Design-Level and Code-Level Security Analysis of IoT Devices

被引:10
作者
Tabrizi, Farid Molazem [1 ]
Pattabiraman, Karthik [1 ]
机构
[1] Univ British Columbia, 2332 Main Mall, Vancouver, BC V6T 1Z4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
IoT; security analysis; model checking; ATTACK PATTERNS; GRID SECURITY; INJECTION;
D O I
10.1145/3310353
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is playing an important role in different aspects of our lives. Smart grids, smart cars, and medical devices all incorporate IoT devices as key components. The ubiquity and criticality of these devices make them an attractive target for attackers. Therefore, we need techniques to analyze their security so that we can address their potential vulnerabilities. IoT devices, unlike remote servers, are user-facing and, therefore, an attacker may interact with them more extensively, e.g., via physical access. Existing techniques for analyzing security of IoT devices either rely on a pre-defined set of attacks and, therefore, have limited effect or do not consider the specific capabilities the attackers have against IoT devices. Security analysis techniques may operate at the design-level, leveraging abstraction to avoid state-space explosion, or at the code-level for ensuring accuracy. In this article, we introduce two techniques, one at the design-level, and the other at the code-level, to analyze security of IoT devices, and compare their effectiveness. The former technique uses model checking, while the latter uses symbolic execution, to find attacks based on the attacker's capabilities. We evaluate our techniques on an open source smart meter. We find that our code-level analysis technique is able to find three times more attacks and complete the analysis in half the time, compared to the design-level analysis technique, with no false positives.
引用
收藏
页数:25
相关论文
共 56 条
[1]  
Abadi Martin, 2005, P 12 ACM C COMPUTER, P340
[2]  
[Anonymous], 2017, National Vulnerability Database
[3]  
[Anonymous], J PARAMETR
[4]  
Boehm B., 2005, FDN EMPIRICAL SOFTWA, V426, P37
[5]  
Bouraoui Nina., 2007, Tomboy
[6]  
Byres E. J., 2004, P INT INFR SURV WORK, P1
[7]  
Cadar C., 2008, Proceedings of the 8th USENIX conference on Operating systems design and implementation, OSDI'08, (USA), P209
[8]  
Chen S, 2005, I C DEPEND SYS NETWO, P378
[9]  
Davidson PA, 2013, TURBULENCE IN ROTATING, STRATIFIED AND ELECTRICALLY CONDUCTING FLUIDS, P463
[10]   Z3: An efficient SMT solver [J].
de Moura, Leonardo ;
Bjorner, Nikolaj .
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2008, 4963 :337-340