Most IoT systems involve IoT devices, communication protocols, remote cloud, IoT applications, mobile apps, and the physical environment. However, existing IoT security analyses only focus on a subset of all the essential components, such as device firmware, and ignore IoT systems' interactive nature, resulting in limited attack detection capabilities. In this work, we propose Iota, a logic programming-based framework to perform system-level security analysis for IoT systems. Iota generates attack graphs for IoT systems, showing all of the system resources that can be compromised and enumerating potential attack traces. In building Iota, we design novel techniques to scan IoT systems for individual vulnerabilities and further create generic exploit models for IoT vulnerabilities. We also identify and model physical dependencies between different devices as they are unique to IoT systems and are employed by adversaries to launch complicated attacks. In addition, we utilize NLP techniques to extract IoT app semantics based on app descriptions. To evaluate vulnerabilities' system-wide impact, we propose two metrics based on the attack graph, which provide guidance on fortifying IoT systems. Evaluation on 127 IoT CVEs (Common Vulnerabilities and Exposures) shows that Iota's exploit modeling module achieves over 80% accuracy in predicting vulnerabilities' preconditions and effects. We apply Iota to 37 synthetic smart home IoT systems based on real-world IoT apps and devices. Experimental results show that our framework is effective and highly efficient. Among 27 shortest attack traces revealed by the attack graphs, 62.8% are not anticipated by the system administrator. It only takes 1.2 seconds to generate and analyze the attack graph for an IoT system consisting of 50 devices.
翻译:大部分 Iot 系统都包含 IoT 设备、 通讯协议、 远程云、 IoT 应用程序、 移动应用程序和物理环境。 然而, 现有的 IoT 安全分析仅侧重于所有基本部件的子集, 如设备固质, 忽略 IoT 系统的互动性质, 导致攻击探测能力有限 。 在此工作中, 我们提议Iota 是一个基于逻辑的基于程序的程序化框架, 用于对 IoT 系统进行系统级安全分析。 Iota 为 IoT 系统生成攻击图, 显示所有系统资源可能受损并计算潜在的攻击痕迹。 在建设 Iota 时, 我们设计新技术来扫描 IoT 系统的个人脆弱性, 并进一步为 IoT 脆弱性创建通用的开发模型。 我们还确定和模拟不同装置之间的物理依赖性, 因为IoT 系统是IOT 系统的独特性, 我们使用NLP 技术来根据应用程序描述提取 IoT 系统 。 为了评估系统内部攻击效果, 我们根据攻击框架的系统使用两个测量指标, 我们用攻击图来测量系统, 这个系统用于 IMVTO II 和IVTO 系统 的精确分析。