A solution based analysis of attack vectors on smart home systems

A Brauchli, D Li - … Conference on Cyber Security of Smart Cities …, 2015 - ieeexplore.ieee.org
… broad smart-world context this paper lists, analyzes and ranks possible attack vectors or
entry points into a smart home … The smart home system used for the analysis in this paper is a …

A taxonomy of cyber-physical threats and impact in the smart home

R Heartfield, G Loukas, S Budimir, A Bezemskij… - Computers & …, 2018 - Elsevier
… to establish a systematic means for classifying attack vectors and the their impact as a … smart
home. Hence, we are not only concerned with identifying extant or emerging attack vectors (…

My smart home is under attack

L Coppolino, V D'Alessandro… - 2015 IEEE 18th …, 2015 - ieeexplore.ieee.org
… This possibility makes such devices additional attack vectors for the Smart Home. In this … of
a real attack exploiting a general purpose device connected to both the Internet and the Home

Security and attack vector analysis of IoT devices

M Capellupo, J Liranzo, MZA Bhuiyan… - Security, Privacy, and …, 2017 - Springer
… concept of Smart Homes, or homes with emended technologies that allows the automation
of … the privacy concerns, and attack vectors of home automation devices. Then we perform an …

An attack vector for iot networks

S Rizvi, R Pipetti, N McIntyre… - … Conference on Software …, 2018 - ieeexplore.ieee.org
… years, ‘smart home’ and ‘home automation’ has been a popular buzzword targeted at
consumers. The notion of a modern home cannot exclude smart home technology. Homes are …

[PDF][PDF] Evasion attacks and defenses on smart home physical event verification

MO Ozmen, R Song, H Farrukh, ZB Celik - Network and Distributed …, 2023 - par.nsf.gov
… We evaluate the effectiveness of our approach in two smart home … , and thus, properly
mitigate realistic attack vectors. … We evaluate our defense in two real smart home testbeds, a …

[HTML][HTML] Smart home privacy protection methods against a passive wireless snooping side-channel attack

MA Nassiri Abrishamchi, A Zainal, FA Ghaleb… - Sensors, 2022 - mdpi.com
… them with the known feature vectors for the trained model; a … results in several activity feature
vectors. These features are … vectors to relate them to a labelled vector of the attack model. …

Detecting dos attack in smart home iot devices using a graph-based approach

R Paudel, T Muncy, W Eberle - 2019 IEEE international …, 2019 - ieeexplore.ieee.org
attack vectors are discovered [3]. With the plethora of new specific-use computing devices
reaching the market every year, it is becoming increasingly urgent to have pragmatic solutions …

[HTML][HTML] Threat analysis for smart homes

G Kavallieratos, N Chowdhury, S Katsikas, V Gkioulos… - Future Internet, 2019 - mdpi.com
smart home reference architecture. Furthermore, by considering the technical viewpoint that
defines the smart home environment, we design a smart home … all m IoT vectors nIoT H and …

Voiceprint mimicry attack towards speaker verification system in smart home

L Zhang, Y Meng, J Yu, C Xiang… - IEEE INFOCOM 2020 …, 2020 - ieeexplore.ieee.org
attacks (eg, replay attack). In this study, we present VMask, a novel and practical voiceprint
mimicry attack that could fool ASV in smart homesystems, as they extract embedding vectors