help promote
usenix conference policies
You are here
Learning From Others’ Mistakes: Penetration Testing IoT Devices in the Classroom
Tom Chothia, University of Birmingham; Joeri de Ruiter, Radboud University Nijmegen
This paper shows how it is possible to use commercial off-the-shelf IoT devices in a taught cyber security course. We argue that the current level of IoT device security makes testing them an excellent exercise for students. We have developed a course based around this idea that teaches students basic penetration testing techniques and then sets two rounds of group assignments in which they get hands-on experience with performing a security analysis of an IoT device. In the first round, the students get devices which we know are vulnerable. In the second round, the groups are mixed and they get devices with no previously known vulnerabilities. This approach enables us to provide them enough guidance in the first round to get the experience needed to perform the analysis independently in the second round. This seems to have been successful because our student teams found previously unknown vulnerabilities in five devices in the second round of tests.
Open Access Media
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.
author = {Tom Chothia and Joeri de Ruiter},
title = {Learning From {Others{\textquoteright}} Mistakes: Penetration Testing {IoT} Devices in the Classroom},
booktitle = {2016 USENIX Workshop on Advances in Security Education (ASE 16)},
year = {2016},
address = {Austin, TX},
url = {https://www.usenix.org/conference/ase16/workshop-program/presentation/chothia},
publisher = {USENIX Association},
month = aug
}
connect with us