首页 > 最新文献

Proceedings of the 2017 Workshop on Internet of Things Security and Privacy最新文献

英文 中文
Sexual Intimacy in the Age of Smart Devices: Are We Practicing Safe IoT? 智能设备时代的性亲密:我们在实践安全的物联网吗?
Pub Date : 2017-11-03 DOI: 10.1145/3139937.3139942
Matthew Wynn, Kyle Tillotson, Ryan Kao, Andrea Calderon, A. Murillo, Javier Camargo, Rafael Mantilla, Brahian Rangel, A. Cárdenas, S. Rueda
Sexual preferences are one of our most intimate and private choices, and new IoT devices, while facilitating and expanding the ways in which partners can enjoy sexual intimacy, can also put at risk the privacy and safety of their users. In this paper we analyze smart vibrators and show systematic privacy and security problems that can put owners of these devices at risk of privacy breaches and sexual assault. We discuss the role these sexual IoT devices play in the larger liberty and morals legislation discussion and emphasize that the security and privacy of these devices should be held at a higher standard than other IoT tools because of the potential consequences of security breaches.
性偏好是我们最私密的选择之一,新的物联网设备在促进和扩展伴侣享受性亲密的方式的同时,也可能危及其用户的隐私和安全。在本文中,我们分析了智能振动器,并展示了系统的隐私和安全问题,这些问题可能使这些设备的所有者面临隐私泄露和性侵犯的风险。我们讨论了这些性物联网设备在更大的自由和道德立法讨论中所扮演的角色,并强调由于安全漏洞的潜在后果,这些设备的安全和隐私应该比其他物联网工具具有更高的标准。
{"title":"Sexual Intimacy in the Age of Smart Devices: Are We Practicing Safe IoT?","authors":"Matthew Wynn, Kyle Tillotson, Ryan Kao, Andrea Calderon, A. Murillo, Javier Camargo, Rafael Mantilla, Brahian Rangel, A. Cárdenas, S. Rueda","doi":"10.1145/3139937.3139942","DOIUrl":"https://doi.org/10.1145/3139937.3139942","url":null,"abstract":"Sexual preferences are one of our most intimate and private choices, and new IoT devices, while facilitating and expanding the ways in which partners can enjoy sexual intimacy, can also put at risk the privacy and safety of their users. In this paper we analyze smart vibrators and show systematic privacy and security problems that can put owners of these devices at risk of privacy breaches and sexual assault. We discuss the role these sexual IoT devices play in the larger liberty and morals legislation discussion and emphasize that the security and privacy of these devices should be held at a higher standard than other IoT tools because of the potential consequences of security breaches.","PeriodicalId":129651,"journal":{"name":"Proceedings of the 2017 Workshop on Internet of Things Security and Privacy","volume":"143 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129431861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Cleartext Data Transmissions in Consumer IoT Medical Devices 消费物联网医疗设备中的明文数据传输
Pub Date : 2017-11-03 DOI: 10.1145/3139937.3139939
Daniel Wood, Noah J. Apthorpe, N. Feamster
This paper introduces a method to capture network traffic from medical IoT devices and automatically detect cleartext information that may reveal sensitive medical conditions and behaviors. The research follows a three-step approach involving traffic collection, cleartext detection, and metadata analysis. We analyze four popular consumer medical IoT devices, including one smart medical device that leaks sensitive health information in cleartext. We also present a traffic capture and analysis system that seamlessly integrates with a home network and offers a user-friendly interface for consumers to monitor and visualize data transmissions of IoT devices in their homes.
本文介绍了一种从医疗物联网设备捕获网络流量并自动检测可能泄露敏感医疗状况和行为的明文信息的方法。这项研究分为三步,包括流量收集、明文检测和元数据分析。我们分析了四种流行的消费级医疗物联网设备,其中包括一种以明文形式泄露敏感健康信息的智能医疗设备。我们还提供了一种流量捕获和分析系统,该系统与家庭网络无缝集成,并为消费者提供用户友好的界面,以监控和可视化家中物联网设备的数据传输。
{"title":"Cleartext Data Transmissions in Consumer IoT Medical Devices","authors":"Daniel Wood, Noah J. Apthorpe, N. Feamster","doi":"10.1145/3139937.3139939","DOIUrl":"https://doi.org/10.1145/3139937.3139939","url":null,"abstract":"This paper introduces a method to capture network traffic from medical IoT devices and automatically detect cleartext information that may reveal sensitive medical conditions and behaviors. The research follows a three-step approach involving traffic collection, cleartext detection, and metadata analysis. We analyze four popular consumer medical IoT devices, including one smart medical device that leaks sensitive health information in cleartext. We also present a traffic capture and analysis system that seamlessly integrates with a home network and offers a user-friendly interface for consumers to monitor and visualize data transmissions of IoT devices in their homes.","PeriodicalId":129651,"journal":{"name":"Proceedings of the 2017 Workshop on Internet of Things Security and Privacy","volume":"32 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120820060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Sounding the Bell for Improving Internet (of Things) Security 为提高物联网安全敲响警钟
Pub Date : 2017-11-03 DOI: 10.1145/3139937.3139946
Theophilus A. Benson, B. Chandrasekaran
The fragility of the Internet of Things (iot) ecosystem poses serious threats to Internet security, and the proliferation of iot devices only exacerbates this situation by providing vulnerable end-points to be exploited and used as attack sources. While industry and academia are working hard on designing innovative solutions to detect, mitigate and thwart massive botnet-based ddos attacks, the space of solutions appears disjoint and fragmented. The lack of cooperation between the iot device manufacturers, network operators, content providers, end users, and other players precipitates in point solutions which offer at best a veneer of security. In this paper we alert the community to the security challenges posed by the fragile iot ecosystem, discuss the space of solutions, and present the need for a distributed, concerted effort, e.g., among end users, ISPs, and CDNs, to improve Internet security. We do not claim to solve the problem, but offer design guidelines and discuss the key implementation challenges to inform the debates on iot security.
物联网(iot)生态系统的脆弱性对互联网安全构成了严重威胁,而物联网设备的激增只会通过提供易受攻击的端点来加剧这种情况,并将其用作攻击源。虽然业界和学术界都在努力设计创新的解决方案来检测、缓解和阻止大规模的基于僵尸网络的ddos攻击,但解决方案的空间似乎是脱节和分散的。物联网设备制造商、网络运营商、内容提供商、最终用户和其他参与者之间缺乏合作,导致点解决方案充其量只能提供表面的安全。在本文中,我们提醒社区注意脆弱的物联网生态系统带来的安全挑战,讨论解决方案的空间,并提出需要在最终用户,isp和cdn之间进行分布式,协调一致的努力,以提高互联网安全。我们并不声称解决了这个问题,但提供了设计指南并讨论了关键的实施挑战,以告知有关物联网安全的辩论。
{"title":"Sounding the Bell for Improving Internet (of Things) Security","authors":"Theophilus A. Benson, B. Chandrasekaran","doi":"10.1145/3139937.3139946","DOIUrl":"https://doi.org/10.1145/3139937.3139946","url":null,"abstract":"The fragility of the Internet of Things (iot) ecosystem poses serious threats to Internet security, and the proliferation of iot devices only exacerbates this situation by providing vulnerable end-points to be exploited and used as attack sources. While industry and academia are working hard on designing innovative solutions to detect, mitigate and thwart massive botnet-based ddos attacks, the space of solutions appears disjoint and fragmented. The lack of cooperation between the iot device manufacturers, network operators, content providers, end users, and other players precipitates in point solutions which offer at best a veneer of security. In this paper we alert the community to the security challenges posed by the fragile iot ecosystem, discuss the space of solutions, and present the need for a distributed, concerted effort, e.g., among end users, ISPs, and CDNs, to improve Internet security. We do not claim to solve the problem, but offer design guidelines and discuss the key implementation challenges to inform the debates on iot security.","PeriodicalId":129651,"journal":{"name":"Proceedings of the 2017 Workshop on Internet of Things Security and Privacy","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126454148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Portable DoS Test Tool for IoT Devices 便携式DoS测试工具的物联网设备
Pub Date : 2017-11-03 DOI: 10.1145/3139937.3139950
Keigo Nagara, Katsunori Aoki, Yutaka Matsubara, H. Takada
In the recent years, internet-of-things (IoT) devices have attracted an increasing share of attention, and the vulnerability of IoT devices has been clarified. For example, the IoT malware {¥it Mirai} constructs a bot using the vulnerability of IoT equipment embedded with Linux and exploits it for distributed denial of service (DDoS) attacks. Meanwhile, as reported in papers, examples of denial of service (DoS) attacks targeting IoT/embedded devices have emerged. Therefore, the DoS test at the stage of product design and development stage is very important. We then created an open source software (OSS) based portable DoS test tool for IoT devices.
近年来,物联网设备越来越受到人们的关注,物联网设备的脆弱性也逐渐被阐明。例如,物联网恶意软件{¥it Mirai}利用嵌入Linux的物联网设备的漏洞构建机器人,并利用它进行分布式拒绝服务(DDoS)攻击。与此同时,正如论文所报道的那样,针对物联网/嵌入式设备的拒绝服务(DoS)攻击的例子已经出现。因此,在产品设计开发阶段进行DoS测试是非常重要的。然后,我们为物联网设备创建了一个基于开源软件(OSS)的便携式DoS测试工具。
{"title":"Portable DoS Test Tool for IoT Devices","authors":"Keigo Nagara, Katsunori Aoki, Yutaka Matsubara, H. Takada","doi":"10.1145/3139937.3139950","DOIUrl":"https://doi.org/10.1145/3139937.3139950","url":null,"abstract":"In the recent years, internet-of-things (IoT) devices have attracted an increasing share of attention, and the vulnerability of IoT devices has been clarified. For example, the IoT malware {¥it Mirai} constructs a bot using the vulnerability of IoT equipment embedded with Linux and exploits it for distributed denial of service (DDoS) attacks. Meanwhile, as reported in papers, examples of denial of service (DoS) attacks targeting IoT/embedded devices have emerged. Therefore, the DoS test at the stage of product design and development stage is very important. We then created an open source software (OSS) based portable DoS test tool for IoT devices.","PeriodicalId":129651,"journal":{"name":"Proceedings of the 2017 Workshop on Internet of Things Security and Privacy","volume":"33 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133426261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Universal Radio Hacker: A Suite for Wireless Protocol Analysis 通用无线电黑客:无线协议分析套件
Pub Date : 2017-11-03 DOI: 10.1145/3139937.3139951
Johannes Pohl, A. Noack
With an increasing number of Internet of Things (IoT) devices also the number of proprietary wireless protocols raised. Meanwhile manufacturers save resources wherever they can, having size and energy constraints in mind. Consequently, there are security flaws that hackers demonstrate by silently breaking in a house or stealing a car. Revealing IoT security flaws requires expertise in Digital Signal Processing (DSP), coding theory, protocol design and cryptography. We contribute a software that addresses research groups and security analysts without strong DSP and coding theoretic background: Universal Radio Hacker (URH). This software is a complete suite to investigate wireless protocols including (1) Software Defined Radio interface for sending and receiving, (2) DSP abstraction, (3) easy customizable encodings, (4) logic analysis assistance and (5) fuzzing. Using our software researchers can focus on breaking the cryptography or analyzing protocol logic without worrying about hardware configuration or DSP specifics.
随着物联网(IoT)设备数量的增加,专有无线协议的数量也在增加。与此同时,制造商在考虑到尺寸和能源限制的情况下,尽可能节约资源。因此,黑客通过悄悄闯入一所房子或偷一辆车来证明存在安全漏洞。揭示物联网安全漏洞需要数字信号处理(DSP)、编码理论、协议设计和密码学方面的专业知识。我们提供了一个软件,以解决没有强大的DSP和编码理论背景的研究小组和安全分析师:通用无线电黑客(URH)。该软件是一个完整的套件,用于研究无线协议,包括(1)用于发送和接收的软件定义无线电接口,(2)DSP抽象,(3)易于定制的编码,(4)逻辑分析辅助和(5)模糊测试。使用我们的软件,研究人员可以专注于破解密码或分析协议逻辑,而不必担心硬件配置或DSP细节。
{"title":"Universal Radio Hacker: A Suite for Wireless Protocol Analysis","authors":"Johannes Pohl, A. Noack","doi":"10.1145/3139937.3139951","DOIUrl":"https://doi.org/10.1145/3139937.3139951","url":null,"abstract":"With an increasing number of Internet of Things (IoT) devices also the number of proprietary wireless protocols raised. Meanwhile manufacturers save resources wherever they can, having size and energy constraints in mind. Consequently, there are security flaws that hackers demonstrate by silently breaking in a house or stealing a car. Revealing IoT security flaws requires expertise in Digital Signal Processing (DSP), coding theory, protocol design and cryptography. We contribute a software that addresses research groups and security analysts without strong DSP and coding theoretic background: Universal Radio Hacker (URH). This software is a complete suite to investigate wireless protocols including (1) Software Defined Radio interface for sending and receiving, (2) DSP abstraction, (3) easy customizable encodings, (4) logic analysis assistance and (5) fuzzing. Using our software researchers can focus on breaking the cryptography or analyzing protocol logic without worrying about hardware configuration or DSP specifics.","PeriodicalId":129651,"journal":{"name":"Proceedings of the 2017 Workshop on Internet of Things Security and Privacy","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129315581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Toward Usable Network Traffic Policies for IoT Devices in Consumer Networks 面向消费者网络中物联网设备的可用网络流量策略研究
Pub Date : 2017-11-03 DOI: 10.1145/3139937.3139949
Nicholas DeMarinis, Rodrigo Fonseca
The Internet of Things (IoT) revolution has brought millions of small, low-cost, connected devices into our homes, cities, infrastructure, and more. However, these devices are often plagued by security vulnerabilities that pose threats to user privacy or can threaten the Internet architecture as a whole. Home networks can be particularly vulnerable to these threats as they typically have no network administrator and often contain unpatched or otherwise vulnerable devices. In this paper, we argue that the unique security challenges of home networks require a new network-layer architecture to both protect against external threats and mitigate attacks from compromised devices. We present initial findings based on traffic analysis from a small-scale IoT testbed toward identifying predictable patterns in IoT traffic that may allow construction of a policy-based framework to restrict malicious traffic. Based on our observations, we discuss key features for the design of this architecture to promote future developments in network-layer security in smart home networks.
物联网(IoT)革命为我们的家庭、城市、基础设施等带来了数以百万计的小型、低成本、互联设备。然而,这些设备经常受到安全漏洞的困扰,这些漏洞对用户隐私构成威胁,或者可能威胁到整个Internet架构。家庭网络尤其容易受到这些威胁,因为家庭网络通常没有网络管理员,而且经常包含未打补丁或易受攻击的设备。在本文中,我们认为家庭网络的独特安全挑战需要一种新的网络层架构来抵御外部威胁并减轻来自受损设备的攻击。我们提出了基于小规模物联网测试平台流量分析的初步发现,旨在确定物联网流量中的可预测模式,这些模式可能允许构建基于策略的框架来限制恶意流量。根据我们的观察,我们讨论了该架构设计的关键特性,以促进智能家居网络中网络层安全的未来发展。
{"title":"Toward Usable Network Traffic Policies for IoT Devices in Consumer Networks","authors":"Nicholas DeMarinis, Rodrigo Fonseca","doi":"10.1145/3139937.3139949","DOIUrl":"https://doi.org/10.1145/3139937.3139949","url":null,"abstract":"The Internet of Things (IoT) revolution has brought millions of small, low-cost, connected devices into our homes, cities, infrastructure, and more. However, these devices are often plagued by security vulnerabilities that pose threats to user privacy or can threaten the Internet architecture as a whole. Home networks can be particularly vulnerable to these threats as they typically have no network administrator and often contain unpatched or otherwise vulnerable devices. In this paper, we argue that the unique security challenges of home networks require a new network-layer architecture to both protect against external threats and mitigate attacks from compromised devices. We present initial findings based on traffic analysis from a small-scale IoT testbed toward identifying predictable patterns in IoT traffic that may allow construction of a policy-based framework to restrict malicious traffic. Based on our observations, we discuss key features for the design of this architecture to promote future developments in network-layer security in smart home networks.","PeriodicalId":129651,"journal":{"name":"Proceedings of the 2017 Workshop on Internet of Things Security and Privacy","volume":"23 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125926864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Systematically Evaluating Security and Privacy for Consumer IoT Devices 系统评估消费者物联网设备的安全性和隐私性
Pub Date : 2017-11-03 DOI: 10.1145/3139937.3139938
F. Loi, Arunan Sivanathan, H. Gharakheili, Adam Radford, V. Sivaraman
Internet-of-Things (IoT) devices such as smart bulbs, cameras, and health monitors are being enthusiastically adopted by consumers, with numbers projected to rise to the billions. However, such devices are also easily attacked, or used for launching attacks, at large scale and at increasing frequency. This paper is an attempt at developing a systematic method to identify the security and privacy shortcomings of various IoT devices, with a view towards alerting consumers, manufacturers, and regulators to the associated risks. We categorize the threats along four dimensions: confidentiality of private data sent to/from the IoT device; integrity of data from the IoT device to internal/external entities; access control of the IoT device; and reflective attacks that can be launched from an IoT device. We develop scripts to automate the security testing along each of these dimensions, subject twenty market-ready consumer IoT devices to our test suite, and reveal findings that give a fairly comprehensive picture of the security/privacy posture of these devices. Our methodology can be used as a basis for a star-based security ratings system for IoT devices being brought to market.
智能灯泡、摄像头和健康监测器等物联网(IoT)设备正受到消费者的热烈追捧,预计其数量将达到数十亿。然而,这些设备也很容易受到攻击,或被用来发动大规模和越来越频繁的攻击。本文试图开发一种系统的方法来识别各种物联网设备的安全和隐私缺陷,以期提醒消费者、制造商和监管机构注意相关风险。我们从四个方面对威胁进行了分类:发送到/从物联网设备发送的私人数据的机密性;从物联网设备到内部/外部实体的数据完整性;物联网设备的访问控制;以及可以从物联网设备发起的反射攻击。我们开发了脚本来自动化这些维度的安全测试,将20个市场就绪的消费者物联网设备置于我们的测试套件中,并揭示了这些设备的安全/隐私状况的相当全面的图景。我们的方法可以作为面向市场的物联网设备的星级安全评级系统的基础。
{"title":"Systematically Evaluating Security and Privacy for Consumer IoT Devices","authors":"F. Loi, Arunan Sivanathan, H. Gharakheili, Adam Radford, V. Sivaraman","doi":"10.1145/3139937.3139938","DOIUrl":"https://doi.org/10.1145/3139937.3139938","url":null,"abstract":"Internet-of-Things (IoT) devices such as smart bulbs, cameras, and health monitors are being enthusiastically adopted by consumers, with numbers projected to rise to the billions. However, such devices are also easily attacked, or used for launching attacks, at large scale and at increasing frequency. This paper is an attempt at developing a systematic method to identify the security and privacy shortcomings of various IoT devices, with a view towards alerting consumers, manufacturers, and regulators to the associated risks. We categorize the threats along four dimensions: confidentiality of private data sent to/from the IoT device; integrity of data from the IoT device to internal/external entities; access control of the IoT device; and reflective attacks that can be launched from an IoT device. We develop scripts to automate the security testing along each of these dimensions, subject twenty market-ready consumer IoT devices to our test suite, and reveal findings that give a fairly comprehensive picture of the security/privacy posture of these devices. Our methodology can be used as a basis for a star-based security ratings system for IoT devices being brought to market.","PeriodicalId":129651,"journal":{"name":"Proceedings of the 2017 Workshop on Internet of Things Security and Privacy","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114277286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
Keep Pies Away from Kids: A Raspberry Pi Attacking Tool 让派远离孩子:树莓派攻击工具
Pub Date : 2017-11-03 DOI: 10.1145/3139937.3139953
A. Michalas, R. Murray
The focus of this short paper has been to use a Raspberry Pi device to perform certain network attacks and exploit vulnerabilities in existing systems. To this end, we developed a new attack tool that can be installed on a Raspberry Pi and allows novice users to perform a Man-in-the-Middle attack and a small-scale Denial-of-Service attack. The first attack has been designed in such a way so that the attacker can gather credentials of legitimate users even when they try to visit websites that are running under SSL/TLS and they have enabled the HSTS protocol. Regarding the second attack, the attacker has the ability to control a set of malicious Raspberry Pi's and intentionally attempt to stop legitimate users from accessing services. The attacker can select a specific target in the network and overload the corresponding device by sending several fake requests. Throughout this work, we discovered that although security protocols have become more effective over the years it is still considerably easy to launch certain attacks with the main aim to breach users' privacy or restrict service to certain users.
这篇短文的重点是使用树莓派设备来执行某些网络攻击和利用现有系统中的漏洞。为此,我们开发了一种新的攻击工具,可以安装在树莓派上,允许新手用户执行中间人攻击和小规模拒绝服务攻击。第一次攻击是这样设计的,这样攻击者就可以收集合法用户的凭证,即使他们试图访问在SSL/TLS下运行的网站,并且他们已经启用了HSTS协议。关于第二种攻击,攻击者有能力控制一组恶意的树莓派,并故意试图阻止合法用户访问服务。攻击者可以在网络中选择一个特定的目标,通过发送多个虚假请求使相应的设备过载。在整个工作过程中,我们发现,尽管安全协议多年来变得更加有效,但仍然很容易发起某些攻击,其主要目的是破坏用户的隐私或限制对某些用户的服务。
{"title":"Keep Pies Away from Kids: A Raspberry Pi Attacking Tool","authors":"A. Michalas, R. Murray","doi":"10.1145/3139937.3139953","DOIUrl":"https://doi.org/10.1145/3139937.3139953","url":null,"abstract":"The focus of this short paper has been to use a Raspberry Pi device to perform certain network attacks and exploit vulnerabilities in existing systems. To this end, we developed a new attack tool that can be installed on a Raspberry Pi and allows novice users to perform a Man-in-the-Middle attack and a small-scale Denial-of-Service attack. The first attack has been designed in such a way so that the attacker can gather credentials of legitimate users even when they try to visit websites that are running under SSL/TLS and they have enabled the HSTS protocol. Regarding the second attack, the attacker has the ability to control a set of malicious Raspberry Pi's and intentionally attempt to stop legitimate users from accessing services. The attacker can select a specific target in the network and overload the corresponding device by sending several fake requests. Throughout this work, we discovered that although security protocols have become more effective over the years it is still considerably easy to launch certain attacks with the main aim to breach users' privacy or restrict service to certain users.","PeriodicalId":129651,"journal":{"name":"Proceedings of the 2017 Workshop on Internet of Things Security and Privacy","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134295582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1