ABSTRACT
From the perspective of end-users, IoT devices behave like a black box: As long as they work as intended, users will not detect any compromise. Users have minimal control over the software. Hence, it is very likely that the user misses that illegal recordings and transmissions occur if a security camera or a smart speaker is hacked. In this paper, we present SCAtt-man, the first remote attestation scheme that is specifically designed with the user in mind. SCAtt-man deploys software-based attestation to check the integrity of remote devices, allowing users to verify the integrity of IoT devices with their smartphones. The key novelty of SCAtt-man resides in the utilization of user-observable side-channels such as light or sound in the attestation protocol. Our proof-of-concept implementation targets a smart speaker and an attestation protocol that is based on a data-over-sound protocol. Our evaluation demonstrates the effectiveness of \toolname against a variety of attacks and its usability based on a user study with 20 participants.
- Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, and Gene Tsudik. 2016. C-FLAT: Control-Flow Attestation for Embedded Systems Software. In ACM Conference on Computer and Communications Security (CCS).Google ScholarDigital Library
- Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, and Matthias Schunter. 2019. DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems. In 26th Annual Network and Distributed System Security Symposium (NDSS).Google Scholar
- Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and Selcuk Uluagac. 2020. Peek-a-boo: I see your smart home activities, even encrypted!. In 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks.Google ScholarDigital Library
- Omar Alrawi, Chaz Lever, Manos Antonakakis, and Fabian Monrose. 2019. SoK: Security Evaluation of Home-Based IoT Deployments. In IEEE Symposium on Security and Privacy (SP).Google Scholar
- Omar Alrawi, Charles Lever, Kevin Valakuzhy, Ryan Court, Kevin Z. Snow, Fabian Monrose, and Manos Antonakakis. 2021. The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle. In 30th USENIX Security Symposium.Google Scholar
- ARM Limited. 2009. Security Technology Building a Secure System Using Trustzone Technology (White Paper).Google Scholar
- Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, and Christian Wachsmann. 2013. A security framework for the analysis and design of software attestation. In ACM Conference on Computer and Communications Security (CCS).Google ScholarDigital Library
- Amani Braham, Félix Buend'ia, Maha Khemaja, and Faiez Gargouri. 2021. User interface design patterns and ontology models for adaptive mobile applications. Personal and Ubiquitous Computing (2021).Google Scholar
- Ferdinand Brasser, Brahim El Mahjoub, Ahmad-Reza Sadeghi, Christian Wachsmann, and Patrick Koeberl. 2015. TyTAN: Tiny trust anchor for tiny devices. In 52nd Annual Design Automation Conference (DAC).Google ScholarDigital Library
- Business Wire. 2021. Strategy Analytics: Global Smart Speaker Sales Cross 150 Million Units for 2020 Following Robust Q4 Demand. https://www.businesswire.com/news/home/20210303005852/en/Strategy-Analytics-Global-Smart-Speaker-Sales-Cross-150-Million-Units-for-2020-Following-Robust-Q4-DemandGoogle Scholar
- Kelly Caine. 2016. Local Standards for Sample Size at CHI. In CHI Conference on Human Factors in Computing Systems.Google Scholar
- Claude Castelluccia, Auré lien Francillon, Daniele Perito, and Claudio Soriente. 2009. On the difficulty of software-based attestation of embedded devices. In ACM Conference on Computer and Communications Security (CCS).Google ScholarDigital Library
- Long Cheng, Christin Wilson, Song Liao, Jeffrey Young, Daniel Dong, and Hongxin Hu. 2020. Dangerous skills got certified: Measuring the trustworthiness of skill certification in voice personal assistant platforms. In ACM Conference on Computer and Communications Security (CCS).Google ScholarDigital Library
- George Coker, Joshua Guttman, Peter Loscocco, Amy Herzog, Jonathan Millen, Brian O'Hanlon, John Ramsdell, Ariel Segall, Justin Sheehy, and Brian Sniffen. 2011. Principles of Remote Attestation. International Journal of Information Security, Vol. 10, 2 (2011).Google ScholarDigital Library
- Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint archive (2016). http://eprint.iacr.org/2016/086Google Scholar
