Skip to content

This repository contains scripts for investigating security vulnerabilities of consumer Internet of Things (IoT) devices.

License

Notifications You must be signed in to change notification settings

SafeNetIoT/spices

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SPICES

This repository contains scripts for investigating security vulnerabilities of consumer Internet of Things (IoT) devices. We release this along with the paper "Who Let the Smart Toaster Hack the House? An Investigation into the Security Vulnerabilities of Consumer IoT Devices".

The link to the paper on arXiv is here.

As described in Section 3 of the paper, we run threat simulation scripts on a Raspberry Pi 4 to attack consumer IoT devices within the same LAN. The repository is structured as follows:

  • flooding simulates various flooding attacks, including SYN, UDP, DNS, HTTPS and IP fragmented flooding, on target devices.
  • os_scanning simulates OS scanning attacks on target devices.
  • port_scanning simulates port-scanning attacks on target devices.

More detailed descriptions and usage examples of the scripts are included in their respective folders.

Attacked Devices

Category Device
Smart speaker Bose Smart Speaker 500
Sonos One (Gen2)
Echo Dot 5
Smart doorbell Ring Chime Pro
Ring Video Doorbell (2nd Gen)
Smart camera Google Nest Cam
SimpliSafe Security Camera Indoor
Furbo 360° Dog Camera
Appliances WeeKett Smart Wi-Fi Kettle
Govee Alexa LED Strip Lights
Sensibo Sky Smart AC

Data

Data are stored here.

Each folder contains the packet capture and attack result files for one type of attack, sorted by the devices.

About

This repository contains scripts for investigating security vulnerabilities of consumer Internet of Things (IoT) devices.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages