Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS
Abstract
:1. Introduction
- We conducted a mobile forensic analysis of the SimpliSafe home security app on both Android and iOS smartphones.
- We performed a forensic analysis of the network traffic generated when a user interacts with the SimpliSafe home security system.
- We identified any privacy and security concerns that arose due to the way the SimpliSafe home security app stores data on smartphones and transmits data over a network.
- We provide a forensic road map to investigators tasked with examining this and similar home security systems.
2. Related Work
Article | Objectives | Methods and Techniques | Shortcomings |
---|---|---|---|
Hutchinson et al. [7] | To determine what data from IoT devices can be recovered, how to recover the data, and where these data reside. | The authors created an IoT forensics laboratory. They used XRY to create a physical image and XAMN to analyze the image for artifacts and evidence of privacy leaks. | The authors investigated individual home security devices such as an August Smart Lock Pro and August Smart Doorbell Pro but not a smart home monitoring system. |
Chung et al. [8] | To investigate methods for digital forensics pertaining to the IVA Alexa’s ecosystem. | The authors proposed a new integrative approach combining cloud-native and client-centric forensics for the Amazon Alexa ecosystem. They also introduced an implementation, CIFT, to acquire native artifacts from Alexa and analyze local artifacts from companion clients. | The authors did not perform their investigation on the hardware level of the Alexa-enabled devices. They also did not perform memory forensics for volatile artifacts. |
Dorai et al. [9] | To examine the logical backup structure of an iPhone used to control a Nest thermostat, Nest indoor camera, and a Nest outdoor camera. | The authors built an open-source forensic tool called Forensic Evidence Acquisition and Analysis System (FEAAS), that consolidated evidentiary data into a readable report that could infer user events. | The study was only limited to iPhones and focused on data that were logically acquired from the mobile device, which meant that it only worked if data had not been deleted from the phone under examination. |
Hutchinson and Karabiyik [10] | To determine what type of data forensic investigators may be able to recover about the August Smart Doorbell Pro and the August Smart Lock Pro, with their controlling app, August Home. | The authors used Magnet AXIOM Examiner and MSAB XRY to examine artifacts acquired from imaging one iOS and two Android smartphones. | The authors investigated two individual IoT devices (August Smart Lock Pro and August Smart Doorbell Pro) but not a smart home monitoring system. |
OConnor et al. [12] | To better understand IoT security and privacy by studying the design flaws of this distributed communication channel for smart home devices. | The authors implemented a smart home lab environment with devices from 20 different vendors to explore the severity and pervasiveness of attacks against IoT devices. | The authors showed that they were able to manipulate or clear alarm log files for SimpliSafe. However, they only focused on whether the attack was successful or transparent. They did not investigate any recoverable artifacts related to user interactions with the system. |
Ndatinya et al. [13] | To demonstrate how Wireshark can be applied in network protocol diagnosis and can be used to discover traditional network attacks. | The authors used Wireshark to identify certain types of network attacks that resulted in unusual activities as well as present case studies for typical network attacks by using Wireshark. | The authors found that Wireshark was one of the best open-source packet analyzers available. However, Wireshark can only analyze packet captures and network traffic. It does not have intrusion detection and network manipulation capabilities. |
Ho et al. [14] | To discover network traffic patterns that emerge when IoT devices are under a DDoS attack. | The authors used LOIC and Slow Loris to perform a DDoS attack on the IoT devices. They used Wireshark to capture and examine the network packet captures while the attack was running | The authors only used Wireshark to analyze the network packet captures. Different software and metrics could be used to conduct both the attacks and the investigation processes. |
3. Methodology
3.1. Device Setup and App Installation
3.2. Lab and Scenario Setup
3.3. Forensic Process
3.3.1. Data Population
- We created an account and signed into the app.
- We set up the SimpliSafe devices on the account. This included connecting the base station and camera to the Internet.
- We interacted with the system by changing the alarm mode, OFF, HOME, or AWAY, via the app on the phone and the keypad.
- We triggered the alarm via each sensor.
- We viewed the camera feed from the app.
