Affiliation:
1. William & Mary, United States of America, Williamsburg, VA
2. George Mason University, United States of America, Fairfax, VA
Abstract
Home automation platforms enable consumers to conveniently automate various physical aspects of their homes. However, the security flaws in the platforms or integrated third-party products can have serious security and safety implications for the user’s physical environment. This article describes our systematic security evaluation of two popular smart home platforms, Google’s Nest platform and Philips Hue, which implement home automation “routines” (i.e., trigger-action programs involving apps and devices) via manipulation of state variables in a
centralized data store
. Our semi-automated analysis examines, among other things, platform access control enforcement, the rigor of non-system enforcement procedures, and the potential for misuse of routines, and it leads to
11
key findings with serious security implications. We combine several of the vulnerabilities we find to demonstrate the first end-to-end instance of lateral privilege escalation in the smart home, wherein we remotely disable the Nest Security Camera via a compromised light switch app. Finally, we discuss potential defenses, and the impact of the continuous evolution of smart home platforms on the practicality of security analysis. Our findings draw attention to the unique security challenges of smart home platforms and highlight the importance of enforcing security by design.
Publisher
Association for Computing Machinery (ACM)
Subject
Artificial Intelligence,Control and Optimization,Computer Networks and Communications,Hardware and Architecture,Human-Computer Interaction
Reference66 articles.
1. Google. 2018. Online appendix. Retrieved from https://sites.google.com/view/smart-home-routines-analysis-2/home. Google. 2018. Online appendix. Retrieved from https://sites.google.com/view/smart-home-routines-analysis-2/home.
2. CryptoAPI-Bench: A Comprehensive Benchmark on Java Cryptographic API Misuses
3. SoK: Security Evaluation of Home-Based IoT Deployments
4. BetterCAP. 2018. BetterCAP stable documentation. Retrieved from https://www.bettercap.org/legacy///. BetterCAP. 2018. BetterCAP stable documentation. Retrieved from https://www.bettercap.org/legacy///.
5. How Users Interpret Bugs in Trigger-Action Programming
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献