skip to main content
10.1145/3577923.3583652acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users Understand

Published:24 April 2023Publication History

ABSTRACT

From the perspective of end-users, IoT devices behave like a black box: As long as they work as intended, users will not detect any compromise. Users have minimal control over the software. Hence, it is very likely that the user misses that illegal recordings and transmissions occur if a security camera or a smart speaker is hacked. In this paper, we present SCAtt-man, the first remote attestation scheme that is specifically designed with the user in mind. SCAtt-man deploys software-based attestation to check the integrity of remote devices, allowing users to verify the integrity of IoT devices with their smartphones. The key novelty of SCAtt-man resides in the utilization of user-observable side-channels such as light or sound in the attestation protocol. Our proof-of-concept implementation targets a smart speaker and an attestation protocol that is based on a data-over-sound protocol. Our evaluation demonstrates the effectiveness of \toolname against a variety of attacks and its usability based on a user study with 20 participants.

References

  1. Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, and Gene Tsudik. 2016. C-FLAT: Control-Flow Attestation for Embedded Systems Software. In ACM Conference on Computer and Communications Security (CCS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, and Matthias Schunter. 2019. DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems. In 26th Annual Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle Scholar
  3. Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and Selcuk Uluagac. 2020. Peek-a-boo: I see your smart home activities, even encrypted!. In 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Omar Alrawi, Chaz Lever, Manos Antonakakis, and Fabian Monrose. 2019. SoK: Security Evaluation of Home-Based IoT Deployments. In IEEE Symposium on Security and Privacy (SP).Google ScholarGoogle Scholar
  5. Omar Alrawi, Charles Lever, Kevin Valakuzhy, Ryan Court, Kevin Z. Snow, Fabian Monrose, and Manos Antonakakis. 2021. The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle. In 30th USENIX Security Symposium.Google ScholarGoogle Scholar
  6. ARM Limited. 2009. Security Technology Building a Secure System Using Trustzone Technology (White Paper).Google ScholarGoogle Scholar
  7. Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, and Christian Wachsmann. 2013. A security framework for the analysis and design of software attestation. In ACM Conference on Computer and Communications Security (CCS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Amani Braham, Félix Buend'ia, Maha Khemaja, and Faiez Gargouri. 2021. User interface design patterns and ontology models for adaptive mobile applications. Personal and Ubiquitous Computing (2021).Google ScholarGoogle Scholar
  9. Ferdinand Brasser, Brahim El Mahjoub, Ahmad-Reza Sadeghi, Christian Wachsmann, and Patrick Koeberl. 2015. TyTAN: Tiny trust anchor for tiny devices. In 52nd Annual Design Automation Conference (DAC).Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Business Wire. 2021. Strategy Analytics: Global Smart Speaker Sales Cross 150 Million Units for 2020 Following Robust Q4 Demand. https://www.businesswire.com/news/home/20210303005852/en/Strategy-Analytics-Global-Smart-Speaker-Sales-Cross-150-Million-Units-for-2020-Following-Robust-Q4-DemandGoogle ScholarGoogle Scholar
  11. Kelly Caine. 2016. Local Standards for Sample Size at CHI. In CHI Conference on Human Factors in Computing Systems.Google ScholarGoogle Scholar
  12. Claude Castelluccia, Auré lien Francillon, Daniele Perito, and Claudio Soriente. 2009. On the difficulty of software-based attestation of embedded devices. In ACM Conference on Computer and Communications Security (CCS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Long Cheng, Christin Wilson, Song Liao, Jeffrey Young, Daniel Dong, and Hongxin Hu. 2020. Dangerous skills got certified: Measuring the trustworthiness of skill certification in voice personal assistant platforms. In ACM Conference on Computer and Communications Security (CCS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. George Coker, Joshua Guttman, Peter Loscocco, Amy Herzog, Jonathan Millen, Brian O'Hanlon, John Ramsdell, Ariel Segall, Justin Sheehy, and Brian Sniffen. 2011. Principles of Remote Attestation. International Journal of Information Security, Vol. 10, 2 (2011).Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint archive (2016). http://eprint.iacr.org/2016/086Google ScholarGoogle Scholar
  16. Corbin Davenport. 2020. This smartphone has physical kill switches for its cameras, microphone, data, Bluetooth, and Wi-Fi. https://www.androidpolice.com/2020/08/22/this-smartphone-has-physical-kill-switches-for-its-cameras-microphone-data-bluetooth-and-wi-fi/ Retrieved 2022-03-07 fromGoogle ScholarGoogle Scholar
  17. Ghada Dessouky, Tigist Abera, Ahmad Ibrahim, and Ahmad-Reza Sadeghi. 2018. LiteHAX: Lightweight Hardware-assisted Attestation of Program Execution. In International Conference on Computer-Aided Design (ICCAD).Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd, Lucas Davi, Patrick Koeberl, N Asokan, and Ahmad-Reza Sadeghi. 2017. LO-FAT: Low-Overhead Control Flow ATtestation in Hardware. In 54th Annual Design Automation Conference (DAC).Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Jide S Edu, Jose M Such, and Guillermo Suarez-Tangil. 2020. Smart Home Personal Assistants: A Security and Privacy Review. ACM Computing Surveys (CSUR) , Vol. 53, 6 (2020).Google ScholarGoogle Scholar
  20. Karim Eldefrawy, Gene Tsudik, Auré lien Francillon, and Daniele Perito. 2012. SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. In 19th Annual Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle Scholar
  21. Espressif Systems. 2018. Espressif Achieves the 100-Million Target for IoT Chip Shipments. https://www.espressif.com/en/news/Espressif_Achieves_the_Hundredmillion_Target_for_IoT_Chip_Shipments Retrieved 2022-03-07 fromGoogle ScholarGoogle Scholar
  22. Espressif Systems. 2021a. ESP32 Series Datasheet. https://www.espressif.com/sites/default/files/documentation/esp32_datasheet_en.pdf Retrieved 2022-03-07 fromGoogle ScholarGoogle Scholar
  23. Espressif Systems. 2021b. Memory Capabilities. https://docs.espressif.com/projects/esp-idf/en/latest/esp32/api-reference/system/mem_alloc.html Retrieved 2022-03--30 fromGoogle ScholarGoogle Scholar
  24. Espressif Systems. 2021c. Over The Air Updates (OTA). https://docs.espressif.com/projects/esp-idf/en/latest/esp32/api-reference/system/ota.html Retrieved 2022-03--30 fromGoogle ScholarGoogle Scholar
  25. Espressif Systems. 2022a. Partition Tables. https://docs.espressif.com/projects/esp-idf/en/latest/esp32/api-guides/partition-tables.html Retrieved 2022-03--17 fromGoogle ScholarGoogle Scholar
  26. Espressif Systems. 2022b. Wi-Fi Driver - ESP32 - ESP-IDF Programming Guide latest documentation. https://docs.espressif.com/projects/esp-idf/en/latest/esp32/api-guides/wifi.html Retrieved 2022-03--16 fromGoogle ScholarGoogle Scholar
  27. Laura Faulkner. 2003. Beyond the five-user assumption: Benefits of increased sample sizes in usability testing. Behavior Research Methods, Instruments, & Computers, Vol. 35, 3 (2003).Google ScholarGoogle Scholar
  28. Thomas Franke, Christiane Attig, and Daniel Wessel. 2019. A Personal Resource for Technology Interaction: Development and Validation of the Affinity for Technology Interaction (ATI) Scale. International Journal of Human--Computer Interaction, Vol. 35, 6 (2019).Google ScholarGoogle ScholarCross RefCross Ref
  29. FreeRTOS. 2022. GitHub - FreeRTOS. https://github.com/FreeRTOS/FreeRTOS/tree/master Retrieved 2022-03--22 fromGoogle ScholarGoogle Scholar
  30. Gemalto. 2018. The State of IoT Security. https://www.infopoint-security.de/media/gemalto-state-of-iot-security-report.pdf Retrieved 2022-03-07 fromGoogle ScholarGoogle Scholar
  31. Zhonglei Gu and Yang Liu. 2016. Scalable Group Audio-Based Authentication Scheme for IoT Devices. In 12th International Conference on Computational Intelligence and Security (CIS).Google ScholarGoogle Scholar
  32. Zhixiu Guo, Zijin Lin, Pan Li, and Kai Chen. 2020. SkillExplorer: Understanding the Behavior of Skills in Large Scale. In 29th USENIX Security Symposium.Google ScholarGoogle Scholar
  33. Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, and Patrick Tague. 2018. Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor Types. In IEEE Symposium on Security and Privacy (SP).Google ScholarGoogle Scholar
  34. Matthew B Hoy. 2018. Alexa, Siri, Cortana, and more: an introduction to voice assistants. Medical reference services quarterly , Vol. 37, 1 (2018).Google ScholarGoogle Scholar
  35. Chongkyung Kil, Emre C Sezer, Ahmed M Azab, Peng Ning, and Xiaolan Zhang. 2009. Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. In IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).Google ScholarGoogle ScholarCross RefCross Ref
  36. Bret Kinsella. 2021. Alexa Skill Counts Surpass 80K in US, Spain Adds the Most Skills, New Skill Rate Falls Globally. https://voicebot.ai/2021/01/14/alexa-skill-counts-surpass-80k-in-us-spain-adds-the-most-skills-new-skill-introduction-rate-continues-to-fall-across-countries/ Retrieved 2022-03--16 fromGoogle ScholarGoogle Scholar