- Corbin Davenport. 2020. This smartphone has physical kill switches for its cameras, microphone, data, Bluetooth, and Wi-Fi. https://www.androidpolice.com/2020/08/22/this-smartphone-has-physical-kill-switches-for-its-cameras-microphone-data-bluetooth-and-wi-fi/ Retrieved 2022-03-07 fromGoogle Scholar
- Ghada Dessouky, Tigist Abera, Ahmad Ibrahim, and Ahmad-Reza Sadeghi. 2018. LiteHAX: Lightweight Hardware-assisted Attestation of Program Execution. In International Conference on Computer-Aided Design (ICCAD).Google ScholarDigital Library
- Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd, Lucas Davi, Patrick Koeberl, N Asokan, and Ahmad-Reza Sadeghi. 2017. LO-FAT: Low-Overhead Control Flow ATtestation in Hardware. In 54th Annual Design Automation Conference (DAC).Google ScholarDigital Library
- Jide S Edu, Jose M Such, and Guillermo Suarez-Tangil. 2020. Smart Home Personal Assistants: A Security and Privacy Review. ACM Computing Surveys (CSUR) , Vol. 53, 6 (2020).Google Scholar
- Karim Eldefrawy, Gene Tsudik, Auré lien Francillon, and Daniele Perito. 2012. SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. In 19th Annual Network and Distributed System Security Symposium (NDSS).Google Scholar
- Espressif Systems. 2018. Espressif Achieves the 100-Million Target for IoT Chip Shipments. https://www.espressif.com/en/news/Espressif_Achieves_the_Hundredmillion_Target_for_IoT_Chip_Shipments Retrieved 2022-03-07 fromGoogle Scholar
- Espressif Systems. 2021a. ESP32 Series Datasheet. https://www.espressif.com/sites/default/files/documentation/esp32_datasheet_en.pdf Retrieved 2022-03-07 fromGoogle Scholar
- Espressif Systems. 2021b. Memory Capabilities. https://docs.espressif.com/projects/esp-idf/en/latest/esp32/api-reference/system/mem_alloc.html Retrieved 2022-03--30 fromGoogle Scholar
- Espressif Systems. 2021c. Over The Air Updates (OTA). https://docs.espressif.com/projects/esp-idf/en/latest/esp32/api-reference/system/ota.html Retrieved 2022-03--30 fromGoogle Scholar
- Espressif Systems. 2022a. Partition Tables. https://docs.espressif.com/projects/esp-idf/en/latest/esp32/api-guides/partition-tables.html Retrieved 2022-03--17 fromGoogle Scholar
- Espressif Systems. 2022b. Wi-Fi Driver - ESP32 - ESP-IDF Programming Guide latest documentation. https://docs.espressif.com/projects/esp-idf/en/latest/esp32/api-guides/wifi.html Retrieved 2022-03--16 fromGoogle Scholar
- Laura Faulkner. 2003. Beyond the five-user assumption: Benefits of increased sample sizes in usability testing. Behavior Research Methods, Instruments, & Computers, Vol. 35, 3 (2003).Google Scholar
- Thomas Franke, Christiane Attig, and Daniel Wessel. 2019. A Personal Resource for Technology Interaction: Development and Validation of the Affinity for Technology Interaction (ATI) Scale. International Journal of Human--Computer Interaction, Vol. 35, 6 (2019).Google ScholarCross Ref
- FreeRTOS. 2022. GitHub - FreeRTOS. https://github.com/FreeRTOS/FreeRTOS/tree/master Retrieved 2022-03--22 fromGoogle Scholar
- Gemalto. 2018. The State of IoT Security. https://www.infopoint-security.de/media/gemalto-state-of-iot-security-report.pdf Retrieved 2022-03-07 fromGoogle Scholar
- Zhonglei Gu and Yang Liu. 2016. Scalable Group Audio-Based Authentication Scheme for IoT Devices. In 12th International Conference on Computational Intelligence and Security (CIS).Google Scholar
- Zhixiu Guo, Zijin Lin, Pan Li, and Kai Chen. 2020. SkillExplorer: Understanding the Behavior of Skills in Large Scale. In 29th USENIX Security Symposium.Google Scholar
- Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, and Patrick Tague. 2018. Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor Types. In IEEE Symposium on Security and Privacy (SP).Google Scholar
- Matthew B Hoy. 2018. Alexa, Siri, Cortana, and more: an introduction to voice assistants. Medical reference services quarterly , Vol. 37, 1 (2018).Google Scholar
- Chongkyung Kil, Emre C Sezer, Ahmed M Azab, Peng Ning, and Xiaolan Zhang. 2009. Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. In IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).Google ScholarCross Ref
- Bret Kinsella. 2021. Alexa Skill Counts Surpass 80K in US, Spain Adds the Most Skills, New Skill Rate Falls Globally. https://voicebot.ai/2021/01/14/alexa-skill-counts-surpass-80k-in-us-spain-adds-the-most-skills-new-skill-introduction-rate-continues-to-fall-across-countries/ Retrieved 2022-03--16 fromGoogle Scholar
