Sok: Security evaluation of home-based iot deployments

O Alrawi, C Lever, M Antonakakis… - 2019 IEEE symposium …, 2019 - ieeexplore.ieee.org
… WiFi credentials [31], turn smart thermostats into spy gadgets [32], ransom them [33], run
arbitrary commands on smart TVs [34], and control home assist devices covertly [35]. Costin et al…

[PDF][PDF] Method to design and analyze an interactive product based on design elements for creating an IoT-based service

H Shin, B Jeon, JW Park - International Journal of Smart Home, 2016 - gvpress.com
… The Nest thermostat is an IoT-based thermostat that provides user-customized … their home
temperature in their first week. Based on data collected in the first week, the Nest thermostat

All things considered: An analysis of {IoT} devices on home networks

D Kumar, K Shen, B Case, D Garg… - 28th USENIX security …, 2019 - usenix.org
… Instead, home IoT is better characterized by smart TVs, … that have been connected to our
home networks for more than a … —our home networks are only as secure as their weakest link. …

Exploring Why Consumers Do Not Use Current Cybersecurity Mitigation Strategies for IoT Smart Devices in the Home

K Raburn - 2022 - search.proquest.com
… within their home that uses smart devices. Complementary to smart devices used in the home
controls or applications located within the home and on the home network. Jackson (2018) …

Smart washers may clean your clothes, but hacks can clean out your privacy, and underdeveloped regulations could leave you hanging on a line

N Davenport - J. Marshall J. Info. Tech. & Privacy L., 2015 - HeinOnline
… no one is home and access an empty house, spy on the children … to time their cycles based
on data from the Nest thermostat … grids running our home energy and utility consumption, and …

The Design of Home Energy-management Interfaces: Effects of Display Type on Thermostat Temperature Selection

J Stein - 2013 - library-archives.canada.ca
… , using a simple signal light prompted people to reduce energy use by 15.7%, by indicating
for people to open their windows instead of using the air conditioning to cool their home. …

[PDF][PDF] Black Hat: Nest thermostat turned into a smart spy in 15 seconds

D Storm - Computerworld, 2014 - wecanfigurethisout.org
… The group was presenting, "Smart Nest Thermostat: A Smart Spy in Your Home" (pdf). …
After a detailed analysis of the hardware infrastructure of the Nest Thermostat, we identified a …

Ground Truth: Towards Labeling On-Demand IoT Traffic

DJ Campos - 2021 - repository.fit.edu
… To demonstrate this approach, we instrumented a smart home environment consisting of 57
IoT devices … Our results indicate that vendor APIs, trigger-action frameworks, and companion …

Consumer's Guide for reducing cybersecurity risks in smart home technology devices

R Guillet - 2017 - search.proquest.com
… who currently employ smart home devices in their household. … helping reduce existing
risks in smart devices in their home. … was exposed in Google's Nest thermostat when security …

Guardian of the HAN: Thwarting mobile attacks on smart-home devices using OS-level situation awareness

S Demetriou, N Zhang, Y Lee, X Wang… - arXiv preprint arXiv …, 2017 - arxiv.org
… To better understand the operations of smart home devices, we manually went through (1)
the meta-data of the collected products, (2) their online documentations and websites, and (3) …