  37. Bret Kinsella. 2022. Google Assistant Actions Grew Quickly in Several Languages in 2019, Matched Alexa Growth in English. https://voicebot.ai/2020/01/19/google-assistant-actions-grew-quickly-in-several-languages-in-2019-match-alexa-growth-in-english/ Retrieved 2022-03--16 fromGoogle ScholarGoogle Scholar
  38. Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, and Vijay Varadharajan. 2014. TrustLite: A security architecture for tiny embedded devices. In Ninth European Conference on Computer Systems (EuroSys).Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. 2017. DDoS in the IoT: Mirai and Other Botnets. Computer, Vol. 50, 7 (2017).Google ScholarGoogle Scholar
  40. Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. ACM on Human-Computer Interaction , Vol. 2, CSCW (2018).Google ScholarGoogle Scholar
  41. Shijia Mei, Zhihong Liu, Yong Zeng, Lin Yang, and Jian Feng Ma. 2019. Listen!: Audio-based Smart IoT Device Pairing Protocol. In 19th International Conference on Communication Technology (ICCT).Google ScholarGoogle ScholarCross RefCross Ref
  42. Ralph Charles Merkle. 1979. Secrecy, authentication, and public key systems. Stanford University.Google ScholarGoogle Scholar
  43. Richard Mitev, Markus Miettinen, and Ahmad-Reza Sadeghi. 2019. Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants. In ACM Asia Conference on Computer and Communications Security (AsiaCCS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Erik G Nilsson. 2009. Design patterns for user interface for mobile applications. Advances in engineering software , Vol. 40, 12 (2009).Google ScholarGoogle Scholar
  45. NodeMCU Documentation. 2022. WiFi Module. https://nodemcu.readthedocs.io/en/release/modules/wifi/ Retrieved 2022-03--16 fromGoogle ScholarGoogle Scholar
  46. Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, and Frank Piessens. 2013. Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base. In 22nd USENIX Security Symposium.Google ScholarGoogle Scholar
  47. Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, and Gene Tsudik. 2019. VRASED: A Verified Hardware/Software Co-Design for Remote Attestation. In 28th USENIX Security Symposium.Google ScholarGoogle Scholar
  48. Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, and Gene Tsudik. 2020. APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise. In 29th USENIX Security Symposium.Google ScholarGoogle Scholar
  49. Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, and Gene Tsudik. 2021a. DIALED: Data Integrity Attestation for Low-end Embedded Devices. In 58th ACM/IEEE Design Automation Conference (DAC).Google ScholarGoogle Scholar
  50. Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, and Gene Tsudik. 2021b. Tiny-CFA: Minimalistic Control-Flow Attestation Using Verified Proofs of Execution. In Design, Automation & Test in Europe Conference & Exhibition (DATE).Google ScholarGoogle ScholarCross RefCross Ref
  51. OWASP. 2018. Internet of Things (IoT) Top 10 2018. https://owasp.org/www-pdf-archive/OWASP-IoT-Top-10--2018-final.pdf Retrieved 2022-03-07 fromGoogle ScholarGoogle Scholar
  52. Bryan Parno, Jonathan M McCune, and Adrian Perrig. 2010. Bootstrapping Trust in Commodity Computers. In IEEE Symposium on Security and Privacy (SP).Google ScholarGoogle Scholar
  53. Wouter Penard and Tim van Werkhoven. 2008. On the secure hash algorithm family. Cryptography in context (2008).Google ScholarGoogle Scholar
  54. Pine Store ltd. 2022. PinePhone. https://pine64.com/product-category/pinephone/ Retrieved 2022-03-07 fromGoogle ScholarGoogle Scholar
  55. Lumpapun Punchoojit and Nuttanont Hongwarittorrn. 2017. Usability studies on mobile user interface design patterns: a systematic literature review. Advances in Human-Computer Interaction (2017).Google ScholarGoogle Scholar
  56. Kyle Rankin. 2019. Lockdown Mode on the Librem 5: Beyond Hardware Kill Switches. https://puri.sm/posts/lockdown-mode-on-the-librem-5-beyond-hardware-kill-switches/ Retrieved 2022-03-07 fromGoogle ScholarGoogle Scholar
  57. Markus Rothmuller and Sam Barker. 2020. IoT the Internet of Transformation 2020. https://www.juniperresearch.com/whitepapers/iot-the-internet-of-transformation-2020 Retrieved 2022-02--23 fromGoogle ScholarGoogle Scholar
  58. Nitesh Saxena, J-E Ekberg, Kari Kostiainen, and N Asokan. 2006. Secure device pairing based on a visual channel. In IEEE Symposium on Security and Privacy (SP).Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Martin Schrepp, Andreas Hinderks, and Jö rg Thomaschewski. 2017. Design and Evaluation of a Short Version of the User Experience Questionnaire (UEQ-S). International Journal of Interactive Multimedia and Artificial Intelligence (2017).Google ScholarGoogle ScholarCross RefCross Ref
