Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3098243.3098251acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article
Public Access

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps

Published: 18 July 2017 Publication History

Abstract

A new development of smart-home systems is to use mobile apps to control IoT devices across a Home Area Network (HAN). As verified in our study, those systems tend to rely on the Wi-Fi router to authenticate other devices. This treatment exposes them to the attack from malicious apps, particularly those running on authorized phones, which the router does not have information to control. Mitigating this threat cannot solely rely on IoT manufacturers, which may need to change the hardware on the devices to support encryption, increasing the cost of the device, or software developers who we need to trust to implement security correctly. In this work, we present a new technique to control the communication between the IoT devices and their apps in a unified, backward-compatible way. Our approach, called HanGuard, does not require any changes to the IoT devices themselves, the IoT apps or the OS of the participating phones. HanGuard uses an SDN-like approach to offer fine-grained protection: each phone runs a non-system userspace Monitor app to identify the party that attempts to access the protected IoT device and inform the router through a control plane of its access decision; the router enforces the decision on the data plane after verifying whether the phone should be allowed to talk to the device. We implemented our design over both Android and iOS (> 95% of mobile OS market share) and a popular router. Our study shows that HanGuard is both efficient and effective in practice.

References

[1]
2008. ARM Security Technology. Technical Report. ARM Limited.
[2]
2015. ARM Strategic Report. Technical Report. ARM Limited.
[3]
2015. Internet of things research study. Technical Report. Hewlett-Packard Enterprise.
[4]
2015. iOS Security. Technical Report. Apple Inc.
[5]
Gail-Joon Ahn, Hongxin Hu, and Jing Jin. 2008. Towards Role-Based Authorization for OSGi Service Environments (FTDCS '08).
[6]
android.com. 2017. VpnService-Android Developers. http://goo.gl/0cKFyO. (2017).
[7]
Anonymous. 2017. Demo website. https://goo.gl/dfYeop. (2017).
[8]
G. Appenzeller, M. Roussopoulos, and M. Baker. 1999. User-friendly access control for public network ports (INFOCOM '99).
[9]
apple.com. 2017. Instruments: iOS performance analysis tool. https://goo.gl/6XnAXF. (2017).
[10]
apple.com. 2017. Xcode: Apple's IDE. https://goo.gl/TgMco6. (2017).
[11]
Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, and Konrad Rieck. 2014. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In NDSS.
[12]
Ahmed M. Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, and Wenbo Shen. 2014. Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World (CCS '14).
[13]
belkin.com. 2017. Belkin Netcam. http://goo.gl/60dfkg. (2017).
[14]
belkin.com. 2017. WeMo Insight Switch. http://goo.gl/0WGDFe. (2017).
[15]
belkin.com. 2017. WeMo Switch + Motion. https://goo.gl/sjUsi3. (2017).
[16]
Sven Bugiel, Stephen Heuser, and Ahmad-Reza Sadeghi. 2013. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies (USENIX Security 13).
[17]
Jonathan M Carlson, David Heckerman, and Guy Shani. 2009. Estimating false discovery rates for contingency tables. Microsoft Res (2009).
[18]
Eric Y Chen, Yutong Pei, Shuo Chen, Yuan Tian, Robert Kotcher, and Patrick Tague. 2014. Oauth demystified for mobile application developers. In CCS.
[19]
William R. Cheswick and Steven M. Bellovin. 1994. Firewalls and Internet Security: Repelling the Wily Hacker.
[20]
Andrei Costin, Jonas Zaddach, Aurélien Francillon, and Davide Balzarotti. 2014. A large-scale analysis of the security of embedded firmwares. In USENIX Security.
[21]
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, and Luca Salgarelli. 2007. Traffic Classification Through Simple Statistical Fingerprinting. SIGCOMM Comput. Commun. Rev. (2007).
[22]
darkreading.com. 2011. Firms Slow To Secure Flaws In Embedded Devices. http://goo.gl/b7Cltt. (2011).
[23]
S.R. Das, S. Chita, N. Peterson, B. Shirazi, and M. Bhadkamkar. 2011. Home automation and security for mobile devices (PERCOM Workshops '11).
[24]
Soteris Demetriou, Xiaoyong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, and Carl A. Gunter. 2015. What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. (NDSS '15).
[25]
Tamara Denning, Tadayoshi Kohno, and Henry M. Levy. 2013. Computer Security and the Modern Home. Commun. ACM (2013).
[26]
Earlence Fernandes, Jaeyeon Jung, and Atul Prakash. 2016. Security Analysis of Emerging Smart Home Applications. In IEEE Symposium on Security and Privacy.
[27]
Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, and Atul Prakash. 2016. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In USENIX Security Symposium.
[28]
Ronald A Fisher. 1922. On the interpretation of Χ 2 from contingency tables, and the calculation of P. Journal of the Royal Statistical Society (1922).
[29]
Gartner. 2015. Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015. http://goo.gl/L9ubfl. (2015).
[30]
github.com. 2017. Github: dex2jar. https://goo.gl/Hwx2WX. (2017).
[31]
C. Gomez and J. Paradells. 2010. Wireless home automation networks: A survey of architectures and technologies. Communications Magazine, IEEE (2010).
[32]
Dan Goodin. 2013. Welcome to the "Internet of Things" where even lights aren't hacker safe2 more wireless baby monitors hacked: Hackers remotely spied on babies and parents. http://goo.gl/l0qh05. (2013).
[33]
google.com. 2017. OnHub - Google. https://goo.gl/igIM5c. (2017).
[34]
Michael Grace, Yajin Zhou, Qiang Zhang, Shihong Zou, and Xuxian Jiang. 2012. RiskRanker: Scalable and Accurate Zero-day Android Malware Detection (MobiSys '12).
[35]
tim Greene. 2014. Spike malware toolkit can infect Windows, Linux and ARM-based Linux devices. http://goo.gl/KQgSyT. (2014).
[36]
Kashmir Hill. 2015. This guy's light bulb performed a DoS attack on his entire smart house. http://goo.gl/24skXK. (2015).
[37]
honeywell.com. 2017. Honeywell. http://goo.gl/9yuiTX. (2017).
[38]
ibabylabs.com. 2017. ibabylabs.com. https://goo.gl/y6Gdzd. (2017).
[39]
IDC. 2016. IDC: Smartphone OS Market Share. http://goo.gl/y1uN4Q. (2016).
[40]
indianexpress.com. 2016. Android malware 'Godless' has affected over 8.5 lakh devices globally. http://goo.gl/RE5ffK. (2016).
[41]
infinit.dk. 2012. Nabto. http://goo.gl/ApJo1G. (2012).
[42]
Suman Jana and Vitaly Shmatikov. 2012. Memento: Learning Secrets from Process Footprints. (SP '12).
[43]
J.M Jorup. 2016. "Internet of Things" security is hilariously broken and getting worse. http://goo.gl/PZgKN9. (2016).
[44]
P. Judge and M. Ammar. 2002. Gothic: a group access control architecture for secure multicast and anycast (INFOCOM '02).
[45]
Isaac Kelly. 2012. Hacking the WeMo WiFi switch Part 1. https://goo.gl/PKeO1A. (2012).
[46]
Insoon Kim. 2015. Is CCTV A Spy? Backdoor That Was Secretly Hidden In Chinese Products Were Found. http://goo.gl/3xQ7Dy. (2015).
[47]
Ji Eun Kim, G. Boulos, J. Yackovich, T. Barth, C. Beckel, and D. Mosse. 2012. Seamless Integration of Heterogeneous Devices and Access Control in Smart Homes (IE '12).
[48]
Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, and Jesse Walker. 2010. Challenges in Access Right Assignment for Secure Home Networks (HotSec'10).
[49]
D. Kreutz, F.M.V. Ramos, P. Esteves Verissimo, C. Esteve Rothenberg, S. Azodolmolky, and S. Uhlig. 2015. Software-Defined Networking: A Comprehensive Survey. Proc. IEEE (2015).
[50]
Anh Le, Janus Varmarken, Simon Langhoff, Anastasia Shuba, Minas Gjoka, and Athina Markopoulou. 2015. AntMonitor: A System for Monitoring from Mobile Devices (SIGCOMM '15).
[51]
A. Lioy, A. Pastor, F. Risso, R. Sassu, and A.L. Shaw. 2014. Offloading security applications into the network (eChallenges e-2014).
[52]
Sharon Machlis. 2015. IoT's dark side: Hundreds of unsecured devices open to attack. http://goo.gl/pM9TNk. (2015).
[53]
Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, and Srdjan Capkun. 2014. Smartphones as Practical and Secure Location Verification Tokens for Payments. In NDSS '14.
[54]
Michelle L. Mazurek, J. P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, Richard Shay, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Gregory R. Ganger, and Michael K. Reiter. 2010. Access Control for Home Data Sharing: Attitudes, Needs and Practices (CHI '10).
[55]
mcafee.com. 2013. Mobile Malware -The Rise Continues. http://goo.gl/3f1LP8. (2013).
[56]
microsoft.com. 2017. Azure IoT Hub - Microsoft Azure. https://goo.gl/RYZTGC. (2017).
[57]
myn3rd.com. 2017. My N3rd: CONNECT AND CONTROL ANYTHING FROM ANYWHERE. http://goo.gl/8gpa0D. (2017).
[58]
nabto.com. 2015. Nabto IoT Platform Specifications. https://goo.gl/SekiZV. (2015).
[59]
Muhammad Naveed, Xiao-yong Zhou, Soteris Demetriou, XiaoFeng Wang, and Carl A Gunter. 2014. Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android. In NDSS.
[60]
nest.com. 2017. Nest Protect. https://goo.gl/jM8ALk. (2017).
[61]
nest.com. 2017. Nest Thermostat. https://goo.gl/oSIFfQ. (2017).
[62]
Matte Noble. 2013. WeMo Hacking. http://goo.gl/C97vKv. (2013).
[63]
Sukhvir Notra, Muhammad Siddiqi, Hassan H. Gharakheili, Vijay Sivaraman, and Roksana Boreli. 2014. An Experimental Study of Security and Privacy Risks with Emerging Household Appliances (M2MSec '14).
