Verifying Software Vulnerabilities in IoT Cryptographic Protocols

01/27/2020
by   Fatimah Aljaafari, et al.
0

Internet of Things (IoT) is a system that consists of a large number of smart devices connected through a network. The number of these devices is increasing rapidly, which creates a massive and complex network with a vast amount of data communicated over that network. One way to protect this data in transit, i.e., to achieve data confidentiality, is to use lightweight encryption algorithms for IoT protocols. However, the design and implementation of such protocols is an error-prone task; flaws in the implementation can lead to devastating security vulnerabilities. These vulnerabilities can be exploited by an attacker and affect users' privacy. There exist various techniques to verify software and detect vulnerabilities. Bounded Model Checking (BMC) and Fuzzing are useful techniques to check the correctness of a software system concerning its specifications. Here we describe a framework called Encryption-BMC and Fuzzing (EBF) using combined BMC and fuzzing techniques. We evaluate the application of EBF verification framework on a case study, i.e., the S-MQTT protocol, to check security vulnerabilities in cryptographic protocols for IoT.

READ FULL TEXT
research
03/21/2021

EBF: A Hybrid Verification Tool for Finding Software Vulnerabilities in IoT Cryptographic Protocols

Internet of Things (IoT) consists of a large number of smart devices con...
research
03/25/2021

The Cost of OSCORE and EDHOC for Constrained Devices

Many modern IoT applications rely on the Constrained Application Protoco...
research
07/23/2020

On Manually Reverse Engineering Communication Protocols of Linux Based IoT Systems

IoT security and privacy has raised grave concerns. Efforts have been ma...
research
11/04/2020

An Overview of UPnP-based IoT Security: Threats, Vulnerabilities, and Prospective Solutions

Advances in the development and increased availability of smart devices ...
research
02/04/2021

Verifying Security Vulnerabilities in Large Software Systems using Multi-Core k-Induction

Computer-based systems have been used to solve several domain problems, ...
research
03/09/2019

SAFECHAIN: Securing Trigger-Action Programming from Attack Chains (Extended Technical Report)

The proliferation of Internet of Things (IoT) is reshaping our lifestyle...
research
11/29/2021

Hardware Software Co-design framework for Data Encryption in Image Processing Systems for the Internet of Things Environmen

Data protection is a severe constraint in the heterogeneous IoT era. Thi...

Please sign up or login with your details

Forgot password? Click here to reset