Главная
Study mode:
on
1
Intro
2
Interactions involved in Smart Home Platform
3
Example 1- Phantom Device Substitution Attack
4
Deep Cause for phantom device attack
5
Analyzing the Deep Cause
6
Analyzing the Interaction
7
Challenge 1: Decrypting the Interaction
8
State Machines of Three Entities
9
Identifying Unexpected State Transitions
10
Flaw 1: Insufficient State Guard
11
Identified Attacks
12
Flaw 2 illegal State Combination
13
Example 2: Phantom Device Hijacking Attack
14
Mitigation Suggestions
15
State Machine Enforcement
16
Conclusion
Description:
Explore a comprehensive security analysis of smart home platforms in this 22-minute USENIX Security '19 conference talk. Delve into the complex interactions between IoT devices, mobile apps, and cloud services, uncovering potential vulnerabilities in widely-used smart home systems. Learn about reverse-engineering techniques, including firmware analysis, network traffic interception, and blackbox testing, used to create state transition diagrams for smart home entities. Discover how unexpected state transitions can lead to new vulnerabilities, and understand the implementation of phantom devices to trigger and confirm these security risks. Gain insights into specific attack examples, such as Phantom Device Substitution and Phantom Device Hijacking, and explore their underlying causes. Conclude with mitigation suggestions, including state machine enforcement, to enhance the security of smart home platforms.

Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms

USENIX
Add to list
0:00 / 0:00