2019
DOI: 10.1007/978-3-030-21935-2_3
|View full text |Cite
|
Sign up to set email alerts
|

Security in Smart Toys: A Systematic Review of Literature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…1 Another example is the Fisher-Price Smart Toy Bear, which is 'an interactive learning friend with all the brains of a computer, without the screen.' 2 SCTs easily store and collect images of their users' physical activity status (walking, running, sitting), location history information through a camera, microphone, GPS, and several others (Pontes et al 2019). One of the side effects of these technical functionalities is the existence of penetration points allowing for larger attacks, which are often underestimated due to SCT's innocuous presentation but that users are unprepared to mitigate if they occur (Jones and Meurer 2016;Streiff et al 2019).…”
Section: Technical Levelmentioning
confidence: 99%
See 1 more Smart Citation
“…1 Another example is the Fisher-Price Smart Toy Bear, which is 'an interactive learning friend with all the brains of a computer, without the screen.' 2 SCTs easily store and collect images of their users' physical activity status (walking, running, sitting), location history information through a camera, microphone, GPS, and several others (Pontes et al 2019). One of the side effects of these technical functionalities is the existence of penetration points allowing for larger attacks, which are often underestimated due to SCT's innocuous presentation but that users are unprepared to mitigate if they occur (Jones and Meurer 2016;Streiff et al 2019).…”
Section: Technical Levelmentioning
confidence: 99%
“…The researchers captured live pictures and videos and installed remote access software, allowing private recordings over WiFi network connections without user knowledge or permission. Although the literature acknowledges the potential adverse effect of these technical functionalities and some reviews have been conducted (Pontes et al 2019), this research field is still largely compartmentalized, lacking a comprehensive systematic study covering SCT vulnerabilities at the technical level (Albuquerque et al 2020).…”
Section: Technical Levelmentioning
confidence: 99%