3.3.2. Data Acquisition
3.3.3. Examination and Analysis
3.4. Network Traffic Capture
4. Results
4.1. Android Findings
4.2. iOS Findings
4.3. Network Findings
5. Discussion
Challenges
6. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Appendix A.1. Full Timeline of the Events Performed on the Android Device (See Table A1)
Log Date (mm/dd/yyyy) | Log Time (24 h, EST) | Action |
---|---|---|
12/12/2022 | N/A | Setting up camera |
12/12/2022 | N/A | Allowed location access |
12/12/2022 | N/A | Allowed while using app |
12/13/2022 | 10:16 | Opened SimpliSafe app |
12/13/2022 | 10:19 | Pressed sign in |
12/13/2022 | 10:19 | Signed in successfully |
12/13/2022 | 10:30 | Clicked Refer+Edit |
12/13/2022 | 10:30 | Clicked no (output: unable to connect with the base station.) |
12/13/2022 | 10:32 | Base station connected to WiFi successfully |
12/13/2022 | 10:36 | Reset camera |
12/13/2022 | 10:38 | WiFi password incorrect |
12/13/2022 | 10:38 | Reentered WiFi password |
12/13/2022 | 10:39 | Camera connected to WiFi successfully |
12/13/2022 | 10:41 | Closed SimpliSafe phone app |
12/13/2022 | 10:41 | Opened SimpliSafe phone app |
12/13/2022 | 10:42 | OFF to Home |
12/13/2022 | 10:43 | Home to Away |
12/13/2022 | 10:44 | Opened front door sensor (output: there is a power outage) |
12/13/2022 | 10:45 | Away to Home |
12/13/2022 | 10:46 | Home to OFF |
12/13/2022 | 10:46 | Clicked no (output: help improve (star rating)) |
12/13/2022 | 10:49 | Clicked 1 on keypad (output: connected to base station) |
12/13/2022 | 10:49 | OFF to Away via keypad |
12/13/2022 | 10:50 | Opened front door sensor |
12/13/2022 | 10:52 | Walked in front of motion sensor |
12/13/2022 | 10:53 | Alarm sounded |
12/13/2022 | 10:53 | Entered pin 1818 on keypad (Away to OFF) |
12/13/2022 | 10:53 | Received notification (alarm triggered at 101 Grant St) |
12/13/2022 | 10:56 | OFF to Away |
12/13/2022 | 10:56 | Triggered front door entry sensor |
12/13/2022 | 10:56 | Walked in front of camera |
12/13/2022 | 10:58 | Triggered front door entry sensor |
12/13/2022 | 10:58 | Heard SimpliSafe base station alarm ring |
12/13/2022 | 10:58 | Turned alarm off |
12/13/2022 | 11:00 | Viewed camera feed |
12/13/2022 | 11:01 | Walked in front of camera |
12/13/2022 | 11:02 | OFF to Away using keypad |
12/13/2022 | 11:02 | Opened front door sensor |
12/13/2022 | 11:02 | Walked in front of camera |
12/13/2022 | 11:02 | Saved safe word "Hotdog" |
12/13/2022 | 11:03 | Family exit home, OFF to Away via keypad |
12/13/2022 | 11:03 | Alarm on |
12/13/2022 | 11:08 | Camera triggered |
12/13/2022 | 11:09 | Basement triggered (basement door open and close) |
12/13/2022 | 11:09 | Motion sensor triggered |
12/13/2022 | 11:09 | Alarm sounded |
12/13/2022 | 11:09 | Received notification |
12/13/2022 | 11:09 | Turned off alarm via app |
Appendix A.2. Full Timeline of the Events Performed on the iOS Device (See Table A2)
Log Date (mm/dd/yyyy) | Log Time (24 h, EST) | Action |
---|---|---|
1/5/2023 | 10:19 | iPhone X setup |
1/5/2023 | 10:33 | Added passcode 000000 |
