Charting the Attack Surface of Trigger-Action IoT Platforms

被引:84
|
作者
Wang, Qi [1 ]
Datta, Pubali [1 ]
Yang, Wei [2 ]
Liu, Si [1 ]
Bates, Adam [1 ]
Gunter, Carl A. [1 ]
机构
[1] Univ Illinois, Champaign, IL 61820 USA
[2] Univ Texas Dallas, Richardson, TX 75083 USA
关键词
Trigger-Action IoT Platform; Inter-rule Vulnerability; Formal Methods; NLP; Information Flow; MODEL;
D O I
10.1145/3319535.3345662
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) deployments are becoming increasingly automated and vastly more complex. Facilitated by programming abstractions such as trigger-action rules, end-users can now easily create new functionalities by interconnecting their devices and other online services. However, when multiple rules are simultaneously enabled, complex system behaviors arise that are difficult to understand or diagnose. While history tells us that such conditions are ripe for exploitation, at present the security states of trigger-action IoT deployments are largely unknown. In this work, we conduct a comprehensive analysis of the interactions between trigger-action rules in order to identify their security risks. Using IFTTT as an exemplar platform, we first enumerate the space of inter-rule vulnerabilities that exist within trigger-action platforms. To aid users in the identification of these dangers, we go on to present iRULER, a system that performs Satisfiability Modulo Theories (SMT) solving and model checking to discover inter-rule vulnerabilities within IoT deployments. iRULER operates over an abstracted information flow model that represents the attack surface of an IoT deployment, but we discover in practice that such models are difficult to obtain given the closed nature of IoT platforms. To address this, we develop methods that assist in inferring trigger-action information flows based on Natural Language Processing. We develop a novel evaluative methodology for approximating plausible real-world IoT deployments based on the installation counts of 315,393 IFTTT applets, determining that 66% of the synthetic deployments in the IFTTT ecosystem exhibit the potential for inter rule vulnerabilities. Combined, these efforts provide the insight into the real-world dangers of IoT deployment misconfigurations.
引用
收藏
页码:1439 / 1453
页数:15
相关论文
共 50 条
  • [1] Decentralized Action Integrity for Trigger-Action IoT Platforms
    Fernandes, Earlence
    Rahmati, Amir
    Jung, Jaeyeon
    Prakash, Atul
    [J]. 25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
  • [2] Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms
    Fan, Jingwen
    He, Yi
    Tang, Bo
    Li, Qi
    Sandhu, Ravi
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021), 2021,
  • [3] Cascading Threat Analysis of IoT Devices in Trigger-Action Platforms
    Li, Ke
    Wang, Haining
    Zhou, Ming
    Zhu, Hongsong
    Sun, Limin
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12240 - 12251
  • [4] On the Privacy Risks of Compromised Trigger-Action Platforms
    Chiang, Yu-Hsi
    Hsiao, Hsu-Chun
    Yu, Chia-Mu
    Kim, Tiffany Hyun-Jin
    [J]. COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 250 - 270
  • [5] Identifying Security and Privacy Violation Rules in Trigger-Action IoT Platforms With NLP Models
    Breve, Bernardo
    Cimino, Gaetano
    Deufemia, Vincenzo
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (06) : 5607 - 5622
  • [6] IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms
    Alam, Md Morshed
    Sajid, Md Sajidul Islam
    Wang, Weichao
    Wei, Jinpeng
    [J]. 2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2022, : 1695 - 1700
  • [7] IoTHaven: An Online Defense System to Mitigate Remote Injection Attacks in Trigger-action IoT Platforms
    Alam, Md Morshed
    Rahman, A. B. M. Mohaimenur
    Wang, Weichao
    [J]. 2024 IEEE 30TH INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS, LANMAN 2024, 2024, : 15 - 20
  • [8] Practical Data Access Minimization in Trigger-Action Platforms
    Chen, Yunang
    Alhanahnah, Mohannad
    Sabeljeld, Andrei
    Chatterjee, Rahul
    Fernandes, Earlence
    [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 2929 - 2945
  • [9] Reducing End-to-End Latency of Trigger-Action IoT Programs on Containerized Edge Platforms
    Zhang, Wenzhao
    Teng, Yixiao
    Gao, Yi
    Dong, Wei
    [J]. IEEE Transactions on Mobile Computing, 2024, 23 (12) : 13979 - 13990
  • [10] TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment
    Ban, Xinbo
    Ding, Ming
    Liu, Shigang
    Chen, Chao
    Zhang, Jun
    Xiang, Yang
    [J]. COMPUTER SECURITY: ESORICS 2021 INTERNATIONAL WORKSHOPS, 2022, 13106 : 218 - 237