skip to main content
research-article
Free Access

Computer security and the modern home

Published:01 January 2013Publication History
Skip Abstract Section

Abstract

A framework for evaluating security risks associated with technologies used at home.

References

  1. Barbie Video Girl; http://www.barbie.com/videogirl/Google ScholarGoogle Scholar
  2. Bellissimo, A., Burgess, J. and Fu, K. Secure software updates: Disappointments and new challenges. In Proceedings of USENIX Hot Topics in Security, (July 2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bojinov, H., Bursztein, E. and Boneh, D. Xcs: Cross channel scripting and its impact on Web applications. In CCS '09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Brush, A.J.B. and Inkpen, K.M. Yours, mine and ours? Sharing and use of technology in domestic environments. In Proceedings of UbiComp 07. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F. and Kohno, T. Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of USENIX Security '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cisco NAC; http://www.cisco.com/en/US/products/ps6128/index.html.Google ScholarGoogle Scholar
  7. Denning, T., Matuszek, C., Koscher, K., Smith, J.R. and Kohno, T. A spotlight on security and privacy risks with future household robots: attacks and lessons. In Proceeding of Ubicomp '09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dixon, C., Mahajan, R., Agarwal, S., Brush, A.J., Lee, B., Saroiu, S. and Bahl, V. The home needs an operating system (and an app store). In Proceedings of Hotnets '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Edwards, C., Kharif, O. and Rile, M. Human Errors Fuel Hacking as Test Shows Nothing Stops Idiocy (June 27, 2011); http://www.bloomberg.com/news/2011-06-27/human-errors-fuel-hacking-as-test-shows-nothing-prevents-idiocy.htmlGoogle ScholarGoogle Scholar
  10. Edwards, W.K., Grinter, R.E., Mahajan, R. and Wetherall, D. Advancing the state of home networking. Commun. ACM 54, 6 (June 2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Fisher, D. Samsung Handsets Distributed With Malware-Infected Memory Cards (June 4, 2010); http://threatpost.com/en_us/blogs/samsung-handsets-distributed-malware-infected-memory-cards-060410Google ScholarGoogle Scholar
  12. Friedman, B., Kahn Jr., P.H. and Borning, A. Value sensitive eesign and information systems: Three case studies. In Human-Computer Interaction and Management Information Systems: Foundations.Google ScholarGoogle Scholar
  13. GlowCaps; http://www.rxvitality.com/glowcaps.html.Google ScholarGoogle Scholar
  14. Gourdin, B., Soman, C., Bojinov, H. and Bursztein, E. Toward secure embedded Web interfaces. In Proceedings of USENIX Security '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Greenberg, A. iPhone Security Bug Lets Innocent-Looking Apps Go Bad (Nov. 7, 2011); http://www.forbes.com/sites/andygreenberg/2011/11/07/iphone-security-bug-lets-innocent-looking-apps-go-bad/Google ScholarGoogle Scholar
  16. Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T. and Maisel, W.H. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. IEEE 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Khurana, H., Hadley, M., Lu, N. and Frincke, D.A. Smart-grid security issues. IEEE Security and Privacy 8 (2010), 81--85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Kim, T-H.J., Bauer, L., Newsome, J., Perrig, A. and Walker, J. Challenges in access right assignment for secure home networks. In Proceedings for HotSec'10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Mazurek, M.L., Arsenault, J.P., Bresee, J., Gupta, N., Ion, I., Johns, C., Lee, D., Liang, Y., Olsen, J., Salmon, B., Shay, R., Vaniea, K., Bauer, L., Cranor, L.F., Ganger, G.R. and Reiter, M.K. Access control for home data sharing: Attitudes, needs and practices. In Proceedings of CHI '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Microsoft NAP; http://technet.microsoft.com/en-us/network/bb545879.Google ScholarGoogle Scholar
  21. Mills, E. More malware targeting Android (July 11, 2011); http://news.cnet.com/8301-27080_320078606-245/more-malware-targeting-android/Google ScholarGoogle Scholar
  22. Nest; http://www.nest.com/.Google ScholarGoogle Scholar
  23. Patel, S.N., Reynolds, M.S. and Abowd, G.D. Detecting human movement by differential air pressure sensing in HVAC system ductwork: An exploration in infrastructure mediated sensing. In Proceedings of Pervasive '08. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Rock Star in your kitchen; (Aug. 29, 2008); http://www.gorenjegroup.com/en/news?aid=933Google ScholarGoogle Scholar
  25. Spykee; http://www.spykeeworld.com/.Google ScholarGoogle Scholar
  26. Withings WiFi Body Scale; http://www.withings.com/en/bodyscale.Google ScholarGoogle Scholar
  27. XFINITY Home Security; http://www.comcast.com/homesecurity/.Google ScholarGoogle Scholar
  28. Yang, J., Edwards, W.K. and Haslem, D. Eden: Supporting home network management through interactive visual tools. In Proceedings of UIST '10. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Computer security and the modern home

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 56, Issue 1
          January 2013
          117 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/2398356
          Issue’s Table of Contents

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 January 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Popular
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format