Cargando…

Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny

The impact that IoT technologies have on our everyday life is indisputable. Wearables, smart appliances, lighting, security controls, and others make our life simpler and more comfortable. For the sake of easy monitoring and administration, such devices are typically accompanied by smartphone apps,...

Descripción completa

Detalles Bibliográficos
Autores principales: Chatzoglou, Efstratios, Kambourakis, Georgios, Smiliotopoulos, Christos
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8779354/
https://www.ncbi.nlm.nih.gov/pubmed/35062473
http://dx.doi.org/10.3390/s22020513
_version_ 1784637555346505728
author Chatzoglou, Efstratios
Kambourakis, Georgios
Smiliotopoulos, Christos
author_facet Chatzoglou, Efstratios
Kambourakis, Georgios
Smiliotopoulos, Christos
author_sort Chatzoglou, Efstratios
collection PubMed
description The impact that IoT technologies have on our everyday life is indisputable. Wearables, smart appliances, lighting, security controls, and others make our life simpler and more comfortable. For the sake of easy monitoring and administration, such devices are typically accompanied by smartphone apps, which are becoming increasingly popular, and sometimes are even required to operate the device. Nevertheless, the use of such apps may indirectly magnify the attack surface of the IoT device itself and expose the end-user to security and privacy breaches. Therefore, a key question arises: do these apps curtail their functionality to the minimum needed, and additionally, are they secure against known vulnerabilities and flaws? In seek of concrete answers to the aforesaid question, this work scrutinizes more than forty chart-topping Android official apps belonging to six diverse mainstream categories of IoT devices. We attentively analyse each app statically, and almost half of them dynamically, after pairing them with real-life IoT devices. The results collected span several axes, namely sensitive permissions, misconfigurations, weaknesses, vulnerabilities, and other issues, including trackers, manifest data, shared software, and more. The short answer to the posed question is that the majority of such apps still remain susceptible to a range of security and privacy issues, which in turn, and at least to a significant degree, reflects the general proclivity in this ecosystem.
format Online
Article
Text
id pubmed-8779354
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-87793542022-01-22 Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny Chatzoglou, Efstratios Kambourakis, Georgios Smiliotopoulos, Christos Sensors (Basel) Article The impact that IoT technologies have on our everyday life is indisputable. Wearables, smart appliances, lighting, security controls, and others make our life simpler and more comfortable. For the sake of easy monitoring and administration, such devices are typically accompanied by smartphone apps, which are becoming increasingly popular, and sometimes are even required to operate the device. Nevertheless, the use of such apps may indirectly magnify the attack surface of the IoT device itself and expose the end-user to security and privacy breaches. Therefore, a key question arises: do these apps curtail their functionality to the minimum needed, and additionally, are they secure against known vulnerabilities and flaws? In seek of concrete answers to the aforesaid question, this work scrutinizes more than forty chart-topping Android official apps belonging to six diverse mainstream categories of IoT devices. We attentively analyse each app statically, and almost half of them dynamically, after pairing them with real-life IoT devices. The results collected span several axes, namely sensitive permissions, misconfigurations, weaknesses, vulnerabilities, and other issues, including trackers, manifest data, shared software, and more. The short answer to the posed question is that the majority of such apps still remain susceptible to a range of security and privacy issues, which in turn, and at least to a significant degree, reflects the general proclivity in this ecosystem. MDPI 2022-01-10 /pmc/articles/PMC8779354/ /pubmed/35062473 http://dx.doi.org/10.3390/s22020513 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Chatzoglou, Efstratios
Kambourakis, Georgios
Smiliotopoulos, Christos
Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny
title Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny
title_full Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny
title_fullStr Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny
title_full_unstemmed Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny
title_short Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny
title_sort let the cat out of the bag: popular android iot apps under security scrutiny
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8779354/
https://www.ncbi.nlm.nih.gov/pubmed/35062473
http://dx.doi.org/10.3390/s22020513
work_keys_str_mv AT chatzoglouefstratios letthecatoutofthebagpopularandroidiotappsundersecurityscrutiny
AT kambourakisgeorgios letthecatoutofthebagpopularandroidiotappsundersecurityscrutiny
AT smiliotopouloschristos letthecatoutofthebagpopularandroidiotappsundersecurityscrutiny