Uncovering Access Token Security Flaws in Multiuser Scenario of Smart Home Platforms

被引:0
|
作者
Yang, Yiyu [1 ]
Wang, Jice [1 ]
Liu, Peng [2 ]
Fu, Anmin [3 ]
Zhang, Yuqing [1 ,4 ,5 ,6 ]
机构
[1] Univ Chinese Acad Sci, Natl Comp Network Intrus Protect Ctr, Sch Comp Sci & Technol, Beijing 101408, Peoples R China
[2] Penn State Univ, Coll Informat Sci & Technol, State Coll, PA 16801 USA
[3] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
[4] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
[5] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[6] Hainan Univ, Sch Comp Sci & Cyberspace Secur, Haikou 570228, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 22期
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Security; Smart homes; Testing; Internet of Things; Permission; Cloud computing; Mobile applications; Access token; multiuser; security flaw; smart home platform;
D O I
10.1109/JIOT.2024.3429417
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access tokens have been thoroughly researched in website and mobile application security. However, we believe that the traditional application of access tokens must fulfill new security requirements in smart home environments due to the distinct features of multiuser sharing usage. Smart home platforms allow different types of users to share access to a single IoT device through mobile apps, with varying levels of permissions that are closely tied to access tokens. One security concern is that existing security standards or literature, as well as the development and implementation by vendors, may overlook these features, thereby introducing potential security risks to the application of access tokens. In this work, we propose a novel testing framework and conduct a systematic study to test the extent to which real-world smart home platform implementations neglect these new requirements. The testing results show that seven out of the 11 real-world smart home platforms are plagued by access token management flaws, which collectively violate four security properties. We have found that these security flaws can be exploited to enable unrestricted file upload, DoS attack, remote command execution, and illegal surveillance in real-world scenarios. Finally, we conducted responsible disclosure of these flaws and attacks and obtained seven China national vulnerability database vulnerability IDs and one CVE vulnerability ID. Additionally, we also provide suggestions for mitigating the vulnerabilities.
引用
收藏
页码:36841 / 36857
页数:17
相关论文
共 20 条
  • [1] Unfettered Access Tokens: Discovering Security Flaws of the Access Token in Smart Home Platforms
    Cong Liu
    Yang, Yiyu
    Zhang, Yuhui
    Zhang, Yuqing
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 5391 - 5396
  • [2] Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms
    Yang, Yiyu
    Zhao, Jiayu
    Li, Yilian
    Li, Xiaowei
    Liu, Peng
    Zhang, Yuqing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 950 - 966
  • [3] Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things
    OConnor, T. J.
    Enck, William
    Reaves, Bradley
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 140 - 150
  • [4] Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home
    Guo, Minglei
    Xiao, Zhenghang
    Liu, Xin
    Zhuge, Jianwei
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT I, SECURECOMM 2023, 2025, 567 : 205 - 224
  • [5] Development of integration platforms for interworking of smart home devices for heterogeneous data security
    Lee, Jeong-Gi
    Lee, Sang-Hyun
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2017, 24 (03) : 191 - 199
  • [6] Software-defined security architecture for a smart home networks using token sharing mechanism
    Saxena, Utkarsh
    Sodhi, J.S.
    Singh, Yaduveer
    Recent Advances in Computer Science and Communications, 2021, 14 (05): : 1658 - 1668
  • [7] Designing Suitable Access Control for Web-Connected Smart Home Platforms
    Werner, Sebastian
    Pallas, Frank
    Bermbach, David
    SERVICE-ORIENTED COMPUTING - ICSOC 2017 WORKSHOPS, 2018, 10797 : 241 - 252
  • [8] Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts
    Qashlan, Amjad
    Nanda, Priyadarsi
    He, Xiangian
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 952 - 959
  • [9] Scenario-Driven Device-to-Device Access Control in Smart Home IoT
    Shakarami, Mehrnoosh
    Benson, James
    Sandhu, Ravi
    2022 IEEE 4TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA, 2022, : 217 - 228
  • [10] Color coded multiple access scheme for bidirectional multiuser visible light communications in smart home technologies
    Tiwari, Samrat Vikramaditya
    Sewaiwar, Atul
    Chung, Yeon-Ho
    OPTICS COMMUNICATIONS, 2015, 353 : 1 - 5