Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy 2019
DOI: 10.1145/3292006.3300031
|View full text |Cite
|
Sign up to set email alerts
|

A Study of Data Store-based Home Automation

Abstract: Home automation platforms provide a new level of convenience by enabling consumers to automate various aspects of physical objects in their homes. While the convenience is beneficial, security flaws in the platforms or integrated third-party products can have serious consequences for the integrity of a user's physical environment. In this paper we perform a systematic security evaluation of two popular smart home platforms, Google's Nest platform and Philips Hue, that implement home automation "routines" (i.e.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…A common trait of the home security/safety systems proposed by prior work [15], [8], [4], [10], [5], [16] is their reliance on policies for analysis or enforcement, which researchers generally specify based on their understanding of the home. For example, Soteria [4] has a policy which states that "the refrigerator and security system must always be on", which is motivated by the safety and security consequences of the two devices being OFF.…”
Section: A Motivating Example: Effective Policy Specificationmentioning
confidence: 99%
See 1 more Smart Citation
“…A common trait of the home security/safety systems proposed by prior work [15], [8], [4], [10], [5], [16] is their reliance on policies for analysis or enforcement, which researchers generally specify based on their understanding of the home. For example, Soteria [4] has a policy which states that "the refrigerator and security system must always be on", which is motivated by the safety and security consequences of the two devices being OFF.…”
Section: A Motivating Example: Effective Policy Specificationmentioning
confidence: 99%
“…However, such an event may also be triggered by an adversary who can commandeer global state variables such as "awake/asleep", or "home/away". Indeed, our prior work [16] demonstrates how an attacker could manipulate such variables via compromised low-security devices, to indirectly control high-security devices. Finally, we also attempt to generate unnatural (i.e., unlikely) scenarios to mimic accidents or adversarial circumstances (Sec.…”
Section: A Threat Modelmentioning
confidence: 99%
“…There have been several successful attempt at hacking smart devices. Kafle et al [72] found SSL-vulnerabilities in popular smart home devices Nest and Philips Hue. Roy Solberg, a norwegian system developer, found that communication in the Mill smart heaters was unencrypted, which meant that anyone could control any internet connected heater [73].…”
Section: Prefacementioning
confidence: 99%
“…With the wide adoption of IoT devices, security and privacy have become a pressing issue [9,13,15,17,30,36,42,51,52]. A large body of existing works focuses on the security of software and firmware of the IoT devices [31,32,34], and measurements of IoT botnets [14,33].…”
Section: Related Work Iot Security and Privacymentioning
confidence: 99%