4.0 Article Proceedings Paper

Certificate Injection-Based Encrypted Traffic Forensics in AI Speaker Ecosystem

出版社

ELSEVIER SCI LTD
DOI: 10.1016/j.fsidi.2020.301010

关键词

Al Speaker; Certificate injectiion; MitM; Cloud; Amazon alexa; KT GiGA genie; SKT NUGU

资金

  1. Institute for Information & communications Technology Promotion(IITP) - Korea government(MSIT) [2018-0-01000]
  2. Energy Cloud R&D Program through the National Research Foundation of Korea(NRF) - Ministry of Science, ICT [2019M3F2A1073386]
  3. National Research Foundation of Korea [2019M3F2A1073386] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

向作者/读者索取更多资源

AI Speakers are typical cloud-based internet of things (IoT) devices that store a variety of information regarding users on the cloud. Although analyzing encrypted traffic between these devices and the cloud, as well as the artifacts stored there, is an important research topic from the perspective of cloud-based IoT forensics, studies on directly analyzing encrypted traffic between AI Speakers and the cloud remain insufficient. In this study, we propose a forensic model that can collect and analyze encrypted traffic between an AI Speaker and the cloud based on a certificate injection. The proposed model consists of porting AI Speaker image on Android device, porting AI Speaker image using QEMU (Quick EMUlator), running exploit using the AI Speaker app vulnerability, rewriting Flash memory using H/W interface, and reworking and updating Flash memory. These five forensic methods are used to inject the certificate into AI Speakers. The proposed model shows that we can analyze encrypted traffic against various AI Speakers such as an Amazon Echo Dot, Naver Clova, SKT NUGU Candle, SKT NUGU, and KT GiGA Genie, and obtain artifacts stored on the cloud. In addition, we develop a verification tool that collects artifacts stored on KT GiGA Genie cloud. (C) 2020 The Author(s). Published by Elsevier Ltd on behalf of DFRWS. All rights reserved. .

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.0
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据