Proceedings of the 33rd Annual ACM Symposium on Applied Computing 2018
DOI: 10.1145/3167132.3167214
|View full text |Cite
|
Sign up to set email alerts
|

Leaking data from enterprise networks using a compromised smartwatch device

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…Although it can be argued that the results obtained are limited to this specific model until confirmed for other models as well, we expect other glasses to expose similar security threats. Just like history has demonstrated for smartwatches [81,93,94] and fitness trackers [6,15,20,30], we suspect that many camera glasses currently available on the market do not have hardware and software architectures suited to prevent security attacks, most likely due to manufacturers being more interested in utility rather than the security of their products at this stage of mass consumer penetration of such devices. Some of our attacks, such as detecting devices in the Wi-Fi spectrum, are general to apply to all Wi-Fi connected glasses models.…”
Section: Limitations Of the Case Study And Future Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Although it can be argued that the results obtained are limited to this specific model until confirmed for other models as well, we expect other glasses to expose similar security threats. Just like history has demonstrated for smartwatches [81,93,94] and fitness trackers [6,15,20,30], we suspect that many camera glasses currently available on the market do not have hardware and software architectures suited to prevent security attacks, most likely due to manufacturers being more interested in utility rather than the security of their products at this stage of mass consumer penetration of such devices. Some of our attacks, such as detecting devices in the Wi-Fi spectrum, are general to apply to all Wi-Fi connected glasses models.…”
Section: Limitations Of the Case Study And Future Workmentioning
confidence: 99%
“…As wearable devices, such as the glasses from Andrew's story, become more complex and diverse due to industry manufacturers striving to deliver more features and functionality to users at lower costs, it is unsuspecting and uninformed users of such devices, as well as bystanders, that become exposed to a wider range of potential security and privacy attacks from malicious parties [30,66,93]. But glasses are not the only wearables that can become targets of such attacks: smartwatches, fitness trackers, and armbands have been repeatedly exposed in the scientific literature as being unsecure [6,15,20,30,81,94,94]. However, unlike smartwatches and fitness trackers, for which a large body of literature has uncovered many security threats and proposed defense mechanisms, similar systematic investigations for glasses are lacking.…”
Section: :2 • Opaschi and Vatavumentioning
confidence: 99%
See 2 more Smart Citations
“…The major challenges to test IoT devices are their fea tures and limitations [22]. A comprehensive IoT security test bed was developed [23]. Se curity weakness of IoT devices was evaluated by launching attacks [14,24,25].…”
Section: Related Workmentioning
confidence: 99%