Proceedings of the 9th ACM Conference on Security &Amp; Privacy in Wireless and Mobile Networks 2016
DOI: 10.1145/2939918.2939925
|View full text |Cite
|
Sign up to set email alerts
|

Smart-Phones Attacking Smart-Homes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 113 publications
(59 citation statements)
references
References 5 publications
0
59
0
Order By: Relevance
“…To evaluate the completeness of ProvThings, we constructed SmartApps for a corpus of 26 possible attacks on IoT platforms through surveying relevant literature [44], [54], [61], [69]. Each attack represents a unique class of malware or a vulnerable app, with 12 based on reported IoT vulnerabilities and 14 migrated from malware classes from smartphone platforms.…”
Section: A Effectivenessmentioning
confidence: 99%
See 2 more Smart Citations
“…To evaluate the completeness of ProvThings, we constructed SmartApps for a corpus of 26 possible attacks on IoT platforms through surveying relevant literature [44], [54], [61], [69]. Each attack represents a unique class of malware or a vulnerable app, with 12 based on reported IoT vulnerabilities and 14 migrated from malware classes from smartphone platforms.…”
Section: A Effectivenessmentioning
confidence: 99%
“…A lot of vulnerabilities have been identified in IoT devices [62], [61], [69], [51], [67], [10] and protocols [46], [6]. Fernandes et al [44] conducted the first security analysis of the SmartThings platform.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, client devices can be exposed to Internet attacks by abusing the Universal Plug-n-Play (UPnP) port forwarding capability on a typical home gateway. We have shown in [10] that a malware application running on an unsuspecting user's mobile device can discover IoT devices within the home by using a standard Simple Service Discovery Protocol (SSDP); this can be followed by a UPnP port forwarding command to the home router that allows an external attacker to directly attack the IoT device. We note that SSDP and UPnP port forwarding messages are common in a typical home network environment for various peer-topeer applications (e.g.…”
Section: The Network Rulesmentioning
confidence: 99%
“…One could argue that the home router, by virtue of its NAT/firewall functionality, provides an effective protection against external attacks by dropping unsolicited Internet traffic directed to household IoT devices. However, our recent work in [10] has shown that even this perimeter defense can be bypassed via malware embedded into mobile Apps; such malware can scout the internal network for vulnerable IoT devices, and disable the home firewall to allow Internet attacks on such devices.…”
Section: Introductionmentioning
confidence: 99%