A Model-Driven-Engineering Approach for Detecting Privilege Escalation in IoT Systems

05/23/2022
by   Atheer Abu Zaid, et al.
0

Software vulnerabilities in access control models can represent a serious threat in a system. In fact, OWASP lists broken access control as number 5 in severity among the top 10 vulnerabilities. In this paper, we study the permission model of an emerging Smart-Home platform, SmartThings, and explore an approach that detects privilege escalation in its permission model. Our approach is based on Model Driven Engineering (MDE) in addition to static analysis. This approach allows for better coverage of privilege escalation detection than static analysis alone, and takes advantage of analyzing free-form text that carries extra permissions details. Our experimental results demonstrate a very high accuracy for detecting over-privilege vulnerabilities in IoT applications

READ FULL TEXT
research
02/05/2022

Iota: A Framework for Analyzing System-Level Security of IoTs

Most IoT systems involve IoT devices, communication protocols, remote cl...
research
04/20/2023

A Survey of Prevent and Detect Access Control Vulnerabilities

Broken access control is one of the most common security vulnerabilities...
research
07/23/2020

On Manually Reverse Engineering Communication Protocols of Linux Based IoT Systems

IoT security and privacy has raised grave concerns. Efforts have been ma...
research
12/28/2021

Common Privacy Weaknesses and Vulnerabilities in Software Applications

In this digital era, our privacy is under constant threat as our persona...
research
06/01/2017

Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing

Taint-style vulnerabilities comprise a majority of fuzzer discovered pro...
research
02/27/2019

Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media

Breaking cybersecurity events are shared across a range of websites, inc...
research
12/29/2021

Working mechanism of Eternalblue and its application in ransomworm

After the leaking of exploit Eternalblue, some ransomworms utilizing thi...

Please sign up or login with your details

Forgot password? Click here to reset