- Bret Kinsella. 2022. Google Assistant Actions Grew Quickly in Several Languages in 2019, Matched Alexa Growth in English. https://voicebot.ai/2020/01/19/google-assistant-actions-grew-quickly-in-several-languages-in-2019-match-alexa-growth-in-english/ Retrieved 2022-03--16 fromGoogle Scholar
- Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, and Vijay Varadharajan. 2014. TrustLite: A security architecture for tiny embedded devices. In Ninth European Conference on Computer Systems (EuroSys).Google ScholarDigital Library
- Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. 2017. DDoS in the IoT: Mirai and Other Botnets. Computer, Vol. 50, 7 (2017).Google Scholar
- Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. ACM on Human-Computer Interaction , Vol. 2, CSCW (2018).Google Scholar
- Shijia Mei, Zhihong Liu, Yong Zeng, Lin Yang, and Jian Feng Ma. 2019. Listen!: Audio-based Smart IoT Device Pairing Protocol. In 19th International Conference on Communication Technology (ICCT).Google ScholarCross Ref
- Ralph Charles Merkle. 1979. Secrecy, authentication, and public key systems. Stanford University.Google Scholar
- Richard Mitev, Markus Miettinen, and Ahmad-Reza Sadeghi. 2019. Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants. In ACM Asia Conference on Computer and Communications Security (AsiaCCS).Google ScholarDigital Library
- Erik G Nilsson. 2009. Design patterns for user interface for mobile applications. Advances in engineering software , Vol. 40, 12 (2009).Google Scholar
- NodeMCU Documentation. 2022. WiFi Module. https://nodemcu.readthedocs.io/en/release/modules/wifi/ Retrieved 2022-03--16 fromGoogle Scholar
- Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, and Frank Piessens. 2013. Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base. In 22nd USENIX Security Symposium.Google Scholar
- Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, and Gene Tsudik. 2019. VRASED: A Verified Hardware/Software Co-Design for Remote Attestation. In 28th USENIX Security Symposium.Google Scholar
- Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, and Gene Tsudik. 2020. APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise. In 29th USENIX Security Symposium.Google Scholar
- Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, and Gene Tsudik. 2021a. DIALED: Data Integrity Attestation for Low-end Embedded Devices. In 58th ACM/IEEE Design Automation Conference (DAC).Google Scholar
- Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, and Gene Tsudik. 2021b. Tiny-CFA: Minimalistic Control-Flow Attestation Using Verified Proofs of Execution. In Design, Automation & Test in Europe Conference & Exhibition (DATE).Google ScholarCross Ref
- OWASP. 2018. Internet of Things (IoT) Top 10 2018. https://owasp.org/www-pdf-archive/OWASP-IoT-Top-10--2018-final.pdf Retrieved 2022-03-07 fromGoogle Scholar
- Bryan Parno, Jonathan M McCune, and Adrian Perrig. 2010. Bootstrapping Trust in Commodity Computers. In IEEE Symposium on Security and Privacy (SP).Google Scholar
- Wouter Penard and Tim van Werkhoven. 2008. On the secure hash algorithm family. Cryptography in context (2008).Google Scholar
- Pine Store ltd. 2022. PinePhone. https://pine64.com/product-category/pinephone/ Retrieved 2022-03-07 fromGoogle Scholar
- Lumpapun Punchoojit and Nuttanont Hongwarittorrn. 2017. Usability studies on mobile user interface design patterns: a systematic literature review. Advances in Human-Computer Interaction (2017).Google Scholar
- Kyle Rankin. 2019. Lockdown Mode on the Librem 5: Beyond Hardware Kill Switches. https://puri.sm/posts/lockdown-mode-on-the-librem-5-beyond-hardware-kill-switches/ Retrieved 2022-03-07 fromGoogle Scholar
- Markus Rothmuller and Sam Barker. 2020. IoT the Internet of Transformation 2020. https://www.juniperresearch.com/whitepapers/iot-the-internet-of-transformation-2020 Retrieved 2022-02--23 fromGoogle Scholar
- Nitesh Saxena, J-E Ekberg, Kari Kostiainen, and N Asokan. 2006. Secure device pairing based on a visual channel. In IEEE Symposium on Security and Privacy (SP).Google ScholarDigital Library
- Martin Schrepp, Andreas Hinderks, and Jö rg Thomaschewski. 2017. Design and Evaluation of a Short Version of the User Experience Questionnaire (UEQ-S). International Journal of Interactive Multimedia and Artificial Intelligence (2017).Google ScholarCross Ref
- Dominik Schürmann and Stephan Sigg. 2011. Secure Communication Based on Ambient Audio. IEEE Transactions on Mobile Computing , Vol. 12, 2 (2011).Google Scholar
