Indian-origin scientist hacks into popular 'smart home' security

By: GizBot Bureau

    An Indian-origin cybersecurity researcher from University of Michigan and his team have successfully hacked into a leading "smart home" automation system and got the PIN code to a home's front door.

    Indian-origin scientist hacks into popular 'smart home' security

    The "lock-pick malware app" developed by Atul Prakash, professor of computer science and engineering, was one of four attacks that the cybersecurity researchers performed at an experimental set-up of Samsung's "SmartThings", a top-selling Internet of Things (IoT) platform for consumers.

    SEE ALSO: LeEco Le 1S Eco with Super Entertainment package launched at Rs 10,899: 5 Things you need to know!

    The work is believed to be the first platform-wide study of a real-world connected home system. "At least today, with the one public IoT software platform we looked at, which has been around for several years, there are significant design vulnerabilities from a security perspective," said Prakash.

    "I would say it's okay to use as a hobby right now but I wouldn't use it where security is paramount," he added.

    As a testament to the growing use of "SmartThings", its Android companion app that lets you manage your connected home devices remotely has been downloaded more than 100,000 times.

    SmartThings' app store, where third-party developers can contribute SmartApps that run in the platform's cloud and let users customise functions, holds more than 500 apps.

    Indian-origin scientist hacks into popular 'smart home' security

    Prakash and Earlence Fernandes, doctoral student in computer science and engineering performed a security analysis of the SmartThings' programming framework.

    They demonstrated a SmartApp that eavesdropped on someone setting a new PIN code for a door lock and then sent that PIN in a text message to a potential hacker.

    SEE ALSO: Buying Guide: Top 20 Best Smartphones To Buy in India This May 2016

    The SmartApp, which they called a "lock-pick malware app", was disguised as a battery level monitor and only expressed the need for that capability in its code.

    As an example, they showed that an existing, highly rated SmartApp could be remotely exploited to virtually make a spare door key by programming an additional PIN into the electronic lock.

    They showed that SmartApp could turn off "vacation mode" in a separate app that lets you programme the timing of lights, blinds, etc., while you're away to help secure the home.

    They demonstrated that a fire alarm could be made to go off by any SmartApp injecting false messages. "The access SmartThings grants by default is at a full device level, rather than any narrower," Prakash said.

    "As an analogy, say you give someone permission to change the lightbulb in your office, but the person also ends up getting access to your entire office, including the contents of your filing cabinets," he explained.

    These results have implications for all smart home systems and even the broader Internet of Things (IoT).

    "The bottom line is that it's not easy to secure these systems" Prakash said. "There are multiple layers in the software stack and we found vulnerabilities across them, making fixes difficult."

    The researchers will present a paper on the findings at the IEEE symposium on security and privacy in San Jose, California, later this month.

    Source: IANS

    Read More About: iot samsung news cyber security

    Stay updated with latest technology news & gadget reviews - Gizbot

    We use cookies to ensure that we give you the best experience on our website. This includes cookies from third party social media websites and ad networks. Such third party cookies may track your use on Gizbot sites for better rendering. Our partners use cookies to ensure we show you advertising that is relevant to you. If you continue without changing your settings, we'll assume that you are happy to receive all cookies on Gizbot website. However, you can change your cookie settings at any time. Learn more