The rise of IoT devices has led to the proliferation of smart buildings, offices, and homes worldwide. Although commodity IoT devices are employed by ordinary end-users, complex environments such as smart buildings, smart offices, conference rooms, or hospitality require customized and highly reliable solutions. Those systems called Enterprise Internet of Things (EIoT) connect such environments to the Internet and are professionally managed solutions usually offered by dedicated vendors. As EIoT systems require specialized training, software, and equipment to deploy, this has led to very little research investigating the security of EIoT systems and their components. In effect, EIoT systems in smart settings such as smart buildings present an unprecedented and unexplored threat vector for an attacker. In this work, we explore EIoT system vulnerabilities and insecure development practices. Specifically, focus on the usage of drivers as an attack mechanism, and introduce PoisonIvy, a number of novel attacks that demonstrate an attacker can easily compromise EIoT system controllers using malicious drivers. Specifically, we show how drivers used to integrate third-party devices to EIoT systems can be misused in a systematic fashion. To demonstrate the capabilities of attackers, we implement and evaluate PoisonIvy using a testbed of real EIoT devices. We show that an attacker can perform DoS attacks, gain remote control, and maliciously abuse system resources of EIoT systems. To the best of our knowledge, this is the first work to analyze the (in)securities of EIoT deployment practices and demonstrate the associated vulnerabilities in this ecosystem. With this work, we raise awareness on the (in)secure development practices used for EIoT systems, the consequences of which can largely impact the security, privacy, reliability, and performance of millions of EIoT systems worldwide.
翻译:IOT装置的兴起导致智能建筑、办公室和家居在世界各地扩散。尽管商品IOT装置被普通终端用户所使用,但智能建筑、智能办公室、会议室或招待等复杂环境需要定制和高度可靠的解决方案。这些系统称为“Temple Internet of Things(EIOT) ”, 将这种环境与互联网连接起来,并且是专业管理的解决方案。由于EIOT系统需要专门培训、软件和设备来部署,这导致对世界范围内的恶意生态系统技术系统及其组件的安全调查很少。事实上,智能建筑等智能环境中的EIT系统对攻击者具有前所未有的和未开发的威胁矢量。在这项工作中,我们探索EIT系统的脆弱性和不安全的发展做法。具体地说,侧重于使用驱动器作为攻击机制,引入毒理,表明攻击者可以轻易地使用恶意驱动器系统控制 EIT系统。我们展示了将第三方装置整合到 EIT系统的做法。我们用来提高EOT系统的安全性能,我们使用EVI系统的方法可以大规模地被滥用。我们使用EVI系统, 测试了EVI系统的工作能力,我们用EVI 测试了ET系统。我们测试了这个攻击了EVI的工作能力。