[64]
Pierluigi Paganini. 2013. Internet of Things - Symantec has discovered a new Linux worm. http://goo.gl/DwPGnM. (2013).
[65]
Danny Palmer. 2016. This Android malware has infected 85 million devices and makes its creators 300,000 a month. http://goo.gl/4YbaWg. (2016).
[66]
Sue Marquette Poremba. 2016. Studies Show Rise of the Mobile Malware Threat. http://goo.gl/VfUKB4. (2016).
[67]
Jacob Poushter. 2016. Smartphone Ownership and Internet Usage Continues to Climb in Emerging Economies. Pew Research Center: Global Attitudes & Trends (2016).
[68]
qualcomm.com. 2017. Trepn Power Profiler. https://goo.gl/KGrswV. (2017).
[69]
Juha Saarinen. 2014. Vendors slow to patch OpenSSL vulnerabilities. http://goo.gl/9EFXAT. (2014).
[70]
samsung.com. 2017. Samsung Family Hub Refrigerator. http://goo.gl/ddwlxb. (2017).
[71]
securityfocus.com. 2013. Belkin WiFi NetCam video stream backdoor with unchangeable admin/admin credentials. http://goo.gl/XnmwAk. (2013).
[72]
securityintelligence.com. 2015. 2015 Mobile Threat Report - The Rise of Mobile Malware. https://goo.gl/lhZ1yb. (2015).
[73]
Sergey Shekyan and Artem Hartutyunyan. 2013. Watching the watchers:hacking wireless IP security cameras. In HITB.
[74]
shodan.io. 2017. Shodan. https://goo.gl/vUL10K. (2017).
[75]
Vijay Sivaraman, Dominic Chan, Dylan Earl, and Roksana Boreli. 2016. Smart-Phones Attacking Smart-Homes (WiSec '16).
[76]
Vijay Sivaraman, Hassan Habibi Gharakheili, Arun Vishwanath, Roksana Boreli, and Olivier Mehani. 2015. Network-level security and privacy control for smart-home IoT devices (WiMob '15).
[77]
Stephen Smalley and Robert Craig. 2013. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. (NDSS '13).
[78]
Stephen Smalley and Robert Craig. 2013. Security Enhanced (SE) Android: Bringing Flexible MAC to Android (NDSS '13).
[79]
Ms. Smith. 2013. Eavesdropping made easy: Remote spying with WeMo Baby and an iPhone. http://goo.gl/OUxdUy. (2013).
[80]
Ms. Smith. 2014. 500,000 Belkin WeMo users could be hacked; CERT issues advisory. http://goo.gl/HBN9HB. (2014).
[81]
Howard Solomon. 2016. Mobile malware, unpatched Android devices are increasing problems say studies. http://goo.gl/EUGmDC. (2016).
[82]
Mark Stanislav and Tod Beardsley. 2015. HACKING IoT: A Case Study on Baby Monitor Exposures and Vulnerabilities. https://goo.gl/Uh7y4e. (2015).
[83]
statista.com. 2016. Number of apps available in leading app stores as of June 2016. http://goo.gl/LO6umz. (2016).
[84]
statista.com. 2017. Android version market share distribution among smartphone owners as of September 2016. http://goo.gl/vMm2t2. (2017).
[85]
Darlene Storm. 2015. 2 more wireless baby monitors hacked: Hackers remotely spied on babies and parents. http://goo.gl/UIbWvA. (2015).
[86]
Darlene Storm. 2015. Eerie music coming from wireless baby cam; is it a haunting? No, it's a hacker. http://goo.gl/49Larp. (2015).
[87]
He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, and Sushil Jajodia. 2014. TrustDump: Reliable Memory Acquisition on Smartphones (ESORICS '14).
[88]
theverge.com. 2012. Square updates its credit card reader to include hardware encryption. http://goo.gl/G0Vji7. (2012).
[89]
throughtek.com. 2015. Kalay Platform. http://goo.gl/t9oGM3. (2015).
[90]
Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2013. The Current State of Access Control for Smart Devices in Homes (HUPS '13).
[91]
weaved.com. 2015. Weaved Remote Connections. https://goo.gl/elBwS3. (2015).
[92]
Fengguo Wei, Sankardas Roy, Xinming Ou, and others. 2014. Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps. In CCS.
[93]
Johannes Winter. 2008. Trusted computing building blocks for embedded linux-based ARM trustzone platforms. In STC '08.
[94]
Ryszard Winiewski and Tumbleson. 2017. A tool for reverse engineering Android apk files. http://goo.gl/26AzzN. (2017).
[95]
yahoo.com. 2014. Proofpoint Uncovers Internet of Things (IoT) Cyberattack. http://goo.gl/GBqies. (2014).
[96]
Nan Zhang, Kan Yuan, Muhammad Naveed, Xiaoyong Zhou, and XiaoFeng Wang. 2015. Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android. (IEEE Symposium on Security and Privacy).
[97]
Wu Zhou, Yajin Zhou, Xuxian Jiang, and Peng Ning. 2012. Detecting Repackaged Smartphone Applications in Third-party Android Marketplaces (CODASPY '12).
[98]
Xiaoyong Zhou, Soteris Demetriou, Dongjing He, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Carl A. Gunter, and Klara Nahrstedt. 2013. Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources (CCS '13).
[99]
Yajin Zhou and Xuxian Jiang. 2012. Dissecting Android Malware: Characterization and Evolution (SP).
[100]
Yajin Zhou and Xuxian Jiang. 2013. Detecting Passive Content Leaks and Pollution in Android Applications (NDSS '13).

Cited By

View all
  • (2024)Securing Internet of Things Applications Using Software-Defined Network-Aided Group Key Management with a Modified One-Way Function TreeApplied Sciences10.3390/app1406240514:6(2405)Online publication date: 13-Mar-2024
  • (2024)Knowledge-based Cyber Physical Security at Smart Home: A ReviewACM Computing Surveys10.1145/369876857:3(1-36)Online publication date: 11-Nov-2024
  • (2024)A Usability Study on the creation of Intrusion Detection Rules on IoT NetworksProceedings of the ACM/IEEE 6th International Workshop on Software Engineering Research & Practices for the Internet of Things10.1145/3643794.3648281(73-80)Online publication date: 20-Apr-2024
  • Show More Cited By

Index Terms

  1. HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WiSec '17: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
    July 2017
    297 pages
    ISBN:9781450350846
    DOI:10.1145/3098243
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 July 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Android
    2. IoT
    3. iOS
    4. security
    5. wireless networks

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    WiSec '17
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 98 of 338 submissions, 29%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)208
    • Downloads (Last 6 weeks)15
    Reflects downloads up to 26 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Securing Internet of Things Applications Using Software-Defined Network-Aided Group Key Management with a Modified One-Way Function TreeApplied Sciences10.3390/app1406240514:6(2405)Online publication date: 13-Mar-2024
    • (2024)Knowledge-based Cyber Physical Security at Smart Home: A ReviewACM Computing Surveys10.1145/369876857:3(1-36)Online publication date: 11-Nov-2024
    • (2024)A Usability Study on the creation of Intrusion Detection Rules on IoT NetworksProceedings of the ACM/IEEE 6th International Workshop on Software Engineering Research & Practices for the Internet of Things10.1145/3643794.3648281(73-80)Online publication date: 20-Apr-2024
    • (2024)Station: Gesture-Based Authentication for Voice InterfacesIEEE Internet of Things Journal10.1109/JIOT.2024.338272111:12(22668-22683)Online publication date: 15-Jun-2024
    • (2024)A Closer Look at Access Control in Multi-User Voice SystemsIEEE Access10.1109/ACCESS.2024.337914112(40933-40946)Online publication date: 2024
    • (2024)SDN-based multi-level framework for smart home servicesMultimedia Tools and Applications10.1007/s11042-023-15678-283:1(327-347)Online publication date: 1-Jan-2024
    • (2023)Niffler: Real-time Device-level Anomalies Detection in Smart HomeACM Transactions on the Web10.1145/358607317:3(1-27)Online publication date: 1-Mar-2023
    • (2023)SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT PlatformIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.316231220:2(1656-1674)Online publication date: 1-Mar-2023
    • (2023)By Your Command: Extracting the User Actions that Create Network Flows in Android2023 14th International Conference on Network of the Future (NoF)10.1109/NoF58724.2023.10302820(118-122)Online publication date: 4-Oct-2023
    • (2023)Secure Model for Dynamic Access Control and Unreliable Access Point Detection: Enhancing QoS Through SDN in Wireless NetworksSN Computer Science10.1007/s42979-023-02407-75:1Online publication date: 8-Dec-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media