7 CONCLUSION AND FUTURE
WORK
We presented a practical method supported by open
source tools that can identify high risk vulnerabilities
present in smart home IoT devices. By following this
method manufacturers and advanced users can test if
their devices are vulnerable to the most common vul-
nerabilities that are being exploited in cyberattacks.
Applying this method we were able to identify vul-
nerabilities in two test devices. By exploring some
of those vulnerabilities, we were able to control one
of the devices without authentication. We were also
able to identify vulnerabilities without physical ac-
cess to a device. These vulnerabilities can potentially
be exploited through the internet since thousands of
devices were identified in the Shodan database.
For future work we would like to develop specific
tools that could help automate the traffic analysis sec-
tion of the method. It would also be interesting to ap-
ply the method to different IoT ecosystems to further
test its applicability or even to introduce new stages
or steps in the proposed method.
REFERENCES
Al-Qaseemi, S. A., Almulhim, H. A., Almulhim, M. F., and
Chaudhry, S. R. (2017). IoT architecture challenges
and issues: Lack of standardization. In FTC 2016 -
Proc. of Future Technologies Conference, San Fran-
cisco, CA, USA. IEEE.
Antonakakis, M., April, T., Bailey, M., Bursztein, E.,
Cochran, J., Durumeric, Z., Alex Halderman, J.,
Menscher, D., Seaman, C., Sullivan, N., Thomas,
K., Zhou, Y., Antonakakis Tim April, M., Bernhard
Elie Bursztein, M., Cochran Zakir Durumeric Alex
Halderman Luca Invernizzi, J. J., Kallitsis, M., Ku-
mar, D., Lever Zane Ma, C., Mason, J., and Sullivan
Kurt Thomas, N. (2017). Understanding the Mirai
Botnet. In SEC’17 Proc. of the 26th USENIX Confer-
ence on Security Symposium, Vancouver, BC, Canada.
USENIX Association Berkeley.
Barcena, M. and Wueest, C. (2015). Insecurity in the Inter-
net of Things. Technical report, Symantec.
Bing, K., Fu, L., Zhuo, Y., and Yanlei, L. (2011). Design
of an IoT-based smart home system. In 2011 2nd Int.
Conf. on Intelligent Control and Information Process-
ing, Harbin, China. IEEE.
Briodagh, K. (2018). HomeGrid Forum Calls for Standard-
ization and Certification of Devices.
calsoft (2018). Internet of Things (IoT) 2018-Market Statis-
tics, Use Cases and Trends. Technical report, calsoft.
Denning, T., Kohno, T., and Levy, H. M. (2013). Computer
security and the modern home. Communications of
the ACM, 56(1).
Department for Digital, Culture, Media and Sport (DCMS)
(2018). Code of Practice for consumer IoT security.
Technical report.
Dorsey, B. (2018). Attacking Private Networks from the
Internet with DNS Rebinding.
Embedi (2018). Reflecting upon OWASP TOP-10 IoT Vul-
nerabilities – Embedi.
Ghaffarianhoseini, A., Ghaffarianhoseini, A., Tookey, J.,
Omrany, H., Fleury, A., Naismith, N., and Ghaf-
farianhoseini, M. (2016). The Essence of Smart
Homes: Application of Intelligent Technologies to-
wards Smarter Urban Future. In Creative Technolo-
gies for Multidisciplinary Applications, chapter 14.
IGI Global, Hershey, PA.
Gupta, A. (2017). IoT Hackers Handbook. Attify, 1 edition.
Haritha, A. and Lavanya, A. (2017). Internet of Things:
Security Issues. International Journal of Engineering
Science Invention ISSN (Online), 6(11).
Hiner, J. (2018). New research: Most IoT devices can be
hacked into botnets - TechRepublic.
Khan, M. A. and Salah, K. (2018). IoT security: Review,
blockchain solutions, and open challenges. Future
Generation Computer Systems, 82.
Leite Da Silva, C. (2017). Ragnar: Ferramenta para Pen-
test em dispositivos da Internet das Coisas. PhD the-
sis, Universidade de Bras
´
ılia.
Loi, F., Sivanathan, A., Gharakheili, H. H., Radford, A.,
and Sivaraman, V. (2017). Systematically Evaluating
Security and Privacy for Consumer IoT Devices. In
Proc. of the 2017 Workshop on IoT Security and Pri-
vacy - IoTS&P ’17, Dallas, Texas, USA. ACM New
York.
Martins, R. (2018). Desenvolvimento de uma Framework
para Investigac¸
˜
ao de Vulnerabilidades em Disposi-
tivos de Internet das Coisas. PhD thesis, Universidade
Estadual de Londrina.
Newman, L. (2018). Millions of Google, Roku, and Sonos
Devices Are Vulnerable to a Web Attack — WIRED.
Omg (2017). OMG Unified Modeling Language (OMG
UML). Technical report.
OWASP. IoT Firmware Analysis - OWASP.
OWASP. OWASP Internet of Things Project - OWASP.
Perez, Y. (2018). Smart home device ownership ’to rise by
2022’.
Pesce, L. (2017). Sans webcast: I don t give one iota -
introducing the iot attack methodology - youtube.
Schiefer, M. (2015). Smart Home Definition and Secu-
rity Threats. In Proc.- 9th Int. Conf. on IT Security
Incident Management and IT Forensics, IMF 2015,
Magdeburg, Germany. IEEE.
Soltan, S., Mittal, P., and Poor, H. V. (2018). Black-
IoT: IoT Botnet of High Wattage Devices Can Dis-
rupt the Power Grid. In USENIX Security Symposium.
USENIX.
Visoottiviseth, V., Akarasiriwong, P., Chaiyasart, S., and
Chotivatunyu, S. (2017). PENTOS: Penetration Test-
ing Tool for Internet of Thing Devices. In IEEE Re-
gion 10 Conference (TENCON).
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy
622