2020 IEEE Security and Privacy Workshops (SPW) 2020
DOI: 10.1109/spw50608.2020.00029
|View full text |Cite
|
Sign up to set email alerts
|

A Case Study of the Security Vetting Process of Smart-home Assistant Applications

Abstract: The popularity of smart-home assistant systems such as Amazon Alexa and Google Home leads to a booming thirdparty application market (over 70,000 applications across the two stores). While existing works have revealed security issues in these systems, it is not well understood how to help application developers to enforce security requirements. In this paper, we perform a preliminary case study to examine the security vetting mechanisms adopted by Amazon Alexa and Google Home app stores. With a focus on the au… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…3.1.1 Background. Smart voice assistants are one of the most commonly used IoT cloud applications [25,32,60,78,128,130]. Their main purpose is to help users call other services through voice commands, such as obtaining weather forecasts, making phone calls, and turning on the TV.…”
Section: Case Study: Smart Voice Assistantmentioning
confidence: 99%
See 3 more Smart Citations
“…3.1.1 Background. Smart voice assistants are one of the most commonly used IoT cloud applications [25,32,60,78,128,130]. Their main purpose is to help users call other services through voice commands, such as obtaining weather forecasts, making phone calls, and turning on the TV.…”
Section: Case Study: Smart Voice Assistantmentioning
confidence: 99%
“…The voice assistant was reported to have security issues on the cloud side [25,32,60,78,128,130]. Because voice assistants require advanced speech recognition technology and natural language processing technology, many voice assistants generally choose third-party cloud services as technical support for IoT clouds.…”
Section: Security Issuesmentioning
confidence: 99%
See 2 more Smart Citations
“…Mare et al [11] exposed security flaws in commercially available consumer smart home hubs. Hu et al [12] examined mechanisms for testing the security of third-party applications for smart home assistants. Lounis and Zulkernine [13] discussed Bluetooth Low Energy (BLE) security and how the "Just Works" pairing option could be used to render a device inoperable.…”
Section: Introductionmentioning
confidence: 99%