Software Update Practices on Smart Home IoT Devices

08/30/2022
by   Vijay Prakash, et al.
0

Smart home IoT devices are known to be breeding grounds for security and privacy vulnerabilities. Although some IoT vendors deploy updates, the update process is mostly opaque to researchers. It is unclear what software components are on devices, whether and when these components are updated, and how vulnerabilities change alongside the updates. This opaqueness makes it difficult to understand the security of software supply chains of IoT devices. To understand the software update practices on IoT devices, we leverage IoT Inspector's dataset of network traffic from real-world IoT devices. We analyze the User Agent strings from plain-text HTTP connections. We focus on four software components included in User Agents: cURL, Wget, OkHttp, and python-requests. By keeping track of what kinds of devices have which of these components at what versions, we find that many IoT devices potentially used outdated and vulnerable versions of these components - based on the User Agents - even though less vulnerable, more updated versions were available; and that the rollout of updates tends to be slow for some IoT devices.

READ FULL TEXT

page 4

page 6

page 7

page 10

page 11

research
09/20/2022

Toward Identification and Characterization of IoT Software Update Practices

Software update systems are critical for ensuring systems remain free of...
research
06/30/2020

CVE based classification of vulnerable IoT systems

Common Vulnerabilities and Exposures database (CVE) is one of the larges...
research
03/05/2020

SERENIoT: Collaborative Network Security Policy Management and Enforcement for Smart Homes

Network traffic whitelisting has emerged as a dominant approach for secu...
research
05/16/2022

Software Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats

Software updates reduce the opportunity for exploitation. However, since...
research
09/28/2022

Does Collaborative Editing Help Mitigate Security Vulnerabilities in Crowd-Shared IoT Code Examples?

Background: With the proliferation of crowd-sourced developer forums, so...
research
07/17/2020

Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators

Experts agree that keeping systems up to date is a powerful security mea...
research
02/11/2019

Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for Internet of Things

A large number of IoT devices are connected via the Internet. However, m...

Please sign up or login with your details

Forgot password? Click here to reset