2019 IEEE/ACM 6th International Conference on Mobile Software Engineering and Systems (MOBILESoft) 2019
DOI: 10.1109/mobilesoft.2019.00013
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis for SmartThings IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 18 publications
(33 citation statements)
references
References 3 publications
0
33
0
Order By: Relevance
“…Service provider (e.g., Amazon, Google). [21,41,42,96,129]. Because Samsung's IoT ecosystem advocates interoperability between different devices, SmartThings also allows third-party developers to further develop device functions through this programming framework.…”
Section: Security Issuesmentioning
confidence: 99%
See 2 more Smart Citations
“…Service provider (e.g., Amazon, Google). [21,41,42,96,129]. Because Samsung's IoT ecosystem advocates interoperability between different devices, SmartThings also allows third-party developers to further develop device functions through this programming framework.…”
Section: Security Issuesmentioning
confidence: 99%
“…Samsung SmartThings. Researchers have found that SmartThings has security issues in both the IoT cloud and the app [21,41,42,96,129]. Because SmartThings allows multiple apps to coexist, the interaction between different apps and the interoperability between devices also cause security issues.…”
Section: Security Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…But, such tools for SmartApps are not widely available. There are some solutions that have used static analysis to identify vulnerable IoT applications [8,16,38].…”
Section: Introductionmentioning
confidence: 99%
“…This includes, in addition to flow-sensitive discussed previously [15], path sensitive and context sensitive analysis mutational operators. • Third, we provide a comprehensive evaluation that demonstrates the framework on the evaluation of three static analysis tools, SaINT [14], Tainted-Things [16], and FlowsMiner [17].…”
Section: Introductionmentioning
confidence: 99%