Rodrigo Caldas, Carlos Novo, Ricardo Morla, Luis Cruz, António Carvalho, David Campelo
{"title":"Inferring Legacy IoT Device Behavior over a Layer 2 TLS Tunnel","authors":"Rodrigo Caldas, Carlos Novo, Ricardo Morla, Luis Cruz, António Carvalho, David Campelo","doi":"10.1109/CSNet52717.2021.9614643","DOIUrl":null,"url":null,"abstract":"Securing existing legacy device traffic is a necessity when the assumptions used in device security design no longer hold. In this paper we propose a layer 2 tunnel over TLS for legacy device traffic, which is lightweight, generic, and extensible. We then look at one of the threats that the tunnel does not initially address – namely inference attacks on the encrypted tunnel traffic. Inferring device behavior can be an attack by itself as well as a first step for other attacks. Using a legacy commercial, multi-node, embedded system that is aimed at life safety, we show that it is possible to infer legacy device behavior even if the device traffic is encrypted, as is the case with the tunnel. This example shows that simply wrapping legacy traffic with a secure communication protocol does not prevent inference attacks. To illustrate how these attacks can be mitigated, we then introduce padding and dummy traffic on the TLS tunnel, which, as intended, lowers the ability of an eavesdropper to infer legacy device behavior. This is true even if the eavesdropper retrains its model with padding and dummy traffic.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 5th Cyber Security in Networking Conference (CSNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNet52717.2021.9614643","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Securing existing legacy device traffic is a necessity when the assumptions used in device security design no longer hold. In this paper we propose a layer 2 tunnel over TLS for legacy device traffic, which is lightweight, generic, and extensible. We then look at one of the threats that the tunnel does not initially address – namely inference attacks on the encrypted tunnel traffic. Inferring device behavior can be an attack by itself as well as a first step for other attacks. Using a legacy commercial, multi-node, embedded system that is aimed at life safety, we show that it is possible to infer legacy device behavior even if the device traffic is encrypted, as is the case with the tunnel. This example shows that simply wrapping legacy traffic with a secure communication protocol does not prevent inference attacks. To illustrate how these attacks can be mitigated, we then introduce padding and dummy traffic on the TLS tunnel, which, as intended, lowers the ability of an eavesdropper to infer legacy device behavior. This is true even if the eavesdropper retrains its model with padding and dummy traffic.