Back to Search
Start Over
Security in Centralized Data Store-based Home Automation Platforms
- Source :
- ACM Transactions on Cyber-Physical Systems. 5:1-27
- Publication Year :
- 2020
- Publisher :
- Association for Computing Machinery (ACM), 2020.
-
Abstract
- Home automation platforms enable consumers to conveniently automate various physical aspects of their homes. However, the security flaws in the platforms or integrated third-party products can have serious security and safety implications for the user’s physical environment. This article describes our systematic security evaluation of two popular smart home platforms, Google’s Nest platform and Philips Hue, which implement home automation “routines” (i.e., trigger-action programs involving apps and devices) via manipulation of state variables in a centralized data store . Our semi-automated analysis examines, among other things, platform access control enforcement, the rigor of non-system enforcement procedures, and the potential for misuse of routines, and it leads to 11 key findings with serious security implications. We combine several of the vulnerabilities we find to demonstrate the first end-to-end instance of lateral privilege escalation in the smart home, wherein we remotely disable the Nest Security Camera via a compromised light switch app. Finally, we discuss potential defenses, and the impact of the continuous evolution of smart home platforms on the practicality of security analysis. Our findings draw attention to the unique security challenges of smart home platforms and highlight the importance of enforcing security by design.
- Subjects :
- 0303 health sciences
Security analysis
Control and Optimization
Computer Networks and Communications
business.industry
Computer science
020207 software engineering
Access control
02 engineering and technology
Computer security
computer.software_genre
Secure by design
Human-Computer Interaction
03 medical and health sciences
Data store
Artificial Intelligence
Hardware and Architecture
Home automation
0202 electrical engineering, electronic engineering, information engineering
Key (cryptography)
Enforcement
business
computer
Privilege escalation
030304 developmental biology
Subjects
Details
- ISSN :
- 23789638 and 2378962X
- Volume :
- 5
- Database :
- OpenAIRE
- Journal :
- ACM Transactions on Cyber-Physical Systems
- Accession number :
- edsair.doi...........3705b1829e798358f1150f8d7e966448
- Full Text :
- https://doi.org/10.1145/3418286