Site icon The Security Ledger with Paul F. Roberts

Vulnerabilities Lurking Far And Wide In IoT Ecosystem

The Internet of Things (IoT) promises to revolutionize the way people live and work. But while the media’s attention is focused on high-profile Internet of Things firms like NEST, the smart-home products vendor that Google acquired for more than $3 billion last month, much of the innovation in IoT – at least in the consumer market – is a bottom-up, grass roots phenomenon.

Zach Lanier and Mark Stanislav of Duo Security speaking at the B-Sides San Francisco event.

Quietly, the combination of ready-made components, point and click development environments and cloud based back end management tools has enabled an army of (mostly) novice developers to assemble novel, connected products for a public enraptured with the idea of using their mobile devices to control something — anything.

At the same time, crowd-funding platforms like Kickstarter and Indiegogo have created a platform for products to get funded and distributed to hundreds, thousands or even tens of thousands of customers – once a monumental task. 

That’s great for the nascent Internet of Things and for the public – until it isn’t. Increasingly, security experts worry that too many connected devices – and the tools to create them – lack even the most basic security features. While they break down barriers between technology consumer and technology producer, these tools and platforms may also be sowing the seeds of chaos, planting powerful, Internet connected sensors in homes and offices that are highly susceptible to attacks and compromise.

Speaking at the B-Sides San Francisco mini conference on Sunday, Mark Stanislav and Zach Lanier, both of DUO Security, said that their research into Internet of Things devices has turned up a wealth of worrying problems with IoT products and the platforms that support them.

The two identified a number of pain points for an Internet of Things marketplace that it still embryonic. Among them:

The security of third party software components is a hot topic among application security experts. On the one hand, consumer-focused products and services like DropBox.com are becoming a kind of “shadow” supply chain at many companies – software applications that are exempted from the kinds of scrutiny that traditional software suppliers get (at least in theory). IoT is exacerbating with a deep reliance on reusable, open source components and other packaged code that can be dropped into an application and used, often with little or no consideration of security.

Builditsecure.ly is a site to help guide smart device developers in secure design principles.

To help educate the nascent IoT development community about the challenges facing IoT applications and products, Lanier and Stanislav launched a new web site, BuildItSecure.ly, with a goal of educating smart device makers ‘security conscious’ during the design and deployment of smart devices and to create an incentive for independent security research and reporting of flaws in connected devices.

Exit mobile version