MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations

Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin

IEEE Symposium on Security and Privacy 2024 · Day 2 · Continental Ballroom 4

The Internet of Things (IoT) relies heavily on efficient and lightweight communication protocols, with **MQTT (Message Queuing Telemetry Transport)** emerging as the most widely adopted standard in the wild. Its publish-subscribe architecture allows for decoupled communication between devices and users, mediated by a central **broker**. However, the rapid proliferation of IoT and the sheer number of diverse open-source MQTT implementations—over 70 on GitHub, with popular brokers like Mosquitto boasting over 800,000 deployments—introduce significant security challenges. This talk, "MQTTactic," presented by Yan Jia from Huazhong University of Science and Technology, alongside collaborators from Indiana University Bloomington and Nanjing University, delves into these critical security gaps.

AI review

This is a critical piece of research, tackling a systemic problem in widely deployed IoT infrastructure. The novel, specification-driven formal verification methodology uncovers deep authorization logic flaws that impact even major vendors. This isn't just a paper; it's a wake-up call for anyone building or defending MQTT-based systems.

Watch on YouTube