Cargando…
Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny
The impact that IoT technologies have on our everyday life is indisputable. Wearables, smart appliances, lighting, security controls, and others make our life simpler and more comfortable. For the sake of easy monitoring and administration, such devices are typically accompanied by smartphone apps,...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8779354/ https://www.ncbi.nlm.nih.gov/pubmed/35062473 http://dx.doi.org/10.3390/s22020513 |
_version_ | 1784637555346505728 |
---|---|
author | Chatzoglou, Efstratios Kambourakis, Georgios Smiliotopoulos, Christos |
author_facet | Chatzoglou, Efstratios Kambourakis, Georgios Smiliotopoulos, Christos |
author_sort | Chatzoglou, Efstratios |
collection | PubMed |
description | The impact that IoT technologies have on our everyday life is indisputable. Wearables, smart appliances, lighting, security controls, and others make our life simpler and more comfortable. For the sake of easy monitoring and administration, such devices are typically accompanied by smartphone apps, which are becoming increasingly popular, and sometimes are even required to operate the device. Nevertheless, the use of such apps may indirectly magnify the attack surface of the IoT device itself and expose the end-user to security and privacy breaches. Therefore, a key question arises: do these apps curtail their functionality to the minimum needed, and additionally, are they secure against known vulnerabilities and flaws? In seek of concrete answers to the aforesaid question, this work scrutinizes more than forty chart-topping Android official apps belonging to six diverse mainstream categories of IoT devices. We attentively analyse each app statically, and almost half of them dynamically, after pairing them with real-life IoT devices. The results collected span several axes, namely sensitive permissions, misconfigurations, weaknesses, vulnerabilities, and other issues, including trackers, manifest data, shared software, and more. The short answer to the posed question is that the majority of such apps still remain susceptible to a range of security and privacy issues, which in turn, and at least to a significant degree, reflects the general proclivity in this ecosystem. |
format | Online Article Text |
id | pubmed-8779354 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-87793542022-01-22 Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny Chatzoglou, Efstratios Kambourakis, Georgios Smiliotopoulos, Christos Sensors (Basel) Article The impact that IoT technologies have on our everyday life is indisputable. Wearables, smart appliances, lighting, security controls, and others make our life simpler and more comfortable. For the sake of easy monitoring and administration, such devices are typically accompanied by smartphone apps, which are becoming increasingly popular, and sometimes are even required to operate the device. Nevertheless, the use of such apps may indirectly magnify the attack surface of the IoT device itself and expose the end-user to security and privacy breaches. Therefore, a key question arises: do these apps curtail their functionality to the minimum needed, and additionally, are they secure against known vulnerabilities and flaws? In seek of concrete answers to the aforesaid question, this work scrutinizes more than forty chart-topping Android official apps belonging to six diverse mainstream categories of IoT devices. We attentively analyse each app statically, and almost half of them dynamically, after pairing them with real-life IoT devices. The results collected span several axes, namely sensitive permissions, misconfigurations, weaknesses, vulnerabilities, and other issues, including trackers, manifest data, shared software, and more. The short answer to the posed question is that the majority of such apps still remain susceptible to a range of security and privacy issues, which in turn, and at least to a significant degree, reflects the general proclivity in this ecosystem. MDPI 2022-01-10 /pmc/articles/PMC8779354/ /pubmed/35062473 http://dx.doi.org/10.3390/s22020513 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Chatzoglou, Efstratios Kambourakis, Georgios Smiliotopoulos, Christos Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny |
title | Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny |
title_full | Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny |
title_fullStr | Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny |
title_full_unstemmed | Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny |
title_short | Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny |
title_sort | let the cat out of the bag: popular android iot apps under security scrutiny |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8779354/ https://www.ncbi.nlm.nih.gov/pubmed/35062473 http://dx.doi.org/10.3390/s22020513 |
work_keys_str_mv | AT chatzoglouefstratios letthecatoutofthebagpopularandroidiotappsundersecurityscrutiny AT kambourakisgeorgios letthecatoutofthebagpopularandroidiotappsundersecurityscrutiny AT smiliotopouloschristos letthecatoutofthebagpopularandroidiotappsundersecurityscrutiny |