Make it and Break it: An IoT Smart Home Testbed Case Study

M. Yamin, Basel Katt, Espen Torseth, V. Gkioulos, S. Kowalski
{"title":"Make it and Break it: An IoT Smart Home Testbed Case Study","authors":"M. Yamin, Basel Katt, Espen Torseth, V. Gkioulos, S. Kowalski","doi":"10.1145/3284557.3284743","DOIUrl":null,"url":null,"abstract":"Education in the information security domain increasingly integrates practical hands-on training; where exercises focusing on secure cyber operations and secure software development are used for training the participants in designing and building secure systems. These exercises utilize multiple approaches in their context, such as capture the flag, attack/defense, reverse engineering, and incident response, while they are conducted on specifically created testbeds that by design integrate vulnerabilities to support the training scenarios. However, these exercises represent only the perspective of the attacker and/or the defender, without reflecting the perspective of the designer, while they statistically have primary focus on network security. In this article, we argue that the best way to understand the consequences of insecure design and development is to combine engineering and exploitation activities in one exercise, proposing the use of \"Make it and break it\" type of exercises for security training in cyber physical systems. Accordingly, we conducted a case study for validation and verification, the results of which are presented in this article. The case study was performed over the period of two days, during the training boot camp of the Norwegian national team for the European cyber security challenge 2018. During the boot camp, the team has been separated into two groups, which were challenged to design and build an IoT (Internet of Things) smart home using secure design principles, and then attack each other in order to identify security weaknesses. Pre and post-exercise surveys have been conducted, and the feedback from the participants was used in order to evaluate the effectiveness of the exercise, as a pilot towards further development and optimization.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3284557.3284743","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

Education in the information security domain increasingly integrates practical hands-on training; where exercises focusing on secure cyber operations and secure software development are used for training the participants in designing and building secure systems. These exercises utilize multiple approaches in their context, such as capture the flag, attack/defense, reverse engineering, and incident response, while they are conducted on specifically created testbeds that by design integrate vulnerabilities to support the training scenarios. However, these exercises represent only the perspective of the attacker and/or the defender, without reflecting the perspective of the designer, while they statistically have primary focus on network security. In this article, we argue that the best way to understand the consequences of insecure design and development is to combine engineering and exploitation activities in one exercise, proposing the use of "Make it and break it" type of exercises for security training in cyber physical systems. Accordingly, we conducted a case study for validation and verification, the results of which are presented in this article. The case study was performed over the period of two days, during the training boot camp of the Norwegian national team for the European cyber security challenge 2018. During the boot camp, the team has been separated into two groups, which were challenged to design and build an IoT (Internet of Things) smart home using secure design principles, and then attack each other in order to identify security weaknesses. Pre and post-exercise surveys have been conducted, and the feedback from the participants was used in order to evaluate the effectiveness of the exercise, as a pilot towards further development and optimization.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
创造和打破它:物联网智能家居测试平台案例研究
信息安全领域的教育越来越多地整合了实际操作培训;以安全网络操作和安全软件开发为重点的练习,用于培训参与者设计和构建安全系统。这些练习在其上下文中利用多种方法,例如捕获标志、攻击/防御、逆向工程和事件响应,而它们是在专门创建的测试台上进行的,这些测试台上通过设计集成漏洞来支持训练场景。然而,这些练习只代表了攻击者和/或防御者的观点,而没有反映设计者的观点,而它们在统计上主要关注网络安全。在本文中,我们认为理解不安全设计和开发的后果的最佳方法是将工程和开发活动结合在一个练习中,建议在网络物理系统的安全培训中使用“制造和破坏”类型的练习。因此,我们进行了一个验证和验证的案例研究,其结果将在本文中给出。该案例研究在挪威国家队参加2018年欧洲网络安全挑战训练营期间进行了为期两天的研究。在训练营期间,团队被分成两组,他们的挑战是使用安全设计原则设计和构建IoT(物联网)智能家居,然后相互攻击以识别安全弱点。我们进行了运动前和运动后的调查,并利用参与者的反馈来评估运动的有效性,作为进一步发展和优化的试点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Development of 2 DOF Truck's Suspension Seat for Improving Ride Comfort A Case Study on Granularity of Industrial Vision Services Design of Digital Pressure Measuring System Based on Bmp085 Robust and Efficient Text: Line Extraction by Local Minimal Sub-Seams A Study of the Security Problems of Wireless Sensor Networks into the Context of the Internet of Things
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1