1. Scrutinizing Implementations of Smart Home Integrations
- Author
-
Ling Shi, Zhenkai Liang, Kailong Wang, Yan Liu, Guangdong Bai, Kulani Mahadewa, and Jin Song Dong
- Subjects
Security analysis ,business.industry ,Computer science ,Vulnerability ,020207 software engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Credential ,Personalization ,Attack model ,Home automation ,0202 electrical engineering, electronic engineering, information engineering ,Information system ,Communications protocol ,business ,Implementation ,computer ,Software - Abstract
A key feature of the booming smart home is the integration of a wide assortment of technologies, including various standards, proprietary communication protocols and heterogeneous platforms. Due to customization, unsatisfied assumptions and incompatibility in the integration, critical security vulnerabilities are likely to be introduced by the integration. Hence, this work addresses the security problems in smart home systems from an integration perspective, as a complement to numerous studies that focus on the analysis of individual technologies. We propose HOMESCAN, an approach that examines the security of the implementations of smart home systems. It extracts the abstract specification of application-layer protocols and internal behaviors of entities, so that it is able to conduct an end-to-end security analysis against various attack models. Applying HOMESCAN on three extensively-used smart home systems, we have found twelve non-trivial security vulnerabilities, which may lead to unauthorized remote control and credential leakage.
- Published
- 2021
- Full Text
- View/download PDF