论文标题
毒理:(在)智能建筑中企业物联网系统的安全实践
PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings
论文作者
论文摘要
物联网设备的兴起导致了全球智能建筑,办公室和房屋的扩散。尽管商品IoT设备由普通最终用户使用,但智能建筑,智能办公室,会议室或酒店等复杂环境需要定制且高度可靠的解决方案。那些称为企业互联网(EIOT)的系统将此类环境连接到Internet,并且是专业管理的解决方案,通常由专门的供应商提供。由于Eiot系统需要专门的培训,软件和设备进行部署,因此很少研究研究EIOT系统及其组件的安全性。实际上,诸如智能建筑物之类的智能设置中的EIOT系统为攻击者提供了前所未有且未开发的威胁向量。在这项工作中,我们探索了Eiot系统的脆弱性和不安全的发展实践。具体而言,专注于将驾驶员用作攻击机制的使用,并引入毒理,许多新型攻击表明攻击者可以轻松使用恶意驱动程序损害Eiot系统控制器。具体来说,我们展示了如何以系统的方式滥用将第三方设备集成到Eiot系统的驱动程序。为了证明攻击者的能力,我们使用真实的Eiot设备的测试床实施和评估毒理。我们表明,攻击者可以执行DOS攻击,获得遥控器以及恶意滥用EIOT系统的系统资源。据我们所知,这是第一项分析Eiot部署实践(IN)证券并证明本生态系统中相关脆弱性的工作。通过这项工作,我们提高了对Eiot系统使用的(IN)安全开发实践的认识,其后果在很大程度上会影响全球数百万EIOT系统的安全性,隐私,可靠性和性能。
The rise of IoT devices has led to the proliferation of smart buildings, offices, and homes worldwide. Although commodity IoT devices are employed by ordinary end-users, complex environments such as smart buildings, smart offices, conference rooms, or hospitality require customized and highly reliable solutions. Those systems called Enterprise Internet of Things (EIoT) connect such environments to the Internet and are professionally managed solutions usually offered by dedicated vendors. As EIoT systems require specialized training, software, and equipment to deploy, this has led to very little research investigating the security of EIoT systems and their components. In effect, EIoT systems in smart settings such as smart buildings present an unprecedented and unexplored threat vector for an attacker. In this work, we explore EIoT system vulnerabilities and insecure development practices. Specifically, focus on the usage of drivers as an attack mechanism, and introduce PoisonIvy, a number of novel attacks that demonstrate an attacker can easily compromise EIoT system controllers using malicious drivers. Specifically, we show how drivers used to integrate third-party devices to EIoT systems can be misused in a systematic fashion. To demonstrate the capabilities of attackers, we implement and evaluate PoisonIvy using a testbed of real EIoT devices. We show that an attacker can perform DoS attacks, gain remote control, and maliciously abuse system resources of EIoT systems. To the best of our knowledge, this is the first work to analyze the (in)securities of EIoT deployment practices and demonstrate the associated vulnerabilities in this ecosystem. With this work, we raise awareness on the (in)secure development practices used for EIoT systems, the consequences of which can largely impact the security, privacy, reliability, and performance of millions of EIoT systems worldwide.