2019
DOI: 10.48550/arxiv.1907.11797
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

PingPong: Packet-Level Signatures for Smart Home Device Events

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…1 foundation.mozilla.org/en/privacynotincluded/ IoT Inspector 2 HomeSnitch [46] Fing 3 HomeNet Profiler [13] IoT Sentinel [42] Peek-a-Boo [1] PingPong [57] IoTSense [6] HoMonit [65] X-Ray Refine [59] For 1. DG1 (Legibility) -To make the privacy-implicated activities of devices legible to their users, in the forms of both real-time and historical records of all information flows and their destinations.…”
Section: Designing the Technology Probementioning
confidence: 99%
See 1 more Smart Citation
“…1 foundation.mozilla.org/en/privacynotincluded/ IoT Inspector 2 HomeSnitch [46] Fing 3 HomeNet Profiler [13] IoT Sentinel [42] Peek-a-Boo [1] PingPong [57] IoTSense [6] HoMonit [65] X-Ray Refine [59] For 1. DG1 (Legibility) -To make the privacy-implicated activities of devices legible to their users, in the forms of both real-time and historical records of all information flows and their destinations.…”
Section: Designing the Technology Probementioning
confidence: 99%
“…Device fingerprinting in IoTSense [6] and IoTSentinel [42] was able to identify devices based on the network traffic they produced. Behaviour classifiers such as Home-Snitch [46], Peek-a-Boo [1], PingPong [57], and HoMonit [65] used machine learning to infer the reasons that devices were sending data to particular destinations at particular times.…”
Section: Overview Of Existing Toolsmentioning
confidence: 99%
“…They tested their approaches with 81 IoT devices deployed on two different continents and protected by a virtual private network (VPN). Following the same idea, other works ( [8], [9]) are also focused on deducing the type and activity of IoT devices. One of the other goals of using machine learning algorithms for attackers, is to infer the behavior of their victims.…”
Section: Smart Attack In the Literaturementioning
confidence: 99%
“…Device fingerprinting tools like IoTSense [258] and IoTSentinel [259] allow for the reliable identification of devices based on their network traffic. Classifying behaviours of devices themselves is also possible with tools like HomeSnitch [260], Peek-a-Boo [261], PingPong [262], and HoMonit [263]. These can be used to infer why a device is sending data to a particular destination at a particular time.…”
Section: Internet-of-things and Smart Homesmentioning
confidence: 99%