메뉴 건너뛰기




Volumn , Issue , 2016, Pages 636-654

Security Analysis of Emerging Smart Home Applications

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION; CODES (SYMBOLS); FIRE ALARM SYSTEMS; INTELLIGENT BUILDINGS; SECURITY SYSTEMS;

EID: 84987660714     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2016.44     Document Type: Conference Paper
Times cited : (611)

References (32)
  • 1
    • 84987663445 scopus 로고    scopus 로고
    • Accessed: Oct
    • "Vera Smart Home Controller," http://getvera.com/controllers/vera3/, Accessed: Oct 2015
    • (2015) Vera Smart Home Controller
  • 2
    • 84987625784 scopus 로고    scopus 로고
    • Accessed: Nov
    • Allseen Alliance, "AllJoyn Data Exchange," https://allseenalliance.org/ framework/documentation/learn/core/system-description/data-exchange, Accessed: Nov 2015
    • (2015) AllJoyn Data Exchange
  • 3
    • 84964823809 scopus 로고    scopus 로고
    • Accessed: Oct
    • Allseen Alliance, "AllJoyn Framework," https://allseenalliance.org/ framework, Accessed: Oct 2015
    • (2015) AllJoyn Framework
  • 4
    • 84987662674 scopus 로고    scopus 로고
    • Accessed: Nov
    • AllSeen Alliance, "AllJoyn Security 2.0 Feature: High-level Design," https://allseenalliance.org/framework/documentation/learn/ core/security2 0/hld, Accessed: Nov 2015
    • (2015) AllJoyn Security 2.0 Feature: High-level Design
  • 5
    • 84987669222 scopus 로고    scopus 로고
    • Accessed: Nov
    • Apple, "App Security, iOS Security Guide," http://www.apple.com/ business/docs/iOS Security Guide.pdf, Accessed: Nov 2015
    • (2015) App Security, IOS Security Guide
  • 6
    • 84987618059 scopus 로고    scopus 로고
    • Accessed: Oct
    • Apple, "HMAccessoryDelegate Protocol Reference," https: //developer.apple.com/library/ios/documentation/HomeKit/ Reference/HMAccessoryDelegate Protocol/index.html#// apple ref/occ/intfm/HMAccessoryDelegate/accessory:service: didUpdateValueForCharacteristic:, Accessed: Oct 2015
    • (2015) HMAccessoryDelegate Protocol Reference
  • 7
    • 84987682966 scopus 로고    scopus 로고
    • Accessed: Oct
    • Apple, "HomeKit," http://www.apple.com/ios/homekit/, Accessed: Oct 2015
    • (2015) HomeKit
  • 12
    • 84872036052 scopus 로고    scopus 로고
    • Computer security and the modern home
    • Jan
    • T. Denning, T. Kohno, and H. M. Levy, "Computer security and the modern home," Commun. ACM, vol. 56, no. 1, pp. 94-103, Jan. 2013. [Online]. Available: http://doi.acm.org/10.1145/2398356.2398377
    • (2013) Commun. ACM , vol.56 , Issue.1 , pp. 94-103
    • Denning, T.1    Kohno, T.2    Levy, H.M.3
  • 18
    • 84987682981 scopus 로고    scopus 로고
    • Accessed: Oct
    • Google, "Project Weave," https://developers.google.com/weave/, Accessed: Oct 2015
    • (2015) Project Weave
  • 20
    • 84987625790 scopus 로고    scopus 로고
    • Accessed: Oct
    • Kohsuke Kawaguchi, "Groovy Sandbox," http://groovy-sandbox. kohsuke.org/, Accessed: Oct 2015
    • (2015)
    • Kawaguchi, K.1
  • 22
    • 84869416020 scopus 로고    scopus 로고
    • CHEX: Statically vetting Android apps for component hijacking vulnerabilities
    • ser. CCS '12. New York, NY, USA: ACM
    • L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang, "CHEX: Statically vetting Android apps for component hijacking vulnerabilities," in Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS '12. New York, NY, USA: ACM, 2012, pp. 229-240. [Online]. Available: http://doi.acm.org/10.1145/2382196.2382223
    • (2012) Proceedings of the 2012 ACM Conference on Computer and Communications Security , pp. 229-240
    • Lu, L.1    Li, Z.2    Wu, Z.3    Lee, W.4    Jiang, G.5
  • 23
    • 85095121198 scopus 로고    scopus 로고
    • Experimental security analyses of non-networked compact fluorescent lamps: A case study of home automation security
    • Arlington, VA: USENIX
    • T. Oluwafemi, T. Kohno, S. Gupta, and S. Patel, "Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: A Case Study of Home Automation Security," in Proceedings of the LASER 2013 (LASER 2013). Arlington, VA: USENIX, 2013, pp. 13-24. [Online]. Available: https://www.usenix.org/laser2013/program/oluwafemi
    • (2013) Proceedings of the LASER 2013 (LASER 2013) , pp. 13-24
    • Oluwafemi, T.1    Kohno, T.2    Gupta, S.3    Patel, S.4
  • 24
    • 85076323421 scopus 로고    scopus 로고
    • Securing embedded user interfaces: Android and beyond
    • F. Roesner and T. Kohno, "Securing embedded user interfaces: Android and beyond." in USENIX Security, 2013
    • (2013) USENIX Security
    • Roesner, F.1    Kohno, T.2
  • 25
    • 84874840847 scopus 로고    scopus 로고
    • User-driven access control: Rethinking permission granting in modern operating systems
    • ser. SP '12. Washington, DC, USA: IEEE Computer Society
    • F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. J. Wang, and C. Cowan, "User-driven access control: Rethinking permission granting in modern operating systems," in Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP '12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 224-238. [Online]. Available: http://dx.doi.org/10.1109/SP.2012.24
    • (2012) Proceedings of the 2012 IEEE Symposium on Security and Privacy , pp. 224-238
    • Roesner, F.1    Kohno, T.2    Moshchuk, A.3    Parno, B.4    Wang, H.J.5    Cowan, C.6
  • 26
    • 84987683002 scopus 로고    scopus 로고
    • Accessed: Oct
    • Samsung, "SmartApp Location object," http://docs.smartthings.com/en/ latest/ref-docs/location-ref.html#location-ref, Accessed: Oct 2015
    • (2015) Samsung
  • 27
    • 84987683001 scopus 로고    scopus 로고
    • Accessed: Nov
    • Samsung, "SmartThings," http://www.smartthings.com/, Accessed: Nov 2015
    • (2015) Samsung
  • 28
    • 84987669247 scopus 로고    scopus 로고
    • Accessed: Oct
    • Samsung, "SmartThings OAuth Protocol Flow-Smart-Things Documentation," http://docs.smartthings.com/en/latest/ smartapp-web-services-developers-guide/tutorial-part2.html# appendix-just-The-urls-please, Accessed: Oct 2015
    • (2015) Samsung
  • 32
    • 84964577386 scopus 로고    scopus 로고
    • Accessed: Oct
    • Veracode, "The Internet of Things: Security Research Study," https://www.veracode.com/sites/default/files/Resources/Whitepapers/ internet-of-things-whitepaper.pdf, Accessed: Oct 2015
    • (2015) The Internet of Things: Security Research Study


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.