS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,