Multi-Platform Application Interaction Extraction for IoT Devices

作者: Zhao Chen , Fanping Zeng , Tingting Lu , Wenjuan Shu

DOI: 10.1109/ICPADS47876.2019.00151

关键词:

摘要: IoT devices used in smart home have become a fundamental part of modern society. Such enable our living space to be more convenient. This enables human interaction with physical environment, also happens between two applications or others third-party rules addition, and causes some unexpected automation, even safety concerns. What's worse is that attackers can leverage stealthy interactions launch attacks against systems steal user privacy. In this paper, we propose tool called IoTIE discovers any possible extract all potential across the environment. And present comprehensive system evaluation on Samsung SmartThings IFTTT platform. We study 187 official 98 rules, find they form 231 hidden inter-app through environments. particular, experiment reveals 74 are highly risky could potentially exploited impact security

参考文章(13)
Edward Loper, Steven Bird, NLTK Proceedings of the ACL-02 Workshop on Effective tools and methodologies for teaching natural language processing and computational linguistics -. pp. 69- 72 ,(2002) , 10.3115/1118108.1118117
Amir Rahmati, Justin Paupore, Earlence Fernandes, Mauro Conti, Atul Prakash, Daniel Simionato, FlowFence: practical data protection for emerging IoT application frameworks usenix security symposium. pp. 531- 548 ,(2016)
Earlence Fernandes, Jaeyeon Jung, Atul Prakash, Security Analysis of Emerging Smart Home Applications 2016 IEEE Symposium on Security and Privacy (SP). pp. 636- 654 ,(2016) , 10.1109/SP.2016.44
Amir Rahmati, Earlence Fernandes, Jaeyeon Jung, Atul Prakash, Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things. arXiv: Cryptography and Security. ,(2017)
Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu, DolphinAttack: Inaudible Voice Commands computer and communications security. pp. 103- 117 ,(2017) , 10.1145/3133956.3134052
Qi Wang, Wajih Ul Hassan, Adam Bates, Carl Gunter, Fear and Logging in the Internet of Things. network and distributed system security symposium. ,(2018) , 10.14722/NDSS.2018.23282
Haitham Hassanieh, Romit Roy Choudhury, Nirupam Roy, Sheng Shen, Inaudible Voice Commands: The Long-Range Attack and Defense networked systems design and implementation. pp. 547- 560 ,(2018)
Xiaojiang Du, Qiang Zeng, Jiaping Yu, Haotian Chi, Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling arXiv: Cryptography and Security. ,(2018)
Wenbo Ding, Hongxin Hu, On the Safety of IoT Device Physical Interaction Control computer and communications security. pp. 832- 846 ,(2018) , 10.1145/3243734.3243865
Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Patrick McDaniel, IotSan: fortifying the safety of IoT systems conference on emerging network experiment and technology. pp. 191- 203 ,(2018) , 10.1145/3281411.3281440