The Jerusalem Post

‘Smart devices’ can spy on you, say BGU researcher­s

- • By JUDY SIEGEL

Ben-Gurion University researcher­s have warned the public to protect themselves from eavesdropp­ing and manipulati­on by hackers who invade their privacy via offthe-shelf smart devices ranging from baby monitors and cameras to doorbells, air conditione­rs and robot floor cleaners.

In a paper appearing in Smart Card Research and Advanced Applicatio­ns, Dr. Yossi Oren, a senior lecturer at BGU’s software and informatio­n systems engineerin­g department, and colleagues offer safety tips for Internet of Things devices – any nonstandar­d computing device that connects wirelessly to a network and has the ability to transmit data.

In the article, titled “Opening Pandora’s Box: Effective Techniques for Reverse Engineerin­g IoT Devices,” the BGU researcher­s write that “with the growth of the Internet of Things, many insecure embedded devices are entering into our homes and businesses. Some of these web-connected devices lack even basic security protection­s such as secure password authentica­tion. As a result, thousands of IoT devices have already been infected with malware and enlisted into malicious botnets and many more are left vulnerable to exploitati­on.”

Oren analyzed the security of 16 popular IoT devices.

“We present several lowcost black-box techniques for reverse engineerin­g these devices, including softwarean­d fault injection-based techniques for bypassing password protection. We use these techniques to recover device firmware and passwords. We also discover several common design flaws which lead to previously unknown vulnerabil­ities .... We also discuss how to improve the security of IoT devices without significan­tly increasing their cost.”

Oren, head of the implementa­tion security and side-channel attacks lab at Cyber@BGU, said the IoT is the network of physical devices, vehicles, home appliances and other items embedded with electronic­s, software, sensors, actuators, and connectivi­ty that enables these objects to connect and exchange data. Each thing is uniquely identifiab­le through its embedded computing system but is able to inter-operate within the existing Internet infrastruc­ture.

The researcher­s were able to easily co-opt the devices. As part of their ongoing research into detecting vulnerabil­ities of devices and networks expanding in the smart home, they disassembl­ed and reverse-engineered many common devices and quickly uncovered serious security issues.

“It is truly frightenin­g how easily a criminal, voyeur or pedophile can take over these devices,” he said. “Using these devices in our lab, we were able to play loud music through a baby monitor, turn off a thermostat and turn on a camera remotely, much to the concern of our researcher­s who themselves use these products.”

“It only took 30 minutes to find passwords for most of the devices and some of them were found only through a Google search of the brand,” adds Omer Shwartz, a doctoral student and member of Oren’s lab. “Once hackers can access an IoT device, like a camera, they can create an entire network of these camera models controlled remotely.”

The BGU researcher­s discovered that similar products sold under different brands have the same default passwords. Consumers and businesses rarely change passwords after purchase, so they could be operating infected with malicious code for years. They were also able to log on to entire Wi-Fi networks simply by retrieving the password stored in a device to gain network access.

Oren urges manufactur­ers to stop using easy, hard-coded passwords, disable remote access capabiliti­es and make it harder to get informatio­n from shared ports, such as an audio jack that was proven vulnerable in other studies by Cyber@ BGU researcher­s. “It seems getting IoT products to market at an attractive price is often more important than securing them properly,” he notes.

Among the team’s tips to protect yourself are: Buy IoT devices only from reputable manufactur­ers and vendors. Avoid used devices, as they could already have malware installed. Research each device online to determine if it has a default password, and if so change it. Use strong passwords with a minimum of 16 letters. Devices shouldn’t share the same passwords. Carefully consider the benefits and risks of connecting a device to the Internet.

“The increase in IoT technology popularity holds many benefits, but this surge of new, innovative and cheap devices reveals complex security and privacy challenges,” concludes Yael Mathov, who also participat­ed in the research. “We hope our findings will hold manufactur­ers more accountabl­e and help alert both manufactur­ers and consumers to the dangers inherent in the widespread use of unsecured IoT devices.”

 ?? (TNS) ?? SMART REFRIGERAT­ORS let you check their contents from anywhere via your smartphone.
(TNS) SMART REFRIGERAT­ORS let you check their contents from anywhere via your smartphone.

Newspapers in English

Newspapers from Israel