Common Requirements For Web Application Vulnerability Scanners For The Internet of Things

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

2017 International Conference on Software Security and Assurance

Common Requirements for Web Application Vulnerability Scanners for the


Internet of Things

Hae Young Lee and Young Sun Park


DuDu IT
Seoul, South Korea
whichmeans@gmail.com

Abstract— This paper presents 3 common requirements for using a browser’s engine in scanning. This may be
web application vulnerability scanners for the Internet of implemented as a form of a browser’s add-on.
things devices, including browser’s rendering engine support,
false positive minimization, and device setting change B. False Positive Minimization
minimization. These requirements have been drawn from the An I-WAVS should minimize false positives by
experience of the previous project, security vulnerabilities in excluding uncommon vulnerabilities in IoT devices. WAVS
residential gateways. are basically designed to examine typical websites accessible
to many users, having access to DBMS. The web interface of
Keywords-IoT security; insecure web interface, web an IoT device is, however, usually for a few users and does
application vulnerability not have access to DBMS. Thus, using WAVS to scan web
interfaces of IoT devices could result in many false positives,
I. INTRODUCTION such as SQL injections, potential file uploads, and so on.
IoT devices usually provide web interfaces for the users C. Device Setting Change Minimization
and administrators. But they may have web application
vulnerabilities, such as cross-site scripting, and attackers An obstacle to using WAVS to scan web interfaces of
may be able to exploit the vulnerabilities. For example, IoT devices was they often changed the devices settings,
videos that appear to be from IP cameras at home have been even to factory defaults; they explore every reachable page
recently found on some websites, mainly due to insecure through links or buttons, which may lead to saving or
web interfaces [1]. However, the existing IoT vulnerability resetting settings. Thus, an I-WAVS should be able to set
scanners, such as, Shodan [2], examine network interfaces of ‘forbidden’ links, buttons, or pages to minimize the device
IoT devices in ‘public’ networks. Thus, IoT devices in setting changes.
‘private’ networks (e.g., beyond residential gateways) may III. CONCLUSIONS AND FUTURE WORK
not be scanned. Also, web application vulnerability scanners
(WAVS), such as Subgraph Vega [3], are for typical In this paper, we presented common requirements for I-
websites. WAVS, which are used to scan web interfaces of IoT devices
This paper presents common requirements for IoT web for security vulnerabilities. Based on the proposed
application vulnerability scanners (I-WAVS). An I-WAVS requirements, we are planning to develop an I-WAVS, and to
should: 1) be able to use a browser’s rendering engine, 2) evaluate the performance of our I-WAVS, compared to IoT
minimize false positives, and 3) minimize device setting vulnerability scanners or web application vulnerability
changes. They have been drawn from the experience of scanners.
Lee’s previous project [4]. Based on the requirements, we
ACKNOWLEDGMENT
will develop an I-WAVS.
This research was supported by Basic Science Research
II. REQUIREMENTS FOR IOT WEB SCANNERS Program through the National Research Foundation of Korea
(NRF) funded by the Ministry of Science, ICT and Future
A. Browser’s Rendering Engine Support Planning (NRF-2013R1A1A1006542).
An I-WAVS should be able to use a browser’s rendering
engine to parse web interfaces of IoT devices. Stand-alone REFERENCES
WAVS are usually equipped with custom rendering engines [1] OWASP, Internet of Thins Top Ten, 2014.
since they could show much better performance in scanning. [2] Shodan. https://www.shodan.io/
However, they often had difficulty in rendering the web [3] Subgraph Vega. https://subgraph.com/vega/
interfaces built with state-of-the-art technology, so that the [4] H.Y. Lee, H.J. Yoon, D.R. Park, J.H. Kim, Research on Detection
users occasionally need to perform time-consuming, error- Technologie of Security Vulnerabilities for Wireless Access Points,
prone manual scans through browsers. Such manual jobs Final Report, KOFAC URP, 2015 (in Korean).
could be minimized if an I-WAVS provides an option of

978-1-5386-4808-7/17 $31.00 © 2017 IEEE


978-0-7695-6338-1/17 111
DOI 10.1109/ICSSA.2017.31

You might also like