Smart-Phones Attacking Smart-Homes
Title | Smart-Phones Attacking Smart-Homes |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Sivaraman, Vijay, Chan, Dominic, Earl, Dylan, Boreli, Roksana |
Conference Name | Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4270-4 |
Keywords | home router nat/firewall, Metrics, pubcrawl, Resiliency, Router Systems Security, smart-phone malware, upnp |
Abstract | The explosion in Internet-connected household devices, such as light-bulbs, smoke-alarms, power-switches, and webcams, is creating new vectors for attacking "smart-homes" at an unprecedented scale. Common perception is that smart-home IoT devices are protected from Internet attacks by the perimeter security offered by home routers. In this paper we demonstrate how an attacker can infiltrate the home network via a doctored smart-phone app. Unbeknownst to the user, this app scouts for vulnerable IoT devices within the home, reports them to an external entity, and modifies the firewall to allow the external entity to directly attack the IoT device. The ability to infiltrate smart-homes via doctored smart-phone apps demonstrates that home routers are poor protection against Internet attacks and highlights the need for increased security for IoT devices. |
URL | http://doi.acm.org/10.1145/2939918.2939925 |
DOI | 10.1145/2939918.2939925 |
Citation Key | sivaraman_smart-phones_2016 |