1/5/2023 | 10:34 | Downloaded the SimpliSafe app |
1/5/2023 | 10:36 | Opened app |
1/5/2023 | 10:37 | Signed in |
1/5/2023 | 10:38 | Used recovery code |
1/5/2023 | 10:40 | Accessed the app |
1/6/2023 | 10:00 | Set up the app |
1/6/2023 | 10:08 | Connected base to the WiFi |
1/6/2023 | 10:09 | Opened SimpliSafe app |
1/6/2023 | 10:09 | Switched from OFF to Home |
1/6/2023 | 10:09 | Allowed alerts for the app |
1/6/2023 | 10:11 | Reset camera settings through the app |
1/6/2023 | 10:14 | Attempted to connect to the WiFi |
1/6/2023 | 10:15 | Connection successful |
1/6/2023 | 10:15 | Tested camera On/Off |
Following Actions were all performed from the SimpliSafe Application | ||
1/6/2023 | 10:17 | OFF to Home |
1/6/2023 | 10:18 | Home to OFF |
1/6/2023 | 10:19 | OFF to Away (including 45 s countdown) |
1/6/2023 | 10:20 | Away to OFF |
1/6/2023 | 10:21 | Opened camera (watch live) |
1/6/2023 | 10:22 | Closed camera |
The following actions were triggering alarms with various sensors | ||
1/6/2023 | 10:23 | OFF to Away (including 45 s countdown) |
1/6/2023 | 10:24 | Triggered front door sensor |
1/6/2023 | 10:24 | Triggered camera |
1/6/2023 | 10:25 | Alarm sounded |
1/6/2023 | 10:25 | Alarm turned off from the app |
Another action | ||
1/6/2023 | 10:26 | OFF to Away (including 45 s countdown) |
1/6/2023 | 10:17 | Triggered camera |
1/6/2023 | 10:28 | Basement motion sensor triggered |
1/6/2023 | 10:28 | Alarm sounded |
1/6/2023 | 10:28 | Alarm turned off from the app |
Another action | ||
1/6/2023 | 10:29 | Opened Camera |
1/6/2023 | 10:29 | Talked into camera from the app |
1/6/2023 | 10:30 | Camera off |
Another action | ||
1/6/2023 | 10:30 | OFF to Away (including 45 s countdown) |
1/6/2023 | 10:32 | Front door sensor activated |
1/6/2023 | 10:32 | Basement Motion Sensor triggered |
1/6/2023 | 10:32 | Camera triggered |
1/6/2023 | 10:32 | Alarm sounded |
1/6/2023 | 10:33 | Alarm turned off from the app |
1/6/2023 | 10:34 | Powered off everything |
References
- Research. Markets. Home Security Systems Market by Home Type. Available online: https://www.researchandmarkets.com/reports/5130165/home-security-systems-market-by-home-type (accessed on 10 July 2022).
- Staff, G. Alexa, Did He Do It? Smart Device Could Be Witness in Suspicious Florida Death. Available online: https://www.theguardian.com/us-news/2019/nov/01/alexa-florida-death-witness-amazon-echo (accessed on 10 July 2022).
- Whittaker, Z. Judge Orders Amazon to Turn Over Echo Recordings in Double Murder Case. Available online: https://techcrunch.com/2018/11/14/amazon-echo-recordings-judge-murder-case/ (accessed on 20 January 2023).
- Home Security Solution Market by Type. Available online: https://www.researchdive.com/293/home-security-solutions-market (accessed on 20 March 2023).
- SimpliSafe Home Security. Available online: https://www.simplisafe.com (accessed on 10 July 2022).
- Priest, D.; Anders, D. Best DIY Home Security Systems for 2022. Available online: https://www.cnet.com/home/security/best-diy-home-security-systems/ (accessed on 10 July 2022).
- Hutchinson, S.; Yoon, Y.; Shantaram, N.; Karabiyik, U. Internet of Things Forensics in Smart Homes: Design, Implementation, and Analysis of Smart Home Laboratory. In Proceedings of the 2020 ASEE Virtual Annual Conference, Virtual, 22–26 June 2020. [Google Scholar] [CrossRef]
- Chung, H.; Park, J.; Lee, S. Digital Forensic Approaches for Amazon Alexa Ecosystem. Digit. Investig. 2017, 22, 15–25. [Google Scholar] [CrossRef]
- Dorai, G.; Houshmand, S.; Baggili, I. I Know What You Did Last Summer: Your Smart Home Internet of Things and Your IPhone Forensically Ratting You Out. In Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, 27–30 August 2018. [Google Scholar]
- Hutchinson, S.; Karabiyik, U. Forensic Analysis of the August Smart Device Ecosystem. In Proceedings of the 2020 International Symposium on Networks, Computers and Communications (ISNCC), Montreal, QC, Canada, 20–22 October 2020; pp. 1–7. [Google Scholar]
- Janes, B.; Crawford, H.; OConnor, T. Never Ending Story: Authentication and Access Control Design Flaws in Shared IoT Devices. In Proceedings of the 2020 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 21 May 2020; pp. 104–109. [Google Scholar] [CrossRef]
- Connor, T.O.; Jessee, D.; Campos, D. Through the Spyglass: Towards IoT Companion App Man-in-the-Middle Attacks. In Proceedings of the Cyber Security Experimentation and Test Workshop. Association for Computing Machinery, Virtual, 9 August 2021; pp. 58–62. [Google Scholar]
- Ndatinya, V.; Xiao, Z.; Manepalli, V.R.; Meng, K.; Xiao, Y. Network forensics analysis using Wireshark. Int. J. Secur. Netw. 2015, 10, 91–106. [Google Scholar] [CrossRef]
- Ho, S.; Greeson, H.; Karabiyik, U. Smart Home Forensics: Identifying Ddos Attack Patterns on Iot Devices. In Proceedings of the 2022 ADFSL Conference on Digital Forensics, Security and Law, Virtual, 25–26 July 2022; pp. 1–12. [Google Scholar]
- Lyon, G. Nmap Security Scaner. Available online: https://https://nmap.org/ (accessed on 3 January 2023).
- National Institute of Standards and Technology (NIST). Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-202.pdf (accessed on 23 January 2023).
- Cellebrite UFED 4PC. Available online: https://cellebrite.com/en/ufed/ (accessed on 3 February 2023).
- Magnet AXIOM Forensics. Available online: https://www.magnetforensics.com/products/magnet-axiom (accessed on 3 February 2023).
- Sharpe, R.; Warnicke, E. Wireshark User’s Guide. 2011. Available online: https://www.wireshark.org/docs/wsug_html_chunked/index.html. (accessed on 1 March 2022).
- Splunk. Available online: https://www.splunk.com/ (accessed on 3 February 2023).
- Schwartz, D. PCAP Analyzer for Splunk. Available online: https://splunkbase.splunk.com/app/2748 (accessed on 3 February 2023).
- Kizza, J.M. Computer Network Security; Springer: Berlin/Heidelberg, Germany, 2005. [Google Scholar]
Software Name | Software Version | Usage |
---|---|---|
Magnet AXIOM Acquire | 2.57.0.32014 | Acquire Evidence |
Magnet AXIOM Process | 6.9.0.34051 | Acquire Evidence |
Magnet AXIOM Examine | 6.9.0.34051 | Analyze Evidence |
Cellebrite UFED 4PC | 7.42.0.82 | Acquire Evidence |
Cellebrite Physical Analyzer | 7.42.0.50 | Acquire and analyze evidence |
Cellebrite Reader | 7.42.0.50 | Analyze Evidence |
Wireshark | 4.0.3 | Acquire and analyze evidence |
Splunk Enterprise | 9.0 | Analyze Evidence |
Checkra1n | 0.12.4 (Beta) | Jailbreaking iPhone |
Root Checker | 6.5.0 | Confirming root on Android |
SimpliSafe App (Android) | 4.61.0 | Data population |
SimpliSafe App (iOS) | 2078.52.0 | Data population |
Artifact | Android | iOS |
---|---|---|
User’s Name | No | Yes |
User’s Email | Yes | Yes |
System Location | Yes | Yes |
User Interactions | No | Yes |
App Usage | Yes | Yes |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hutchinson, S.; Stanković, M.; Ho, S.; Houshmand, S.; Karabiyik, U. Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS. J. Cybersecur. Priv. 2023, 3, 145-165. https://doi.org/10.3390/jcp3020009
Hutchinson S, Stanković M, Ho S, Houshmand S, Karabiyik U. Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS. Journal of Cybersecurity and Privacy. 2023; 3(2):145-165. https://doi.org/10.3390/jcp3020009
Chicago/Turabian StyleHutchinson, Shinelle, Miloš Stanković, Samuel Ho, Shiva Houshmand, and Umit Karabiyik. 2023. "Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS" Journal of Cybersecurity and Privacy 3, no. 2: 145-165. https://doi.org/10.3390/jcp3020009
APA StyleHutchinson, S., Stanković, M., Ho, S., Houshmand, S., & Karabiyik, U. (2023). Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS. Journal of Cybersecurity and Privacy, 3(2), 145-165. https://doi.org/10.3390/jcp3020009