2020
DOI: 10.1145/3396261
|View full text |Cite
|
Sign up to set email alerts
|

How to curtail oversensing in the home

Abstract: Limiting sensitive information leakage via smart-home sensor data.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…The fundamental privacy design challenge with webcam technology is "oversensing". The oversensing observation [29] finds that overly-capable sensors can provide too much information to downstream processing-more data than is needed to complete a function, such as a meaningful face-to-face conversation. This oversensing leads to a violation of the sensor equivalent to the classic Principle of Least Privilege (PoLP) [59].…”
Section: B Long-term Defensesmentioning
confidence: 99%
See 1 more Smart Citation
“…The fundamental privacy design challenge with webcam technology is "oversensing". The oversensing observation [29] finds that overly-capable sensors can provide too much information to downstream processing-more data than is needed to complete a function, such as a meaningful face-to-face conversation. This oversensing leads to a violation of the sensor equivalent to the classic Principle of Least Privilege (PoLP) [59].…”
Section: B Long-term Defensesmentioning
confidence: 99%
“…Previous research [29] proposed to filter raw sensor data streams to regulate the amount of accessible information and to create access control mechanisms for allowing different categories of users to acquire different levels of information. We believe this approach could work well for webcam data, but will require privacy enhancing technology catering to video streaming within the software stack.…”
Section: B Long-term Defensesmentioning
confidence: 99%
“…Adversaries will attack CPSs in new and increasingly sophisticated ways. For example, researchers have demonstrated fascinating facets of hardware components, like “microphones that ‘hear’ light”, “microprocessors that ‘tell’ us secrets”, “self‐driving cars that ‘see’ fake objects”, or “sensors that ‘feel’ wrong temperatures.” 8‐12 Even recent advances, for example, in the cars we drive, demonstrate the importance of trustworthiness in such systems. If our cars should automatically brake to avoid collisions, we must analyze, understand and address both safety and security issues in the early stages of design and deployment.…”
mentioning
confidence: 99%