Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things
Title | Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Agadakos, Ioannis, Chen, Chien-Ying, Campanelli, Matteo, Anantharaman, Prashant, Hasan, Monowar, Copos, Bogdan, Lepoint, Tancrède, Locasto, Michael, Ciocarlie, Gabriela F., Lindqvist, Ulf |
Conference Name | Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy |
Date Published | November 2017 |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-5394-6 |
Keywords | Air gaps, alloy, composability, control theory, cyber physical systems, device interaction modeling, Human Behavior, human factors, Internet of Things, Metrics, privacy, pubcrawl, resilience, Resiliency, Security and Privacy |
Abstract | The proliferation of Internet-of-Things (IoT) devices within homes raises many security and privacy concerns. Recent headlines highlight the lack of effective security mechanisms in IoT devices. Security threats in IoT arise not only from vulnerabilities in individual devices but also from the composition of devices in unanticipated ways and the ability of devices to interact through both cyber and physical channels. Existing approaches provide methods for monitoring cyber interactions between devices but fail to consider possible physical interactions. To overcome this challenge, it is essential that security assessments of IoT networks take a holistic view of the network and treat it as a "system of systems", in which security is defined, not solely by the individual systems, but also by the interactions and trust dependencies between systems. In this paper, we propose a way of modeling cyber and physical interactions between IoT devices of a given network. By verifying the cyber and physical interactions against user-defined policies, our model can identify unexpected chains of events that may be harmful. It can also be applied to determine the impact of the addition (or removal) of a device into an existing network with respect to dangerous device interactions. We demonstrate the viability of our approach by instantiating our model using Alloy, a language and tool for relational models. In our evaluation, we considered three realistic IoT use cases and demonstrate that our model is capable of identifying potentially dangerous device interactions. We also measure the performance of our approach with respect to the CPU runtime and memory consumption of the Alloy model finder, and show that it is acceptable for smart-home IoT networks. |
URL | https://dl.acm.org/citation.cfm?doid=3140241.3140252 |
DOI | 10.1145/3140241.3140252 |
Citation Key | agadakos_jumping_2017 |