2019 IEEE Symposium on Security and Privacy (SP) 2019
DOI: 10.1109/sp.2019.00013
|View full text |Cite
|
Sign up to set email alerts
|

SoK: Security Evaluation of Home-Based IoT Deployments

Abstract: Home-based IoT devices have a bleak reputation regarding their security practices. On the surface, the insecurities of IoT devices seem to be caused by integration problems that may be addressed by simple measures, but this work finds that to be a naive assumption. The truth is, IoT deployments, at their core, utilize traditional compute systems, such as embedded, mobile, and network. These components have many unexplored challenges such as the effect of over-privileged mobile applications on embedded devices… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
155
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 292 publications
(173 citation statements)
references
References 30 publications
0
155
0
Order By: Relevance
“…Related work in this area has identified vulnerabilities that allow hackers to compromise Internet of Things (IoT) devices [13, 16-18, 21, 24, 38, 39]. A recent summary of security issues related to smart home IoT devices can be found in [3]. The research community is continuously working on identifying threats [13,16,19,31,38] and flaws in devices [17,21,27] and protocols [16,18,24,39].…”
Section: Related Workmentioning
confidence: 99%
“…Related work in this area has identified vulnerabilities that allow hackers to compromise Internet of Things (IoT) devices [13, 16-18, 21, 24, 38, 39]. A recent summary of security issues related to smart home IoT devices can be found in [3]. The research community is continuously working on identifying threats [13,16,19,31,38] and flaws in devices [17,21,27] and protocols [16,18,24,39].…”
Section: Related Workmentioning
confidence: 99%
“…Security and safety risks in the IoT domain have been the subject of a large array of research studies. We refer to recent surveys for an overview of the area [2], [5], [13]. Here, we compare our contributions with closely related works on security and safety analysis of IoT apps, information-flow control, and formal models for IoT.…”
Section: Related Workmentioning
confidence: 99%
“…Their system creates event fingerprints, matched across different IoT devices, for autonomous pairing purposes. Alrawi et al (2019) proposes a methodology to analyse security properties of IoT devices. The authors systematise the literature for smart home IoT devices to summarise key attack techniques, mitigation and stakeholders.…”
Section: Related Workmentioning
confidence: 99%