Affiliation:
1. University of British Columbia, Vancouver, Canada
Abstract
The Internet of Things (IoT) is playing an important role in different aspects of our lives. Smart grids, smart cars, and medical devices all incorporate IoT devices as key components. The ubiquity and criticality of these devices make them an attractive target for attackers. Therefore, we need techniques to analyze their security so that we can address their potential vulnerabilities. IoT devices, unlike remote servers, are user-facing and, therefore, an attacker may interact with them more extensively, e.g., via physical access. Existing techniques for analyzing security of IoT devices either rely on a pre-defined set of attacks and, therefore, have limited effect or do not consider the specific capabilities the attackers have against IoT devices.
Security analysis techniques may operate at the design-level, leveraging abstraction to avoid state-space explosion, or at the code-level for ensuring accuracy. In this article, we introduce two techniques, one at the design-level, and the other at the code-level, to analyze security of IoT devices, and compare their effectiveness. The former technique uses model checking, while the latter uses symbolic execution, to find attacks based on the attacker’s capabilities. We evaluate our techniques on an open source smart meter. We find that our code-level analysis technique is able to find three times more attacks and complete the analysis in half the time, compared to the design-level analysis technique, with no false positives.
Funder
Discovery Grants Programme
Strategic Networks Grants programme for Developing next generation Intelligent Vehicular Networks and Application
Natural Sciences and Engineering Research Council of Canada
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture,Software
Reference61 articles.
1. 2017. In-Stat and NDP Group Company. Retrieved from http://www.instat.com/press.asp?ID=33528sku=IN1104731WH. 2017. In-Stat and NDP Group Company. Retrieved from http://www.instat.com/press.asp?ID=33528sku=IN1104731WH.
2. 2017. Smart Energy Groups Home Page. Retrieved from http://smartenergygroups.com. 2017. Smart Energy Groups Home Page. Retrieved from http://smartenergygroups.com.
3. 2017. Acunetix Web Application Security Scanner. Retrieved from http://www.acunetix.com/. 2017. Acunetix Web Application Security Scanner. Retrieved from http://www.acunetix.com/.
4. 2017. Clang: A C Language Family Frontend for LLVM. Retrieved from https://clang.llvm.org/. 2017. Clang: A C Language Family Frontend for LLVM. Retrieved from https://clang.llvm.org/.
5. 2017. FBI: Smart Meter Hacks Likely to Spread. Retrieved from http://krebsonsecurity.com/2012/04/fbi-smart-meter-hacks-likely-to-spread/. 2017. FBI: Smart Meter Hacks Likely to Spread. Retrieved from http://krebsonsecurity.com/2012/04/fbi-smart-meter-hacks-likely-to-spread/.
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献