- Arvind Seshadri, Adrian Perrig, Leendert Van Doorn, and Pradeep Khosla. 2004. SWATT: Software-based attestation for embedded devices. In IEEE Symposium on Security and Privacy (SP). IEEE. https://doi.org/10.1109/SECPRI.2004.1301329Google ScholarCross Ref
- Smiljanic Stasha. 2021. An In-Depth View into Smart Home Statistics. https://policyadvice.net/insurance/insights/smart-home-statistics/ Retrieved 2022-02--25 fromGoogle Scholar
- Rodrigo Vieira Steiner and Emil Lupu. 2016. Attestation in Wireless Sensor Networks: A Survey. ACM Computing Surveys (CSUR) , Vol. 49, 3 (2016).Google ScholarDigital Library
- Rodrigo Vieira Steiner and Emil Lupu. 2019. Towards more practical software-based attestation. Computer Networks , Vol. 149 (2019).Google Scholar
- Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, and Wei Wang. 2020. "Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills. arXiv preprint arXiv:2010.10788 (2020).Google Scholar
- Zhichuang Sun, Bo Feng, Long Lu, and Somesh Jha. 2020. OAT: Attesting Operation Integrity of Embedded Devices. In IEEE Symposium on Security and Privacy (SP).Google Scholar
- Sebastian Surminski, Christian Niesler, Ferdinand Brasser, Lucas Davi, and Ahmad-Reza Sadeghi. 2021. RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints. In ACM Conference on Computer and Communications Security (CCS).Google ScholarDigital Library
- Trusted Computing Group. 2019. Trusted Platform Module Library Specification, Family ?2.0", Level 00, Revision 01.59 -- November 2019. https://trustedcomputinggroup.org/work-groups/trusted-platform-module/ Retrieved 2022-03--26 fromGoogle Scholar
- Lionel Sujay Vailshery. 2022. Internet of Things (IoT) total annual revenue worldwide from 2020 to 2030. https://www.statista.com/statistics/1194709/iot-revenue-worldwide/ Retrieved 2023-02-06 fromGoogle Scholar
- Minhua Wu, Sankaran Panchapagesan, Ming Sun, Jiacheng Gu, Ryan Thomas, Shiv Naga Prasad Vitaladevuni, Bjorn Hoffmeister, and Arindam Mandal. 2018. Monophone-Based Background Modeling for Two-Stage On-Device Wake Word Detection. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).Google Scholar
- Weitao Xu, Chitra Javali, Girish Revadigar, Chengwen Luo, Neil Bergmann, and Wen Hu. 2017. Gait-Key: A Gait-Based Shared Secret Key Generation Protocol for Wearable Devices. ACM Transactions on Sensor Networks (TOSN) , Vol. 13, 1 (2017).Google ScholarDigital Library
- Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017).Google Scholar
- Matthias Zeppelzauer, Alexis Ringot, and Florian Taurer. 2019. SoniTalk -- an open ultrasonic communication protocol. https://sonitalk.fhstp.ac.at/ Retrieved 2022-03-07 fromGoogle Scholar
- Matthias Zeppelzauer, Alexis Ringot, and Florian Taurer. 2022. SoniTalk. https://github.com/fhstp/SoniTalk Retrieved 2022-03-07 fromGoogle Scholar
- Nan Zhang, Xianghang Mi, Xuan Feng, XiaoFeng Wang, Yuan Tian, and Feng Qian. 2019. Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems. In IEEE Symposium on Security and Privacy (SP).Google ScholarCross Ref
- Shaohu Zhang and Anupam Das. 2021. HandLock: Enabling 2-FA for Smart Home Voice Assistants using Inaudible Acoustic Signal. In 24th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).Google ScholarDigital Library
- Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User Perceptions of Smart Home IoT Privacy. ACM on human-computer interaction , Vol. 2, CSCW (2018). ioGoogle Scholar
Index Terms
- SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users Understand
Recommendations
RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecuritySmart factories, critical infrastructures, and medical devices largely rely on embedded systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies and reports have revealed that many of these devices suffer from crucial ...
Remote attestation for low-end embedded devices: the prover's perspective
DAC '16: Proceedings of the 53rd Annual Design Automation ConferenceSecurity of embedded devices is a timely and important issue, due to the proliferation of these devices into numerous and diverse settings, as well as their growing popularity as attack targets, especially, via remote malware infestations. One important ...
A TOCTOU Attack on DICE Attestation
CODASPY '22: Proceedings of the Twelfth ACM Conference on Data and Application Security and PrivacyA major security challenge for modern IoT deployments is to ensure that the devices run legitimate firmware free from malware. This challenge can be addressed through a security primitive called attestation which allows a remote backend to verify the ...
Comments