Static analysis for discovering IoT vulnerabilities

被引:38
作者
Ferrara, Pietro [1 ,2 ]
Mandal, Amit Kr [3 ]
Cortesi, Agostino [1 ]
Spoto, Fausto [4 ]
机构
[1] Univ Ca Foscari, Venice, Italy
[2] JuliaSoft, Verona, Italy
[3] SRM Univ, Amaravati, AP, India
[4] Univ Verona, Verona, Italy
关键词
IoT security; Static analysis; OWASP IoT Top 10; IoT privacy; Insecure IoT ecosystem interface; SECURITY; INTERNET; FRAMEWORK; PROTOCOLS;
D O I
10.1007/s10009-020-00592-x
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Open Web Application Security Project (OWASP), released the "OWASP Top 10 Internet of Things 2018" list of the high-priority security vulnerabilities for IoT systems. The diversity of these vulnerabilities poses a great challenge toward development of a robust solution for their detection and mitigation. In this paper, we discuss the relationship between these vulnerabilities and the ones listed by OWASP Top 10 (focused on Web applications rather than IoT systems), how these vulnerabilities can actually be exploited, and in which cases static analysis can help in preventing them. Then, we present an extension of an industrial analyzer (Julia) that already covers five out of the top seven vulnerabilities of OWASP Top 10, and we discuss which IoT Top 10 vulnerabilities might be detected by the existing analyses or their extension. The experimental results present the application of some existing Julia's analyses and their extension to IoT systems, showing its effectiveness of the analysis of some representative case studies.
引用
收藏
页码:71 / 88
页数:18
相关论文
共 69 条
  • [1] Alizai Zahoor Ahmed, 2018, 2018 International Conference on Applied and Engineering Mathematics (ICAEM), P115, DOI 10.1109/ICAEM.2018.8536261
  • [2] [Anonymous], 2019, OWASP Internet of Things (IoT) Project
  • [3] [Anonymous], AK WARNS UPNP DEV US
  • [4] [Anonymous], 2018, KU LEUV FAST INS PAS
  • [5] Assiri A, 2018, 2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018)
  • [6] Bhawiyuga Adhitya, 2017, INT C TELECOMMUNICAT
  • [7] Burato E., 2017, P ITASEC 17
  • [8] Celik Z.B., 2018, ARXIVPREPRINTARXIV18
  • [9] Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
    Challa, Sravani
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Reddy, Alavalapati Goutham
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEEE ACCESS, 2017, 5 : 3028 - 3043
  • [10] Chze PLR, 2014, 2014 IEEE WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P428, DOI 10.1109/WF-IoT.2014.6803204