首页> 外文OA文献 >Sécurité des équipements grand public connectés à Internet : évaluation des liens de communication
【2h】

Sécurité des équipements grand public connectés à Internet : évaluation des liens de communication

机译:连接到Internet的消费类设备的安全性:评估通信链接

摘要

Today, equipment embedding software and an Internet connection are more and more numerous and various. With the emergence of “the internet of things” and the trend to interconnect everything, many equipment used in our every day life are now connected to the internet: Smart-Tvs, DVD players, alarm and home automation systems, and even health assistance home devices, for example. Unfortunately, these technological evolutions also introduce new security threats. The massive use of internet facilitates the propagation of malware, capable of targeting any computer device, and more specifically any internet connected device. Although several methods allowing security analysis of industrial systems exist, their application to home devices is still limited. The existence and the criticality of potential vulnerabilities in these devices are not well-known, because they have not been thoroughly studied. This is precisely the objective of this thesis, which presents a method allowing to carry out a vulnerability analysis of internet connected home devices. This method is composed of two main phases: a risk analysis phasefollowed by an experimental phase. The security analysis of any type of equipement, requires a good knowledge ofits environment. In order to guide the evaluator in this task, we propose, as a first step, to rely on existing risk analysis methods. These methods are now mature, and allow the evaluator to obtain a global view of the risks incurred by the usage of anequipment. Then, during the second step of our method, the evaluator concentrates on the most important risks in order to demonstrate the technical feasibility of the scenarios leading to the considered risks, by carrying out several experiments.Considering the large amount and the diversity of I/Os on connected devices, it is important to focus on specifically rich attack scenarios, possibly depending on a simple local vulnerability. For this second step, an experimental method is proposedin order to study these attack scenarios, which, moreover, target equipement whose specifications are not necessarily available.In order to illustrate the entire method, this thesis presents two case studies: Integrated Access Devices and Smart-Tvs. These studies are carried out on a panel of devices from major internet service providers and TV manufacturers, allowing us to compare several devices available on the market. The vulnerabilities pointed out, mainly concern the communication means (local loop for the IAD, DVB-T interface for the smart-TVs) connecting these devices to their service providers (ISP for the IAD, TV and VoD for the smart-TVs). These communication links are usually considered safe, and have been, to our knowledge, seldom explored. Thisthesis thereby contributes to the security analysis of these particular communication means for connected devices and points out some original attack paths. Finally, this thesis ends by presenting different existing security mechanisms that can be used to avoid exploitation of the identified weaknesses
机译:如今,设备嵌入软件和Internet连接越来越多。随着“物联网”的出现以及将所有事物互连的趋势,我们日常生活中使用的许多设备现在都已连接到互联网:智能电视,DVD播放器,警报和家庭自动化系统,甚至是医疗保健之家例如设备。不幸的是,这些技术发展也带来了新的安全威胁。互联网的大量使用促进了恶意软件的传播,能够针对任何计算机设备,尤其是针对任何与互联网连接的设备。尽管存在几种允许对工业系统进行安全性分析的方法,但是它们在家庭设备中的应用仍然受到限制。这些设备中潜在漏洞的存在和严重性尚不为人所知,因为尚未对其进行深入研究。这正是本论文的目的,它提出了一种方法,可以对联网的家庭设备进行漏洞分析。此方法包括两个主要阶段:风险分析阶段,然后是实验阶段。任何类型的设备的安全性分析都需要对其环境有充分的了解。为了指导评估人员完成此任务,我们建议作为第一步,依靠现有的风险分析方法。这些方法现已成熟,并且使评估人员可以全面了解使用设备带来的风险。然后,在我们方法的第二步中,评估人员将重点放在最重要的风险上,以便通过进行几次实验来证明导致考虑风险的方案的技术可行性。在连接设备上的操作系统上,重要的是专注于特定的攻击场景,这可能取决于一个简单的本地漏洞。在第二步中,提出了一种实验方法来研究这些攻击场景,此外,还针对目标设备(其规格不一定可用)。为了说明整个方法,本文提出了两个案例研究:集成访问设备和智能-电视这些研究是在主要互联网服务提供商和电视制造商的设备面板上进行的,从而使我们能够比较市场上的几种设备。指出的漏洞主要与通信方式(IAD的本地环路,智能电视的DVB-T接口)将这些设备连接到其服务提供商(IAD的ISP,智能电视的TV和VoD)有关。这些通信链接通常被认为是安全的,据我们所知,很少进行探索。因此,本文有助于对这些连接设备的特定通信方式进行安全性分析,并指出一些原始的攻击路径。最后,本文以提出不同的现有安全机制作为结束,这些安全机制可用于避免利用已发现的弱点

著录项

  • 作者

    Bachy Yann;

  • 作者单位
  • 年度 2015
  • 总页数
  • 原文格式 PDF
  • 正文语种 fr
  • 中图分类
  • 入库时间 2022-08-20 20:24:42

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号