  60. Dominik Schürmann and Stephan Sigg. 2011. Secure Communication Based on Ambient Audio. IEEE Transactions on Mobile Computing , Vol. 12, 2 (2011).Google ScholarGoogle Scholar
  61. Arvind Seshadri, Adrian Perrig, Leendert Van Doorn, and Pradeep Khosla. 2004. SWATT: Software-based attestation for embedded devices. In IEEE Symposium on Security and Privacy (SP). IEEE. https://doi.org/10.1109/SECPRI.2004.1301329Google ScholarGoogle ScholarCross RefCross Ref
  62. Smiljanic Stasha. 2021. An In-Depth View into Smart Home Statistics. https://policyadvice.net/insurance/insights/smart-home-statistics/ Retrieved 2022-02--25 fromGoogle ScholarGoogle Scholar
  63. Rodrigo Vieira Steiner and Emil Lupu. 2016. Attestation in Wireless Sensor Networks: A Survey. ACM Computing Surveys (CSUR) , Vol. 49, 3 (2016).Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Rodrigo Vieira Steiner and Emil Lupu. 2019. Towards more practical software-based attestation. Computer Networks , Vol. 149 (2019).Google ScholarGoogle Scholar
  65. Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, and Wei Wang. 2020. "Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills. arXiv preprint arXiv:2010.10788 (2020).Google ScholarGoogle Scholar
  66. Zhichuang Sun, Bo Feng, Long Lu, and Somesh Jha. 2020. OAT: Attesting Operation Integrity of Embedded Devices. In IEEE Symposium on Security and Privacy (SP).Google ScholarGoogle Scholar
  67. Sebastian Surminski, Christian Niesler, Ferdinand Brasser, Lucas Davi, and Ahmad-Reza Sadeghi. 2021. RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints. In ACM Conference on Computer and Communications Security (CCS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Trusted Computing Group. 2019. Trusted Platform Module Library Specification, Family ?2.0", Level 00, Revision 01.59 -- November 2019. https://trustedcomputinggroup.org/work-groups/trusted-platform-module/ Retrieved 2022-03--26 fromGoogle ScholarGoogle Scholar
  69. Lionel Sujay Vailshery. 2022. Internet of Things (IoT) total annual revenue worldwide from 2020 to 2030. https://www.statista.com/statistics/1194709/iot-revenue-worldwide/ Retrieved 2023-02-06 fromGoogle ScholarGoogle Scholar
  70. Minhua Wu, Sankaran Panchapagesan, Ming Sun, Jiacheng Gu, Ryan Thomas, Shiv Naga Prasad Vitaladevuni, Bjorn Hoffmeister, and Arindam Mandal. 2018. Monophone-Based Background Modeling for Two-Stage On-Device Wake Word Detection. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).Google ScholarGoogle Scholar
  71. Weitao Xu, Chitra Javali, Girish Revadigar, Chengwen Luo, Neil Bergmann, and Wen Hu. 2017. Gait-Key: A Gait-Based Shared Secret Key Generation Protocol for Wearable Devices. ACM Transactions on Sensor Networks (TOSN) , Vol. 13, 1 (2017).Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017).Google ScholarGoogle Scholar
  73. Matthias Zeppelzauer, Alexis Ringot, and Florian Taurer. 2019. SoniTalk -- an open ultrasonic communication protocol. https://sonitalk.fhstp.ac.at/ Retrieved 2022-03-07 fromGoogle ScholarGoogle Scholar
  74. Matthias Zeppelzauer, Alexis Ringot, and Florian Taurer. 2022. SoniTalk. https://github.com/fhstp/SoniTalk Retrieved 2022-03-07 fromGoogle ScholarGoogle Scholar
  75. Nan Zhang, Xianghang Mi, Xuan Feng, XiaoFeng Wang, Yuan Tian, and Feng Qian. 2019. Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems. In IEEE Symposium on Security and Privacy (SP).Google ScholarGoogle ScholarCross RefCross Ref
  76. Shaohu Zhang and Anupam Das. 2021. HandLock: Enabling 2-FA for Smart Home Voice Assistants using Inaudible Acoustic Signal. In 24th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User Perceptions of Smart Home IoT Privacy. ACM on human-computer interaction , Vol. 2, CSCW (2018). ioGoogle ScholarGoogle Scholar

Index Terms

  1. SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users Understand

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CODASPY '23: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy
        April 2023
        304 pages
        ISBN:9798400700675
        DOI:10.1145/3577923

        Copyright © 2023 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 24 April 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate149of789submissions,19%

        Upcoming Conference

        CODASPY '24
      • Article Metrics

        • Downloads (Last 12 months)186
        • Downloads (Last 6 weeks)7

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader