skip to main content
10.1145/3212480.3212496acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning

Published:18 June 2018Publication History

ABSTRACT

Smart devices without an interactive UI (e.g., a smart bulb) typically rely on specific provisioning schemes to connect to wireless networks. Among all the provisioning schemes, SmartCfg is a popular technology to configure the connection between smart devices and wireless routers. Although the SmartCfg technology facilitates the Wi-Fi configuration, existing solutions seldom take into serious consideration the protection of credentials and therefore introduce security threats against Wi-Fi credentials.

This paper conducts a security analysis against eight SmartCfg based Wi-Fi provisioning solutions designed by different wireless module manufacturers. Our analysis demonstrates that six manufacturers provide flawed SmartCfg implementations that directly lead to the exposure of Wi-Fi credentials: attackers could exploit these flaws to obtain important credentials without any substantial efforts on brute-force password cracking. Furthermore, we keep track of the smart devices that adopt such Wi-Fi provisioning solutions to investigate the influence of the security flaws on real world products. Through reversely analyzing the corresponding apps of those smart devices we conclude that the flawed SmartCfg implementations constitute a wide potential impact on the security of smart home ecosystems.

References

  1. Broadlink official website. http://www.broadlink.com.cn/pageihc.html. Accessed February 28, 2018.Google ScholarGoogle Scholar
  2. Myapp app market. http://android.myapp.com/myapp/searchAjax.htm?kw=smartconfig&pns=3. Accessed March 5, 2018.Google ScholarGoogle Scholar
  3. Smarthome - home automation systems, products, kits, hubs. https://www.smarthome.com/. Accessed March 5, 2018.Google ScholarGoogle Scholar
  4. Michael Backes, Sven Bugiel, and Erik Derr. Reliable third-party library detection in android and its security applications. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 356--367. ACM, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. bayitHome. bayithomeautomation. www.bayithomeautomation.com. Accessed February 26, 2018.Google ScholarGoogle Scholar
  6. BroadLink. Library of libbroadlinkconfig. https://github.com/ruifeng2357/Breeze/blob/master/libs/armeabi/libBroadLinkConfig.so. Accessed February 26, 2018.Google ScholarGoogle Scholar
  7. Daming D Chen, Maverick Woo, David Brumley, and Manuel Egele. Towards automated dynamic analysis for linux-based embedded firmware. In NDSS, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  8. Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, and Kehuan Zhang. Iotfuzzer: Discovering memory corruptions in iot through app-based fuzzing.Google ScholarGoogle Scholar
  9. Espressif. Espressif document. https://www.espressif.com/en/support/download/documents. Accessed February 27, 2018.Google ScholarGoogle Scholar
  10. EspressifApp. Esptouchforandroid. https://github.com/EspressifApp/EsptouchForAndroid/. Accessed February 26, 2018.Google ScholarGoogle Scholar
  11. EspressifApp. Esptouch_protocol. https://github.com/EspressifApp/EsptouchForAndroid/blob/master/src/com/espressif/iot/esptouch/protocol/DatumCode.java. Accessed February 26, 2018.Google ScholarGoogle Scholar
  12. Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, and Mauro Conti. Breaking fitness records without moving: Reverse engineering and spoofing fitbit. In International Symposium on Research in Attacks, Intrusions, and Defenses, pages 48--69. Springer, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  13. Dennis Giese and Daniel Wegemer. Reversing iot xiaomi ecosystem. https://recon.cx/2018/brussels/resources/slides/RECON-BRX-2018-Reversing-IoT-Xiaomi-ecosystem.pdf. Accessed March 5, 2018.Google ScholarGoogle Scholar
  14. High-Flying. Hf low power wifi module user manual. http://www.hi-flying.com/download-center-1/user-guide-1/download-item-hf-lpx30-user-manual. Accessed November 23, 2017.Google ScholarGoogle Scholar
  15. Texas Instruments. Simplelink wi-fi smartconfig technology. http://www.ti.com/tool/SMARTCONFIG?keyMatch=smartconfig&tisearch=Search-. Accessed February 28, 2018.Google ScholarGoogle Scholar
  16. Hui Liu, Changyu Li, Xuancheng Jin, Juanru Li, Yuanyuan Zhang, and Dawu Gu. Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, pages 13--18. ACM, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. MediaTek. Mediatek linkit connect 7681 developer's guide. https://docs.labs.mediatek.com/resource/linkit-connect-7681/en/documents. Published Mar 12, 2016.Google ScholarGoogle Scholar
  18. MXCHIP. Easylinkandroid_demo. https://github.com/MXCHIP/EasylinkAndroid_Demo/. Accessed February 26, 2018.Google ScholarGoogle Scholar
  19. NufrontIOT. Nl6621 sdk user manual. https://github.com/NufrontIOT/NL6621_StandardSDK/blob/master/Document. Accessed February 26, 2018.Google ScholarGoogle Scholar
  20. NufrontIOT. Nl6621_standardsdk. https://github.com/NufrontIOT/NL6621_StandardSDK. Accessed February 26, 2018.Google ScholarGoogle Scholar
  21. Kenneth G Paterson, Bertram Poettering, and Jacob CN Schuldt. Plaintext recovery attacks against wpa/tkip. In International Workshop on Fast Software Encryption, pages 325--349. Springer, 2014.Google ScholarGoogle Scholar
  22. Realtek. Android_simpleconfigwizard. https://www.amebaiot.com/cn/standard-sdk-simple-config/. Accessed February 26, 2018.Google ScholarGoogle Scholar
  23. Realtek. Realtek ameba user manual. https://www.amebaiot.com/cn/ameba-sdk-download/. Accessed February 26, 2018.Google ScholarGoogle Scholar
  24. Gil Reiter. A primer to wi-fi® provisioning for iot applications. Texas Instruments White Paper, 2014.Google ScholarGoogle Scholar
  25. Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, and Giovanni Vigna. Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware. In NDSS, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  26. Shao Shuai, Dong Guowei, Guo Tao, Yang Tianchang, and Shi Chenjie. Modelling analysis and auto-detection of cryptographic misuse in android applications. In Dependable, Autonomic and Secure Computing (DASC), 2014 IEEE 12th International Conference on, pages 75--80. IEEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. TI. Smartconfigcc3x. http://www.ti.com/wireless-connectivity/simplelink-solutions/wi-fi/tools-software.html. Published February 26, 2018.Google ScholarGoogle Scholar
  28. Mathy Vanhoef and Frank Piessens. All your biases belong to us: Breaking rc4 in wpa-tkip and tls. In USENIX Security Symposium, pages 97--112, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Mathy Vanhoef and Frank Piessens. Key reinstallation attacks: Forcing nonce reuse in wpa2. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 1313--1328. ACM, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. wikipedia. Wi-fi protected access. https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access. Accessed February 28, 2018.Google ScholarGoogle Scholar
  31. Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, et al. Understanding iot security through the data crystal ball: Where we are now and where we are going to be. arXiv preprint arXiv:1703.09809, 2017.Google ScholarGoogle Scholar
  32. Chaoshun Zuo and Zhiqiang Lin. Smartgen: Exposing server urls of mobile apps with selective symbolic execution. In Proceedings of the 26th International Conference on World Wide Web, pages 867--876. International World Wide Web Conferences Steering Committee, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Chaoshun Zuo, Wubing Wang, Zhiqiang Lin, and Rui Wang. Automatic forgery of cryptographically consistent messages to identify security vulnerabilities in mobile services. In NDSS, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  34. Chaoshun Zuo, Qingchuan Zhao, and Zhiqiang Lin. Authscope: Towards automatic discovery of vulnerable authorizations in online services. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 799--813. ACM, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WiSec '18: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks
        June 2018
        317 pages
        ISBN:9781450357319
        DOI:10.1145/3212480

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 June 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate98of338submissions,29%

        Upcoming Conference

        WiSec '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader