If This Then What? Controlling Flows in IoT Apps

被引:71
作者
Bastys, Iulia [1 ]
Balliu, Musard [2 ]
Sabelfeld, Andrei [1 ]
机构
[1] Chalmers Univ Technol, Gothenburg, Sweden
[2] KTH Royal Inst Technol, Stockholm, Sweden
来源
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) | 2018年
基金
瑞典研究理事会;
关键词
information flow; access control; IoT apps;
D O I
10.1145/3243734.3243841
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
IoT apps empower users by connecting a variety of otherwise unconnected services. These apps (or applets) are triggered by external information sources to perform actions on external information sinks. We demonstrate that the popular IoT app platforms, including IFTTT (If This Then That), Zapier, and Microsoft Flow are susceptible to attacks by malicious applet makers, including stealthy privacy attacks to exfiltrate private photos, leak user location, and eavesdrop on user input to voice-controlled assistants. We study a dataset of 279,828 IFTTT applets from more than 400 services, classify the applets according to the sensitivity of their sources, and find that 30% of the applets may violate privacy. We propose two countermeasures for short-and longterm protection: access control and information flow control. For short-term protection, we suggest that access control classifies an applet as either exclusively private or exclusively public, thus breaking flows from private sources to sensitive sinks. For longterm protection, we develop a framework for information flow tracking in IoT apps. The framework models applet reactivity and timing behavior, while at the same time faithfully capturing the subtleties of attacker observations caused by applet output. We show how to implement the approach for an IFTTT-inspired setting leveraging state-of-the-art information flow tracking techniques for JavaScript based on the JSFlow tool and evaluate its effectiveness on a collection of applets.
引用
收藏
页码:1102 / 1119
页数:18
相关论文
共 49 条
[1]  
alexander via IFTTT, 2018, AUT BACK YOUR NEW IO
[2]  
Almond via IFTTT, 2018, GET EM AL YOUR KIDS
[3]  
[Anonymous], TECHNICAL REPORT
[4]  
[Anonymous], POPL
[5]  
Bastys Iulia, 2018, THIS THEN WHAT CONTR
[6]  
Bohannon A, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P79
[7]  
Celik Z. Berkay, 2018, 27 USENIX SEC S USEN
[8]  
Cohen E.S., 1978, F SEC COMP
[9]  
Denning D.E., 1977, Commun. ACM
[10]  
devin via IFTTT, 2018, AUT TEXT SOM IMP YOU