Smart Outlets. Why We Need Responsible Disclosure!

Friday 7 October 09:30 - 10:00, Red room

George Cabau (Bitdefender)
Radu Basaraba (Bitdefender)
Dragos Gavrilut (Bitdefender)
Ciprian Oprisa (Bitdefender)

The world of IoTs has grown enough in the last year to be considered a possible a field where security will represent a concern in the near feature. While many IoT producers decided to focus on a very specific aspect (such as creating a smart watch, a smart LED, a smart car, etc.), some of them chose to be involved in producing IoT devices that could, in theory, be used with many other already existing (non-smart) devices.

The most well known from the latter category are power outlets. Even if their functionality is quite simple (basically allowing one to start or stop the power remotely), the security concerns around them are significant. For one, the basic idea in these cases is to be able to control the power for your devices remotely. Remotely in this context often means being able to control the device from an Internet server and not from within your own intranet. Secondly, most of these devices market themselves as being able to conserve energy by shutting themselves down when the device that they are powering no longer needs to run. Because of this, it's likely that in the near future such devices will have a broader use (not only in the consumer market but in industry as well).

This paper presents research done on 10 different smart outlets emphasizing their vulnerabilities, different attack vectors that can be used to control them and also different aspects related to their Internet connection that a hacker might exploit. Last but not least, we will discuss possible situations where using an insecure outlet can have serious consequences in different industries (medical, administration, etc.) and the need for responsible disclosure to mitigate these cases.

Click here for more details about the conference.

108x156-george-cabau.jpg

George Cabău

George Cabău is Technical Project Manager at Bitdefender where he coordinates a research and development team for malicious threats, sandboxing solution, network intrusion detection and IoT security. He is a computer science graduate from the Technical University of Cluj-Napoca, where he also preparing for his Ph.D.

108x168-radu-basaraba.jpg

Radu Basaraba

Radu Basaraba is a researcher at Bitdefender where he analyses smart devices trying to find vulnerabilities in them. 

108x163-dragos-gavrilut.jpg

Dragoș Gavriluț 

Dragoș Gavriluț is an anti-malware research manager at Bitdefender, managing a team of 80+ people that develops heuristic detections, cloud-based services, system testing services, disinfection routines, Android and iOS analysis, event correlation algorithms, data mining, IoT and cybersecurity analysis. He is also a lecturer at the Alexandru Ioan Cuza University of Iași, where he received his Ph.D. in 2012, with the thesis entitled 'Meta-heurisics for Anti-Malware Systems'. He received his B.Sc. and M.Sc. in computer science from the same university, in 2004 and 2006, respectively.

108x155-ciprian-oprisa.jpg

Ciprian Oprișa 

Ciprian Oprișa is a team lead in the Antimalware Lab at Bitdefender, where he performs reverse engineering on malicious applications and develops new technologies for heuristic malware detection and for fighting network-based threats. He recently obtained his Ph.D. at the Technical University of Cluj-Napoca, where he proposed new solutions to fight security threats, based on machine learning techniques. He has been working in the security industry for more than six years.



twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.