2023
DOI: 10.1109/tdsc.2022.3162312
|View full text |Cite
|
Sign up to set email alerts
|

SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform

Abstract: Emerging IoTclouds are playing a more important role in modern lives, enabling users/developers to program applications to make better use of smart devices. However, preliminary research has shown IoTcloud vulnerabilities could expose IoTusers to security risks. To better understand the problem, we studied the SmartThings cloud, one of the most popular IoTcloud platforms that support user-defined device automation (SmartApps). Specifically, we found new vulnerabilities in SmartThings that allow attackers to fa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 69 publications
0
2
0
Order By: Relevance
“…In contrast, our work focuses on authorization issues within individual cloud platforms and provides an automated protection tool (SecHARE) to mitigate the authorization-data leakage problem. Moreover, most of the existing work is mainly for specific platforms, such as SmartThings [7], [9], [58]- [65], IFTTT [10], [66], [67] and AWS Alexa [68], [69]. By contrast, our work is to provide a tool to protect different cloud platforms.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast, our work focuses on authorization issues within individual cloud platforms and provides an automated protection tool (SecHARE) to mitigate the authorization-data leakage problem. Moreover, most of the existing work is mainly for specific platforms, such as SmartThings [7], [9], [58]- [65], IFTTT [10], [66], [67] and AWS Alexa [68], [69]. By contrast, our work is to provide a tool to protect different cloud platforms.…”
Section: Related Workmentioning
confidence: 99%
“…Security organizations widely use biometric systems to track daily attendance, restrict access only authorized people, and perform other related functions [26][27][28]. Modern security, data transmissions, fingerprints, voice, eyes, and faces are known as biometric technology.…”
Section: Using Biometric Security Systemsmentioning
confidence: 99%