Sok: Security evaluation of home-based iot deployments
… WiFi credentials [31], turn smart thermostats into spy gadgets [32], ransom them [33], run
arbitrary commands on smart TVs [34], and control home assist devices covertly [35]. Costin et al…
arbitrary commands on smart TVs [34], and control home assist devices covertly [35]. Costin et al…
[PDF][PDF] Method to design and analyze an interactive product based on design elements for creating an IoT-based service
H Shin, B Jeon, JW Park - International Journal of Smart Home, 2016 - gvpress.com
… The Nest thermostat is an IoT-based thermostat that provides user-customized … their home
temperature in their first week. Based on data collected in the first week, the Nest thermostat …
temperature in their first week. Based on data collected in the first week, the Nest thermostat …
All things considered: An analysis of {IoT} devices on home networks
D Kumar, K Shen, B Case, D Garg… - 28th USENIX security …, 2019 - usenix.org
… Instead, home IoT is better characterized by smart TVs, … that have been connected to our
home networks for more than a … —our home networks are only as secure as their weakest link. …
home networks for more than a … —our home networks are only as secure as their weakest link. …
Exploring Why Consumers Do Not Use Current Cybersecurity Mitigation Strategies for IoT Smart Devices in the Home
K Raburn - 2022 - search.proquest.com
… within their home that uses smart devices. Complementary to smart devices used in the home…
controls or applications located within the home and on the home network. Jackson (2018) …
controls or applications located within the home and on the home network. Jackson (2018) …
Smart washers may clean your clothes, but hacks can clean out your privacy, and underdeveloped regulations could leave you hanging on a line
N Davenport - J. Marshall J. Info. Tech. & Privacy L., 2015 - HeinOnline
… no one is home and access an empty house, spy on the children … to time their cycles based
on data from the Nest thermostat … grids running our home energy and utility consumption, and …
on data from the Nest thermostat … grids running our home energy and utility consumption, and …
The Design of Home Energy-management Interfaces: Effects of Display Type on Thermostat Temperature Selection
J Stein - 2013 - library-archives.canada.ca
… , using a simple signal light prompted people to reduce energy use by 15.7%, by indicating
for people to open their windows instead of using the air conditioning to cool their home. …
for people to open their windows instead of using the air conditioning to cool their home. …
[PDF][PDF] Black Hat: Nest thermostat turned into a smart spy in 15 seconds
D Storm - Computerworld, 2014 - wecanfigurethisout.org
… The group was presenting, "Smart Nest Thermostat: A Smart Spy in Your Home" (pdf). …
After a detailed analysis of the hardware infrastructure of the Nest Thermostat, we identified a …
After a detailed analysis of the hardware infrastructure of the Nest Thermostat, we identified a …
Ground Truth: Towards Labeling On-Demand IoT Traffic
DJ Campos - 2021 - repository.fit.edu
… To demonstrate this approach, we instrumented a smart home environment consisting of 57
IoT devices … Our results indicate that vendor APIs, trigger-action frameworks, and companion …
IoT devices … Our results indicate that vendor APIs, trigger-action frameworks, and companion …
Consumer's Guide for reducing cybersecurity risks in smart home technology devices
R Guillet - 2017 - search.proquest.com
… who currently employ smart home devices in their household. … helping reduce existing
risks in smart devices in their home. … was exposed in Google's Nest thermostat when security …
risks in smart devices in their home. … was exposed in Google's Nest thermostat when security …
Guardian of the HAN: Thwarting mobile attacks on smart-home devices using OS-level situation awareness
… To better understand the operations of smart home devices, we manually went through (1)
the meta-data of the collected products, (2) their online documentations and websites, and (3) …
the meta-data of the collected products, (2) their online documentations and websites, and (3) …