TY - GEN
T1 - Discovering and Exploiting IoT Device Hidden Attributes
T2 - 32nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2025
AU - Xu, Xuening
AU - Fu, Chenglong
AU - Du, Xiaojiang
AU - Luo, Bo
N1 - Publisher Copyright:
© 2025 Copyright held by the owner/author(s).
PY - 2025/11/22
Y1 - 2025/11/22
N2 - With the growing popularity and pervasive adoption of smart home Internet of Things (IoT) platforms, IoT security and privacy issues are gaining more attention. In this work, we reveal a new vulnerability inherent in most smart home IoT automation platforms and systems but previously unnoticed by the security community: the hidden attributes, i.e., attributes that are configurable by knowledgeable attackers through IoT APIs to effectively change device behaviors, but these attributes are not manageable or observable by users. An IoT device with compromised hidden attributes may behave differently from user expectations and cause severe security and safety consequences (e.g., burglary or fire). We present the root causes of the vulnerability and develop an approach to systematically discover hidden attributes. We evaluate a total of 31 commodity IoT devices of various types from 16 manufacturers and identify hidden attributes in all of them. Furthermore, we select several IoT devices with security and safety-critical hidden attributes and demonstrate the end-to-end hidden attribute attack on two popular IoT platforms: Samsung SmartThings and Amazon Alexa. In addition, we develop a tool that can automatically patch edge drivers and fix the hidden attribute issue. The source code of the auto-patching tool can be found in the Anonymous GitHub.
AB - With the growing popularity and pervasive adoption of smart home Internet of Things (IoT) platforms, IoT security and privacy issues are gaining more attention. In this work, we reveal a new vulnerability inherent in most smart home IoT automation platforms and systems but previously unnoticed by the security community: the hidden attributes, i.e., attributes that are configurable by knowledgeable attackers through IoT APIs to effectively change device behaviors, but these attributes are not manageable or observable by users. An IoT device with compromised hidden attributes may behave differently from user expectations and cause severe security and safety consequences (e.g., burglary or fire). We present the root causes of the vulnerability and develop an approach to systematically discover hidden attributes. We evaluate a total of 31 commodity IoT devices of various types from 16 manufacturers and identify hidden attributes in all of them. Furthermore, we select several IoT devices with security and safety-critical hidden attributes and demonstrate the end-to-end hidden attribute attack on two popular IoT platforms: Samsung SmartThings and Amazon Alexa. In addition, we develop a tool that can automatically patch edge drivers and fix the hidden attribute issue. The source code of the auto-patching tool can be found in the Anonymous GitHub.
KW - Hidden Attribute
KW - IoT
KW - Security
KW - Smart Home
UR - https://www.scopus.com/pages/publications/105023885529
UR - https://www.scopus.com/pages/publications/105023885529#tab=citedBy
U2 - 10.1145/3719027.3744847
DO - 10.1145/3719027.3744847
M3 - Conference contribution
AN - SCOPUS:105023885529
T3 - CCS 2025 - Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security
SP - 1649
EP - 1663
BT - CCS 2025 - Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security
Y2 - 13 October 2025 through 17 October 2025
ER -