Extended functionality attacks on IoT devices: The case of smart lights

E Ronen, A Shamir - 2016 IEEE European Symposium on …, 2016 - ieeexplore.ieee.org
In this paper we consider the security aspects of Internet of Things (IoT) devices, which
bridge the physical and virtual worlds. We propose a new taxonomy of attacks, which …

An experimental analysis of security vulnerabilities in industrial IoT devices

X Jiang, M Lora, S Chattopadhyay - ACM Transactions on Internet …, 2020 - dl.acm.org
The revolutionary development of the Internet of Things has triggered a huge demand for
Internet of Things devices. They are extensively applied to various fields of social activities …

Cloak and dagger: from two permissions to complete control of the UI feedback loop

Y Fratantonio, C Qian, SP Chung… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
The effectiveness of the Android permission system fundamentally hinges on the user's
correct understanding of the capabilities of the permissions being granted. In this paper, we …

Internet of Things (IoT): Taxonomy of security attacks

M Nawir, A Amir, N Yaakob… - 2016 3rd international …, 2016 - ieeexplore.ieee.org
The Internet of Things (IoT) comprises a complex network of smart devices, which frequently
exchange data through the Internet. Given the significant growth of IoT as a new …

IoT goes nuclear: Creating a ZigBee chain reaction

E Ronen, A Shamir, AO Weingarten… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
Within the next few years, billions of IoT devices will densely populate our cities. In this
paper we describe a new type of threat in which adjacent IoT devices will infect each other …

Vulnerability studies and security postures of IoT devices: A smart home case study

BD Davis, JC Mason, M Anwar - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) technology has revolutionized our daily lives in many ways-whether
it is the way we conduct our day-to-day activities inside our home, or the way we control our …

ThingPot: an interactive Internet-of-Things honeypot

M Wang, J Santillan, F Kuipers - arXiv preprint arXiv:1807.04114, 2018 - arxiv.org
The Mirai Distributed Denial-of-Service (DDoS) attack exploited security vulnerabilities of
Internet-of-Things (IoT) devices and thereby clearly signalled that attackers have IoT on their …

Data exfiltration from Internet of Things devices: iOS devices as case studies

CJ D'Orazio, KKR Choo, LT Yang - IEEE Internet of Things …, 2016 - ieeexplore.ieee.org
Increasingly, big data (including sensitive and commercial-in-confidence data) is being
accessible and stored on a range of Internet of Things (IoT) devices, such as our mobile …

Peek-a-boo: I see your smart home activities, even encrypted!

A Acar, H Fereidooni, T Abera, AK Sikder… - Proceedings of the 13th …, 2020 - dl.acm.org
A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment
allow users to easily control the physical world around them and facilitate their living styles …

A systematic study of security issues in Internet-of-Things (IoT)

BVS Krishna, T Gnanasekaran - … Conference on I-SMAC (IoT in …, 2017 - ieeexplore.ieee.org
Internet of things (IoT), also referred to as the internet of objects, is a dynamic global
information network consisting of internet—connected objects. Wireless sensor networks …