Skip to content
/ IoTLS Public

Repository for IMC'21 paper on TLS for IoT devices

Notifications You must be signed in to change notification settings

NEU-SNS/IoTLS

Repository files navigation

IoTLS: Understanding TLS Usage in Consumer IoT Devices

Repository for the IMC'21 paper

We have made the following data from our research publicly available:

  • TLS handshake data for 40 devices covering a span of more than 2 years (from, at least, January 2018 to March 2020).

  • ./HistoricalCAcertificates: Historical CA root certificates from Ubuntu, Android, Mozilla and Microsoft. Detailed source information is provided in (Table 3) of the paper.

  • ./FingerprintingAnalysis: TLS fingerprints for 32 devices along with the TLS handshakes from which they were generated. TLS fingerprints have the same format as the dataset from prior work (https://github.com/platonK/tls_fingerprints).

  • ./RootStoresAnalysis: Controlled experiments for 8 devices to explore their sets of trusted root certificates (Table 9). Also contains the roots that are common to all platforms, and the ones that have been deprecated from different platorms (Section 4.2).

  • ./InterceptionAttacksTraffic Controlled experiments for 32 devices for the interception and other on-path attacks (Tables 5, 6, 7). The SSLKEYLOGFILE files to decrypt successfully MITM'ed connections are also available. Different experiments are denoted by specific indexes in file names:

In order to access the TLS handshake data and SSLKEYLOGFILE files for MITM attacks, please read the conditions and access instructions at our data sharing agreement (https://github.com/NEU-SNS/IoTLS/blob/main/DataSharingAgreement.pdf).

We have made the following code from our research publicly available:

(Work-in-Progress)

About

Repository for IMC'21 paper on TLS for IoT devices

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages