Security Analysis of Emerging Smart Home Applications
Citations
1,236 citations
Cites background from "Security Analysis of Emerging Smart..."
...Researchers have found that IoT devices contain vulnerabilities from the firmware level [18, 19] up to the application level [26, 29, 73, 78]....
[...]
616 citations
Cites methods from "Security Analysis of Emerging Smart..."
...[87] constructed four proof-ofconcept attacks by exploiting two design flaws in SmartThings framework....
[...]
...The SmartThings infrastructure environment applies Kohsuke sandboxing technique [113] and isolates both SmartApps and SmartDevices (Device Handler instances) from each other [87]....
[...]
452 citations
Cites background from "Security Analysis of Emerging Smart..."
...known that IoT devices are by their nature and design easy to infiltrate [7], [8], [9], [10], [11], [12]....
[...]
390 citations
Cites background from "Security Analysis of Emerging Smart..."
...[321] have studied Samsung owned SmartThings programming framework and Samsung’s SmartApps market and claim that 55% of the smart applications in the store are over-privileged....
[...]
...Such report was no surprise given CIA’s resources, but these attacks are not all that difficult given how un-secure the devices are as demonstrated by [321]; who were able to change door lock codes and induce fake alarms among other activities....
[...]
326 citations
References
1,395 citations
"Security Analysis of Emerging Smart..." refers methods in this paper
...Prior work has used binary instrumentation coupled with automated testing to observe the runtime behavior of apps to infer the set of operations associated with a particular capability [13]....
[...]
...This precludes the possibility of binary-only analysis, as has been done in the past for smartphone application analysis [13]....
[...]
...conducted a marketscale overprivilege analysis for Android apps and determined that one-third of 940 apps were overprivileged [13], citing developer confusion as one prime factor for overprivileged Android apps....
[...]
1,160 citations
"Security Analysis of Emerging Smart..." refers methods in this paper
...Since SmartApps compile to Java bytecode, we could have used an analysis framework like Soot to write a static analysis that computed overprivilege [31]....
[...]
1,047 citations
"Security Analysis of Emerging Smart..." refers background in this paper
..., [16]), no similar studies are available on the users of smart home applications....
[...]
876 citations
"Security Analysis of Emerging Smart..." refers background in this paper
...However, bugs in Intent usage can lead to circumventing access control checks as well as to permitting spoofing [11]....
[...]
707 citations
"Security Analysis of Emerging Smart..." refers methods in this paper
...designed PScout, a static analysis framework for Android source code to produce complete permission specifications for different Android versions [8]....
[...]