Proceedings 2018 Network and Distributed System Security Symposium 2018
DOI: 10.14722/ndss.2018.23119
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized Action Integrity for Trigger-Action IoT Platforms

Abstract: Abstract-Trigger-Action platforms are web-based systems that enable users to create automation rules by stitching together online services representing digital and physical resources using OAuth tokens. Unfortunately, these platforms introduce a longrange large-scale security risk: If they are compromised, an attacker can misuse the OAuth tokens belonging to a large number of users to arbitrarily manipulate their devices and data. We introduce Decentralized Action Integrity, a security principle that prevents … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
82
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 87 publications
(82 citation statements)
references
References 18 publications
0
82
0
Order By: Relevance
“…For example, a user with a SmartThings IoT platform account can authorize the SmartThings service through the OAuth protocol to communicate with her SmartThings account. Services communicate with each other using REST APIs over HTTP(S) [6], [18]. Trigger-action platforms allow users to create custom automation on services through DO and IF rules.…”
Section: B Trigger-action Platformsmentioning
confidence: 99%
“…For example, a user with a SmartThings IoT platform account can authorize the SmartThings service through the OAuth protocol to communicate with her SmartThings account. Services communicate with each other using REST APIs over HTTP(S) [6], [18]. Trigger-action platforms allow users to create custom automation on services through DO and IF rules.…”
Section: B Trigger-action Platformsmentioning
confidence: 99%
“…As a countermeasure, they investigate static and dynamic information-flow tracking via security types. Fernandes et al [19] propose the use of decentralization and finegrained authentication tokens to limit privileges and prevent unauthorized actions. In contrast, our work targets security and safety issues in cross-app interactions, and it focuses on the formal underpinnings of these approaches.…”
Section: Related Workmentioning
confidence: 99%
“…Examples of attacks include design flaws due to over privileged permission tokens [18], unexpected information leaks by seemingly harmless apps [36], and sensitive information disclosure by malicious apps [6], [11]. To protect the users against these attacks, defensive mechanism rely on fine-grained access control and capabilities, decentralization [19] or static [7], [11] and dynamic [6] information-flow analysis.…”
Section: Introductionmentioning
confidence: 99%
“…An access token is then generated and used by IFTTT for future executions of any applets that use such services. Fernandes et al [12] give a detailed overview of IFTTT's use of OAuth protocol and its security implications. Applets can be installed either via IFTTT's web interface or via an IFTTT app on a user device.…”
Section: Ifttt Platform and Attacker Modelmentioning
confidence: 99%
“…Fernandes et al [11] present FlowFence, an approach to information flow tracking for IoT application frameworks. In recent work, Fernandes et al [12] argue that IFTTT's OAuth-based authorization model gives away overprivileged tokens. They suggest fine-grained OAuth tokens to limit privileges and thus prevent unauthorized actions.…”
Section: Related Workmentioning
confidence: 99%