A solution based analysis of attack vectors on smart home systems

A Brauchli, D Li - … Conference on Cyber Security of Smart Cities …, 2015 - ieeexplore.ieee.org
… broad smart-world context this paper lists, analyzes and ranks possible attack vectors or
entry points into a smart home … The smart home system used for the analysis in this paper is a …

Security and attack vector analysis of IoT devices

M Capellupo, J Liranzo, MZA Bhuiyan… - Security, Privacy, and …, 2017 - Springer
… concept of Smart Homes, or homes with emended technologies that allows the automation
of … the privacy concerns, and attack vectors of home automation devices. Then we perform an …

My smart home is under attack

L Coppolino, V D'Alessandro… - 2015 IEEE 18th …, 2015 - ieeexplore.ieee.org
… This possibility makes such devices additional attack vectors for the Smart Home. In this … of
a real attack exploiting a general purpose device connected to both the Internet and the Home

A taxonomy of cyber-physical threats and impact in the smart home

R Heartfield, G Loukas, S Budimir, A Bezemskij… - Computers & …, 2018 - Elsevier
… to establish a systematic means for classifying attack vectors and the their impact as a … smart
home. Hence, we are not only concerned with identifying extant or emerging attack vectors (…

[HTML][HTML] Threat Analysis of Smart Home Assistants Involving Novel Acoustic Based Attack-Vectors

A Björkman, M Kardos - 2019 - diva-portal.org
… threats towards smart home assistants in a home environment. … a formal model for securing
smart home assistants and other … exist for smart home assistants and similar systems. The …

Smart home personal assistants: a security and privacy review

JS Edu, JM Such, G Suarez-Tangil - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
home users interact with technology. However, several elements expose these systems to
… issues, categorizing the most important attack vectors and their countermeasures. Based on …

Categorisation of security threats for smart home appliances

A Gai, S Azam, B Shanmugam… - 2018 International …, 2018 - ieeexplore.ieee.org
… and by many other hackers on smart home appliances. The identification process, … threat
vector table were the primary focus of the research. Before identifying and creating threat vector

An overview of potential authentication threats and attacks on Internet of Things (IoT): A focus on Smart home applications

AM Gamundani, A Phillips… - … ) and IEEE Smart Data …, 2018 - ieeexplore.ieee.org
… The main ideas on the potential authentication threats and attacks on IoT in Smart home
positions Smart home applications at a more vulnerable position as the attack vectors

Intrusion detection systems for smart home iot devices: experimental comparison study

F Alsakran, G Bendiab, S Shiaeles… - … Symposium on Security …, 2019 - Springer
… -connected devices and focus on alerting suspicious or … of such systems in the context of
smart home can be … to counter the existing and emerging attack vectors. Therefore, this paper …

[PDF][PDF] Evasion attacks and defenses on smart home physical event verification

MO Ozmen, R Song, H Farrukh, ZB Celik - Network and Distributed …, 2023 - par.nsf.gov
… We evaluate the effectiveness of our approach in two smart home … , and thus, properly
mitigate realistic attack vectors. … We evaluate our defense in two real smart home testbeds, a …