skip to main content
10.1145/2939918.2939925acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper

Smart-Phones Attacking Smart-Homes

Published:18 July 2016Publication History

ABSTRACT

The explosion in Internet-connected household devices, such as light-bulbs, smoke-alarms, power-switches, and webcams, is creating new vectors for attacking "smart-homes" at an unprecedented scale. Common perception is that smart-home IoT devices are protected from Internet attacks by the perimeter security offered by home routers. In this paper we demonstrate how an attacker can infiltrate the home network via a doctored smart-phone app. Unbeknownst to the user, this app scouts for vulnerable IoT devices within the home, reports them to an external entity, and modifies the firewall to allow the external entity to directly attack the IoT device. The ability to infiltrate smart-homes via doctored smart-phone apps demonstrates that home routers are poor protection against Internet attacks and highlights the need for increased security for IoT devices.

References

  1. IEEE P2413 Standard for an Architectural Framework for IoT. http://grouper.ieee.org/groups/2413/Intro-to-IEEE-P2413.pdf.Google ScholarGoogle Scholar
  2. M2I Security Framework. http://www.m2isf.com/.Google ScholarGoogle Scholar
  3. Online Trust Alliance. https://otalliance.org/.Google ScholarGoogle Scholar
  4. DD4BC Group Targets Companies with Ransom-Driven DDoS Attacks. http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/dd4bc-group-targets-companies-with-ransom-driven-ddos-attacks/, Jun 2015.Google ScholarGoogle Scholar
  5. Google's first Brillo and Weave partners introduced at CES. http://www.digitaltrends.com/home/google-iot-brillo-weave-partners/, Jan 2016.Google ScholarGoogle Scholar
  6. Arxan Technologies. State of Application Security Report. https://www.arxan.com/wp-content/uploads/2015/06/State-of-Application-Security-Report-Vol-4-2015.pdf, Jun 2015.Google ScholarGoogle Scholar
  7. C. Ellison. UPnP Device Security: Service Template. http://upnp.org/specs/sec/UPnP-sec-DeviceSecurity-v1-Service.pdf, Nov 2003.Google ScholarGoogle Scholar
  8. Claud Xiao. More Details on the XcodeGhost Malware and Affected iOS Apps. http://researchcenter. paloaltonetworks.com/2015/09/more-details-on-the-xcodeghost-malware-and-affected-ios-apps/, Sep 2015.Google ScholarGoogle Scholar
  9. ExtremeTech. Philips Hue LED smart lights hacked, home blacked out by security researcher. http://www.extremetech.com/electronics/163972-philips-hue-led-smart-lights-hacked-whole-homes-blacked-out-by-security-researcher, 2013.Google ScholarGoogle Scholar
  10. Forbes. Baby Monitor Hacker Still Terrorizing Babies And Their Parents. http://www.forbes.com/sites/kashmirhill/2014/04/29/baby-monitor-hacker-still-terrorizing-babies-and-their-parents/#7784ae4817e2, 2014.Google ScholarGoogle Scholar
  11. Gartner. Gartner Says 4.9 Billion Connected "Things" Will Be in Use in 2015. http://www.gartner.com/newsroom/id/2905717, Nov 2014.Google ScholarGoogle Scholar
  12. S. Grover and N. Feamster. The Internet of Unpatched Things. In Proc. FTC PrivacyCon, Jan 2016.Google ScholarGoogle Scholar
  13. A. A. M. M. Haque. UPnP Networking: Architecture and Security Issues. In Proc. TKK Seminar on Network Security, Nov 2007.Google ScholarGoogle Scholar
  14. iControl. State of the Smart Home. http://www.icontrol.com/docs/pdf/2014 State of the Smart Home-Final.pdf, 2014.Google ScholarGoogle Scholar
  15. Isaac Kelly. Hacking the WeMo Switch. https://github.com/issackelly/wemo, 2012.Google ScholarGoogle Scholar
  16. NetworkWorld. 500,000 Belkin WeMo users could be hacked; CERT issues advisory. http://www.networkworld.com/article/2226371/microsoft-subnet/500-000-belkin-wemo-users-could-be-hacked--cert-issues-advisory.html, 2014.Google ScholarGoogle Scholar
  17. B. News. Fridge Sends Spam Emails as Attack Hits Smart Gadgets. http://www.bbc.com/news/technology-25780908, 2014.Google ScholarGoogle Scholar
  18. Nokia. Threat Intelligence Report. http://resources.alcatel-lucent.com/asset/193174, H2 2015.Google ScholarGoogle Scholar
  19. S. Notra, M. Siddiqi, H. H. Gharakheili, V. Sivaraman, and R. Boreli. An Experimental Study of Security and Privacy Risks with Emerging Household Appliances. In Proc. International Workshop on Security and Privacy in Machine-to-Machine Communications (M2MSec), Oct 2014.Google ScholarGoogle ScholarCross RefCross Ref
  20. T. Sales, L. Sales, H. Almeida, and A. Perkusich. A UPnP extension for enabling user authentication and authorization in pervasive systems. Journal of the Brazilian Computer Society, 16(4):261--277, Nov 2010.Google ScholarGoogle ScholarCross RefCross Ref
  21. V. Sivaraman, H. H. Gharakheili, A. Vishwanath, R. Boreli, and O. Mehani. Network-Level Security and Privacy Control for Smart-Home IoT Devices. In Proc. IEEE WiMoB Workshop on Internet of Things Communications and Technologies (IoT-CT), Oct 2015.Google ScholarGoogle ScholarCross RefCross Ref
  22. T. Yu, V. Sekar, S. Sheshan, Y. Agarwal, and C. Xu. Handling a Trillion (Unfiable) Flaws on a Billion Devices: Rethinking Network Security for the Internet-of-Things. In Proc. ACM HotNets, Nov 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Smart-Phones Attacking Smart-Homes

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks
        July 2016
        242 pages
        ISBN:9781450342704
        DOI:10.1145/2939918

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 July 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Acceptance Rates

        WiSec '16 Paper Acceptance Rate13of51submissions,25%Overall Acceptance Rate98of338submissions,29%

        Upcoming Conference

        WiSec '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader