Static analysis for discovering IoT vulnerabilities

被引:38
|
作者
Ferrara, Pietro [1 ,2 ]
Mandal, Amit Kr [3 ]
Cortesi, Agostino [1 ]
Spoto, Fausto [4 ]
机构
[1] Univ Ca Foscari, Venice, Italy
[2] JuliaSoft, Verona, Italy
[3] SRM Univ, Amaravati, AP, India
[4] Univ Verona, Verona, Italy
关键词
IoT security; Static analysis; OWASP IoT Top 10; IoT privacy; Insecure IoT ecosystem interface; SECURITY; INTERNET; FRAMEWORK; PROTOCOLS;
D O I
10.1007/s10009-020-00592-x
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Open Web Application Security Project (OWASP), released the "OWASP Top 10 Internet of Things 2018" list of the high-priority security vulnerabilities for IoT systems. The diversity of these vulnerabilities poses a great challenge toward development of a robust solution for their detection and mitigation. In this paper, we discuss the relationship between these vulnerabilities and the ones listed by OWASP Top 10 (focused on Web applications rather than IoT systems), how these vulnerabilities can actually be exploited, and in which cases static analysis can help in preventing them. Then, we present an extension of an industrial analyzer (Julia) that already covers five out of the top seven vulnerabilities of OWASP Top 10, and we discuss which IoT Top 10 vulnerabilities might be detected by the existing analyses or their extension. The experimental results present the application of some existing Julia's analyses and their extension to IoT systems, showing its effectiveness of the analysis of some representative case studies.
引用
收藏
页码:71 / 88
页数:18
相关论文
共 50 条
  • [41] Discovering and exploiting 802.11 wireless driver vulnerabilities
    Butti, Laurent
    Tinnes, Julien
    JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (01): : 25 - 37
  • [42] Security Vulnerabilities in LPWANs-An Attack Vector Analysis for the IoT Ecosystem
    Torres, Nuno
    Pinto, Pedro
    Lopes, Sergio Ivan
    APPLIED SCIENCES-BASEL, 2021, 11 (07):
  • [43] Discovering Vulnerabilities and Patches for Open Source Security
    Gunkel, Tamara
    Hupperich, Thomas
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES (ICSOFT), 2022, : 641 - 648
  • [44] IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN
    Ingham, Max
    Marchang, Jims
    Bhowmik, Deepayan
    IET INFORMATION SECURITY, 2020, 14 (04) : 368 - 379
  • [45] Healthcare IoT: Benefits, Vulnerabilities and Solutions
    Nausheen, Farha
    Begum, Sayyada Hajera
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 517 - 522
  • [46] Comprehensive Study of IoT Vulnerabilities and Countermeasures
    Coston, Ian
    Plotnizky, Eadan
    Nojoumian, Mehrdad
    APPLIED SCIENCES-BASEL, 2025, 15 (06):
  • [47] IoT - Supply Chain Forensics and Vulnerabilities
    Gudlur, Venkata Venugopal Rao
    Shanmugan, Vikneswara Abirama
    Perumal, Sundresan
    Mohammed, Radin Maya Saphira Radin
    2019 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA SCIENCES (AIDAS2019), 2019, : 106 - 109
  • [48] Security Vulnerabilities in Consumer IoT Applications
    Shakdher, Arjun
    Agrawal, Suyash
    Yang, Baijian
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 1 - 6
  • [49] Vulnerabilities in Hub Architecture IoT Devices
    Visan, Bogdan Alexandru
    Lee, Jiyoon
    Yang, Baijian
    Smith, Anthony H.
    Matson, Eric T.
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 83 - 88
  • [50] Security Analysis of IoT Frameworks using Static Taint Analysis
    Yavuz, Tuba
    Brant, Christopher
    CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2022, : 203 - 213