Hacking Iot: Case Study on Baby Monitor Exposures and Vulnerabilities - Rapid7

Create your free account to read unlimited documents.

IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany

SlideShare

You are reading a preview.

Create your free account to continue reading.

1

Like this presentation? Why not share!

  • Email
  •  
  • Privacy Dynamics: Learning Privacy ... Privacy Dynamics: Learning Privacy ... by Arosha Bandara 1122 views
  • Validation, Verification and Explan... Validation, Verification and Explan... by Arosha Bandara 2001 views
  • SEAMS-2016, 16-17 May, 2016, Austin... SEAMS-2016, 16-17 May, 2016, Austin... by Charith Perera 1144 views
  • Building Open Data Markets Using Se... Building Open Data Markets Using Se... by Charith Perera 1137 views
  • WF-IOT-2014, Seoul, Korea, 06 March... WF-IOT-2014, Seoul, Korea, 06 March... by Charith Perera 2123 views
  • IS-EUD-2015, Madrid, Spain, 27 May ... IS-EUD-2015, Madrid, Spain, 27 May ... by Charith Perera 1459 views

Upcoming SlideShare

Privacy Dynamics: Learning Privacy Norms for Social Software

Download to read offline and view in fullscreen.

Sep. 12, 2016

1,843 views

IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany

Sep. 12, 2016

1,843 views

Charith Perera, Ciaran Mccormick, Arosha Bandara, Blaine A. Price, Bashar Nuseibeh, Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms, Proceedings of the 6th ACM International Conference on Internet of Things (IoT), Stuttgart, Germany, November, 2016, Pages 83-92

Recommended

  • Privacy Dynamics: Learning Privacy Norms for Social Software

    Privacy Dynamics: Learning Privacy Norms for Social Software

    Arosha Bandara

  • Validation, Verification and Explanation in a Smarter World

    Validation, Verification and Explanation in a Smarter World

    Arosha Bandara

  • SEAMS-2016, 16-17 May, 2016, Austin, Texas, United States

    SEAMS-2016, 16-17 May, 2016, Austin, Texas, United States

    Charith Perera

  • Building Open Data Markets Using Sensing as a Service Model

    Building Open Data Markets Using Sensing as a Service Model

    Charith Perera

  • WF-IOT-2014, Seoul, Korea, 06 March 2014

    WF-IOT-2014, Seoul, Korea, 06 March 2014

    Charith Perera

  • IS-EUD-2015, Madrid, Spain, 27 May 2015

    IS-EUD-2015, Madrid, Spain, 27 May 2015

    Charith Perera

  • PIMRC-2012, Sydney, Australia, 28 July, 2012

    PIMRC-2012, Sydney, Australia, 28 July, 2012

    Charith Perera

  • SKG-2013, Beijing, China, 03 October 2013

    SKG-2013, Beijing, China, 03 October 2013

    Charith Perera

  • WF-IOT-2014, Seoul, Korea, 06 March 2014

    WF-IOT-2014, Seoul, Korea, 06 March 2014

    Charith Perera

  • iThings-2012, Besançon, France, 20 November, 2012

    iThings-2012, Besançon, France, 20 November, 2012

    Charith Perera

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

  • 1 Like
  • Statistics
  • Notes
  • CamiSmith3

IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany

  1. 1. Privacy-­‐by-­‐Design Framework  for  Assessing Internet  of  Things  Applications  and  Platforms Charith  Perera,  Ciaran  McCormick,  Arosha  K.  Bandara,  Blaine  Price,  Bashar  Nuseibeh The  6th  International  Conference  on  the  Internet  of  Things  (IoT  2016)  November  7–9,  2016  in  Stuttgart,  Germany.
  2. 2. Internet  of  Things • The  Internet  of  Things  (IoT)  is  "…the  network  of  physical  objects— devices,  vehicles,  buildings  and  other  items—embedded  with  electronics,   software,  sensors,  and  network  connectivity  that  enables  these  objects  to   collect  and  exchange  data…"# • By  2020,  there  will  be  50  to  100  billion  devices  (i.e.  things,  sensors,  smart   objects)  connected  to  the  Internet* #  International  Telecommunication  Union,  Internet  of  Things  Global  Standards  Initiative,  2015,  http://www.itu.int/en/ITU-­‐T/gsi/iot/Pages/default.aspx *  International  Data  Corporation  (IDC)  Corporate  USA,  "Worldwide  smart  connected  device  shipments,"  March  2012,  http://www.idc.com/getdoc.jsp?containerId=prUS23398412
  3. 3. Application  Development Desktop  Application Mobile  Application Web  Application  Application • Processing  happens  locally • UI  sits  locally • Processing  happens  locally complemented  by  cloud   resources • UI  sits  locally • Processing  happens  remotely • UI  sits  locally
  4. 4. Internet  of  Things  Application  Development BeagleBone Waspmote Raspberry PiArdunio Gadgeteer Dragonboard 410C • NO Operating System • Less Powerful • OS Driven • More Powerful Cloud Computing • Unlimited Computational Resources*
  5. 5. Todays  IoT  Development  Market Hardware Software
  6. 6. Privacy-­‐by-­‐Design • IoT  applications  are  complex  by  nature  as   they  involve  both  software  and  hardware  as   well  as  many  different  types  of    computational   devices  (e.g.,  sensors,  gateways,  cloud) • Privacy  is  a  significant  problem  in  IoT   applications  because  they  handle  data  that   can  be  used  to  derive  very  sensitive  personal   information
  7. 7. Why  hasn't  privacy  been  a  priority? • IoT  systems  (applications,  service,  platforms)  are  still  new;  Not  mature  enough • Most  IoT  platforms  follow  the  philosophy  "You  feed  your  data  to  our  platform,  we   do  the  processing  and  give  you  back  the  results" • Current  IoT  platform  providers  assume,  anyone  who  uses  their  platform  has  the  full   ownership  of  the  data  they  feed.  (In  reality  this  is  not  the  case  always) • Therefore,  privacy  is  not  a  major  concern  for  IoT  platform  providers.
  8. 8. Our  Motivation  and  Proposed  solution • There  isn't  any  process/methodology/framework  to  help  software  architects  in   assessing  and  designing  IoT  applications • Existing  frameworks  are  not  prescriptive  enough  to  follow  by  an  engineer (We  discuss  them  few  slides  later) • Recent  Security  and  Privacy  Violations:  HACKING  IoT:  A  Case  Study  on  Baby  Monitor   Exposures  and  Vulnerabilities# • Therefore,  we  wanted  to  build    a  Privacy-­‐by-­‐design  framework  that  can  guide   software  architects  in  assessing  IoT  application. #  https://www.rapid7.com/docs/Hacking-­‐IoT-­‐A-­‐Case-­‐Study-­‐on-­‐Baby-­‐Monitor-­‐Exposures-­‐and-­‐Vulnerabilities.pdf
  9. 9. BUT  IT  IS  NOT  …. • Guidelines  SHOULD  NOT  be  used  to  compare   different  IoT  application  or  platforms.   • The  primary  reason  is  that  each  IoT  application  or   platforms  is  designed  to  serve  a  specific  purpose   or  category  of  application. Focus:  Enterprise  middleware  platform  for   Smart  Cities  and  Businesses Focus:  Smart  Home  Automation
  10. 10. What  is  out  there  ?  (Literature) Privacy  by  Design    Foundational  Principles  -­‐ Ann  Cavoukian* 1) Proactive  not  reactive;  preventative  not  remedial 2) Privacy  as  the  default  setting 3) Privacy  embedded  into  design 4) Full  functionality  positive-­‐sum,  not  zero-­‐sum 5) End-­‐to-­‐end  security-­‐full  life-­‐cycle  protection 6) Visibility  and  transparency-­‐ keep  it  open 7) Respect  for  user  privacy,  keep  it  user-­‐centric *A.  Cavoukian,  "Resolution  on  privacy  by  design,"  in  32nd  International  Conference  of  Data  Protection  and  Privacy  Commissioners,  2010.
  11. 11. What  is  out  there  ?  (Literature) LINDDUN  – Deng  et  al.* *M.  Deng,  K.  Wuyts,  R.  Scandariato,  B.  Preneel,  and  W.  Joosen,  "A  privacy  threat  analysis  framework:  supporting  the  elicitation  and  fulfillment of  privacy  requirements,"   Requirements  Engineering,  vol.  16,  no.  1,  pp.  3–32,  2011. This  is  a  privacy  threat  analysis  framework  that  uses  data  flow  diagrams  (DFD)  to  identify  privacy  threats.   1) Define  the  DFD 2) Map  privacy  threats  to  DFD  elements   3) Identify  threat  scenarios 4) Prioritize  threats 5) Elicit  mitigation  strategies 6) Select  corresponding  PETS
  12. 12. What  is  out  there  ?  (Literature) *J.-­‐H.  Hoepman,  "Privacy  Design  Strategies,"  in  ICT  Systems  Security  and  Privacy  Protection,  vol.  428,  N.  Cuppens-­‐Boulahia,  F.  Cuppens,  S.  Jajodia,  A.  Abou El  Kalam and  T.  Sans,   Eds.,  Springer  Berlin  Heidelberg,  2014,  pp.  446-­‐459. Privacy  Design  Strategies  –Hoepman* 1) Minimize 2) Hide 3) Separate 4) Aggregate 5) Inform 6) Control 7) Enforce 8) Demonstrate • We  determined  that  Hoepman's   is  the  most  appropriate  starting  point  for   developing  a  more  detailed  privacy-­‐by-­‐design • Primarily  because  this  framework  already  focuses  on  the  architectural  aspects  of   privacy  design
  13. 13. IoT  Data  Flow  View CDA DPP DPADS DD CDA DPP DPADS DD CDA DPP DPADS DD CDA DPP DPA DS DD Consent  and   Data  Acquisition Data  Pre-­‐Processing Data  Processing  and   Analysis Data  Storage Data  Dissemination
  14. 14. Privacy  By  Design  Guidelines 1) Minimise data acquisition 2) Minimise number of data sources 3) Minimise raw data intake 4) Minimize knowledge discovery 5) Minimize data storage 6) Minimize data retention period 7) Hidden data routing 8) Data anonymization 9) Encrypted data communication 10) Encrypted data processing 11) Encrypted data storage 12) Reduce data granularity 13) Query answering 14) Repeated query blocking 15) Distributed data processing 16) Distributed data storage 17) Knowledge discovery based aggregation 18) Geography based aggregation 19) Chain aggregation 20) Time-Period based aggregation 21) Category based aggregation 22) Information Disclosure 23) Control 24) Logging 25) Auditing 26) Open Source 27) Data Flow Diagrams (DFD) 28) Certification 29) Standardization 30) Compliance with Policy, Law, Regulations MINIMISEHIDESEPARATE AGGREGATIONDEMONSTRATE INFORM CONTROL   /  ENFORCE
  15. 15. Evaluation  of  Privacy  Capabilities:  Methodology • Step  1:  Identify  how  data  flows  in  the  existing  application  or  platform • Step  2:  Build  a  table  for  each  node  where  columns  represent  data  life   cycle  phases  and  rows  represent  each  privacy-­‐by-­‐design  guideline. • Step  3:  Depending  on  the  level  of  detail  which  software  architects  wish  to   explore,  they  can  either  use   (1)  a  summarised  colour  coding  base  scheme (2)  a  notes  based  scheme
  16. 16. Evaluation  of  Privacy  Capabilities:  Methodology
  17. 17. Platforms  We  Assessed http://www.eclipse.org/smarthome/ https://github.com/OpenIotOrg/openiot • Focus:  Enterprise  middleware  platform   for  Smart  Cities  and  Businesses • Middleware  infrastructure  supports   flexible  configuration  and  deployment  of   algorithms  for  collecting,  and  filtering   information  streams  stemming  from   internet  connected  objects • Focus:  Smart  Home  Automation • Platform  for  integrating  different  home   automation  systems  and  technologies  into   one  single  solution  that  allows  over-­‐ arching  automation  rules  and  uniform   user  interfaces
  18. 18. Results
  19. 19. Research  Directions • Can  1)  Novice  2)  Experience   Software  architects  assess  a  given  platform  using  the  proposed  guidelines   consistently?  If  there  are  variation,  why? • Given  a  case  study,  can  privacy  guidelines  guide  1)  Novice  2)  Experience Towards  a better privacy-­‐aware  IoT  applications Evaluation Future  work • Privacy  Tactics  -­‐ Tactics  are  design  decisions  that  improve  individual  quality   attribute  (e.g.  Privacy)  concerns.  [Basic  building  blocks] • Privacy  Patterns  -­‐ Patterns describe  the  high-­‐level  structure  and  behaviour  of   software  systems  as  the  solution  to  multiple  system  requirements [Complex  Compositions]
  20. 20. Thank  You

Hacking Iot: Case Study on Baby Monitor Exposures and Vulnerabilities - Rapid7

Source: https://www.slideshare.net/ngcharithperera/privacybydesignframework-for-assessinginternet-of-things-applications-and-platforms

0 Response to "Hacking Iot: Case Study on Baby Monitor Exposures and Vulnerabilities - Rapid7"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel