Ieee Symposium on Security and Privacy
نویسندگان
چکیده
S mart-home technology has evolved beyond basic convenience functionality, such as automatically controlled lights and door openers, to provide tangible bene ts. For instance, water ow sensors and smart meters facilitate energy e ciency. IP-enabled cameras, motion sensors, and connected door locks o er be er control of home security. However, a ackers can manipulate smart devices to cause users physical, nancial, and psychological harm. For example, burglars can target a connected door lock to plant hidden access codes.1 Early smart-home systems had steep learning curves and complicated device setup procedures and thus were limited to do-it-yourself enthusiasts. (Many forums exist for people to exchange know-how, such as forum .universal-devices.com.) Recently, several companies introduced cloud-backed systems that are easier for users to set up and that provide a programming framework for third-party developers to build smart-home apps. Examples of such frameworks are Samsung’s Smart ings (www.smar hings.com), Apple’s HomeKit (www.apple.com/ios/home), Vera Control’s Vera3 (getvera.com/controllers/vera3), Google’s Weave/ Brillo (developers.google.com/weave), and AllSeen Alliance’s AllJoyn (including Qualcomm, Microso , LG, Cisco, and AT&T; allseenalliance.org/framework). We consider the security implications of a key component of such smart-home programming frameworks: their permission models. ese models limit the risk third-party apps pose to users and their devices. We rst survey the permission models of Apple HomeKit, IoTivity, AllJoyn, and Smart ings, then discuss results from a deep-dive analysis of the Smart ings framework.2
منابع مشابه
An Enduring Symposium for Leading Research in Security and Privacy
F or 35 years, the IEEE Symposium on Security and Privacy has provided a venue for leading researchers in security and privacy to gather. It continues to be the premier forum for presenting developments in computer security and electronic privacy and for bringing together researchers and practitioners. Th e topics covered at the symposium have varied over the years, yet the work presented has a...
متن کاملReflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy
This article is a retrospective of concepts and people who have contributed significantly to the IEEE Symposium on Security and Privacy over the past 30 years. • We identify many individuals who have contributed to SSP as program chairs, general chairs, and heads of the overseeing IEEE technical committee. • We recognize SSP participants who have provided significant leadership in creating and ...
متن کاملThe IEEE Symposium on Security and Privacy, in Retrospect
T racing the history of computer security and privacy is a mammoth undertaking, somewhat resembling efforts to combine archaeology and ethnology with a compendium of past and foreseen risks— and how different courses of history might have affected those risks in different ways. (For example, the University of Minnesota’s NSF-funded collection of oral histories from influential people in this ar...
متن کاملWill Openish Source Really Improve Security
Will openish source really improve security? No.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017