Explore the security vulnerabilities in cross-vendor IoT access control systems through this 35-minute Black Hat conference talk. Delve into the complexities of cloud-mediated device management and the emerging capability of delegating device access across different clouds and users. Examine real-world examples involving popular IoT vendors like Philips Hue and August Lock, and their integration with cloud providers such as Google Home and Amazon Alexa. Learn about the potential risks associated with convoluted delegation chains and authorization operations. Discover the findings from formal verification and vulnerability discovery processes. Gain insights into specific vulnerabilities identified in cross-vendor IoT access control systems and their implications for smart home security.
Overview
Syllabus
Introduction
Background
Example
Formal Verification
Vulnerability Discovery
Presentation Overview
First Vulnerability
Second Vulnerability
Taught by
Black Hat