Penetration testing of connected households

被引:8
|
作者
Heiding, Fredrik [1 ]
Sueren, Emre [1 ]
Olegard, Johannes [1 ,2 ]
Lagerstroem, Robert [1 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, Stockholm, Sweden
[2] Stockholm Univ, Stockholm, Sweden
关键词
Penetration testing; Ethical hacking; Internet of things; Connected households; Smart home; Pentest; Cyber security; TAXONOMY;
D O I
10.1016/j.cose.2022.103067
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Connected devices have become an integral part of modern homes and household devices, such as vac-uum cleaners and refrigerators, are now often connected to networks. This connectivity introduces an entry point for cyber attackers. The plethora of successful cyber attacks against household IoT indicates that the security of these devices, or the security of applications related to these devices, is often lacking. Existing penetration testing studies usually focus on individual devices, and recent studies often men-tion the need for more extensive vulnerability assessments. Therefore, this study investigates the cyber security of devices commonly located in connected homes. Systematic penetration tests were conducted on 22 devices in five categories related to connected homes: smart door locks, smart cameras, smart car adapters/garages, smart appliances, and miscellaneous smart home devices. In total, 17 vulnerabilities were discovered and published as new CVEs. Some CVEs received critical severity rankings from the National Vulnerability Database (NVD), reaching 9.8/10. The devices are already being sold and used worldwide, and the discovered vulnerabilities could lead to severe consequences for residents, such as an attacker gaining physical access to the house. In addition to the published CVEs, 52 weaknesses were discovered that could potentially lead to new CVEs in the future. To our knowledge, this is the most comprehensive study on penetration testing of connected household products. (c) 2022 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )
引用
收藏
页数:13
相关论文
共 50 条
  • [1] PENETRATION TESTING
    Aitkhozhayeva, Y. Zh.
    Ziro, A. A.
    Zhaibergenova, Zh. A.
    Baltabay, A. G.
    BULLETIN OF THE NATIONAL ACADEMY OF SCIENCES OF THE REPUBLIC OF KAZAKHSTAN, 2018, (06): : 39 - 44
  • [2] Formal financial penetration and households' welfare in Pakistan
    Naz, Mariam
    Iftikhar, Syed Faizan
    Fatima, Ambreen
    INTERNATIONAL JOURNAL OF FINANCIAL ENGINEERING, 2020, 7 (04)
  • [3] TESTING THE BEHAVIOR OF ROMANIAN HOUSEHOLDS
    Pauna, Bianca
    ROMANIAN JOURNAL OF ECONOMIC FORECASTING, 2009, 11 (03): : 85 - 99
  • [4] Evaluation and Testing of Voltage-Controlled Grid-Connected Inverter for High Penetration of Renewable Energy
    Wang, Yawei
    Zhao, Jinbin
    Dai, Jianfeng
    Liu, Haixian
    Ushiki, Shuuichi
    Ohshima, Masaaki
    2015 THIRTIETH ANNUAL IEEE APPLIED POWER ELECTRONICS CONFERENCE AND EXPOSITION (APEC 2015), 2015, : 2934 - 2939
  • [5] ICVTest: A Practical Black-Box Penetration Testing Framework for Evaluating Cybersecurity of Intelligent Connected Vehicles
    Zhang, Haichun
    Wang, Jie
    Wang, Yijie
    Li, Minfeng
    Song, Jinghan
    Liu, Zhenglin
    APPLIED SCIENCES-BASEL, 2024, 14 (01):
  • [6] An Overview of Penetration Testing
    Phong, Chiem Trieu
    Yan, Wei Qi
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (04) : 50 - 74
  • [7] Network penetration testing
    He, LW
    Bode, N
    EC2ND 2005, PROCEEDINGS, 2006, : 3 - +
  • [8] About penetration testing
    Bishop, Matt
    IEEE SECURITY & PRIVACY, 2007, 5 (06) : 84 - 87
  • [9] Depth of Penetration testing
    James, B
    CERAMIC ARMOR MATERIALS BY DESIGN, 2002, 134 : 165 - 172
  • [10] Methodology for Penetration Testing
    Alisherov, Farkhod A.
    Sattarova, Feruza Y.
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2009, 2 (02): : 43 - 50