<div class="csl-bib-body">
<div class="csl-entry">Tagliaro, C., Komsic, M., Continella, A., Borgolte, K., & Lindorfer, M. (2024). Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols. In <i>RAID ’24: Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses</i> (pp. 561–578). https://doi.org/10.1145/3678890.3678899</div>
</div>
-
dc.identifier.uri
http://hdl.handle.net/20.500.12708/203812
-
dc.description.abstract
Internet-of-Things (IoT) devices, ranging from smart home assistants to health devices, are pervasive: Forecasts estimate their number to reach 29 billion by 2030. Understanding the security of their machine-to-machine communication is crucial. Prior work focused on identifying devices’ vulnerabilities or proposed protocol-specific solutions. Instead, we investigate the security of backends speaking IoT protocols, that is, the backbone of the IoT ecosystem.
We focus on three real-world protocols for our large-scale analysis: MQTT, CoAP, and XMPP. We gather a dataset of over 337,000 backends, augment it with geographical and provider data, and perform non-invasive active measurements to investigate three major security threats: information leakage, weak authentication, and denial of service. Our results provide quantitative evidence of a problematic immaturity in the IoT ecosystem. Among other issues, we find that 9.44% backends expose information, 30.38% CoAP-speaking backends are vulnerable to denial of service attacks, and 99.84% of MQTT- and XMPP-speaking backends use insecure transport protocols (only 0.16% adopt TLS, of which 70.93% adopt a vulnerable version).
en
dc.description.sponsorship
WWTF Wiener Wissenschafts-, Forschu und Technologiefonds
-
dc.language.iso
en
-
dc.rights.uri
http://creativecommons.org/licenses/by/4.0/
-
dc.subject
Internet of Things (IoT)
en
dc.subject
Backend Security
en
dc.subject
Large-scale Measurements
en
dc.subject
Message Queue Telemetry Transport (MQTT)
en
dc.subject
Constrained Application Protocol (CoAP)
en
dc.subject
Extensible Messaging and Presence Protocol (XMPP)
en
dc.subject
Network Security
en
dc.subject
Information Leakage
en
dc.subject
Denial of Service
en
dc.subject
Weak Authentication
en
dc.title
Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols