Abstract
A framework for evaluating security risks associated with technologies used at home.
- Barbie Video Girl; http://www.barbie.com/videogirl/Google Scholar
- Bellissimo, A., Burgess, J. and Fu, K. Secure software updates: Disappointments and new challenges. In Proceedings of USENIX Hot Topics in Security, (July 2006). Google ScholarDigital Library
- Bojinov, H., Bursztein, E. and Boneh, D. Xcs: Cross channel scripting and its impact on Web applications. In CCS '09. Google ScholarDigital Library
- Brush, A.J.B. and Inkpen, K.M. Yours, mine and ours? Sharing and use of technology in domestic environments. In Proceedings of UbiComp 07. Google ScholarDigital Library
- Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F. and Kohno, T. Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of USENIX Security '11. Google ScholarDigital Library
- Cisco NAC; http://www.cisco.com/en/US/products/ps6128/index.html.Google Scholar
- Denning, T., Matuszek, C., Koscher, K., Smith, J.R. and Kohno, T. A spotlight on security and privacy risks with future household robots: attacks and lessons. In Proceeding of Ubicomp '09. Google ScholarDigital Library
- Dixon, C., Mahajan, R., Agarwal, S., Brush, A.J., Lee, B., Saroiu, S. and Bahl, V. The home needs an operating system (and an app store). In Proceedings of Hotnets '10. Google ScholarDigital Library
- Edwards, C., Kharif, O. and Rile, M. Human Errors Fuel Hacking as Test Shows Nothing Stops Idiocy (June 27, 2011); http://www.bloomberg.com/news/2011-06-27/human-errors-fuel-hacking-as-test-shows-nothing-prevents-idiocy.htmlGoogle Scholar
- Edwards, W.K., Grinter, R.E., Mahajan, R. and Wetherall, D. Advancing the state of home networking. Commun. ACM 54, 6 (June 2011). Google ScholarDigital Library
- Fisher, D. Samsung Handsets Distributed With Malware-Infected Memory Cards (June 4, 2010); http://threatpost.com/en_us/blogs/samsung-handsets-distributed-malware-infected-memory-cards-060410Google Scholar
- Friedman, B., Kahn Jr., P.H. and Borning, A. Value sensitive eesign and information systems: Three case studies. In Human-Computer Interaction and Management Information Systems: Foundations.Google Scholar
- GlowCaps; http://www.rxvitality.com/glowcaps.html.Google Scholar
- Gourdin, B., Soman, C., Bojinov, H. and Bursztein, E. Toward secure embedded Web interfaces. In Proceedings of USENIX Security '11. Google ScholarDigital Library
- Greenberg, A. iPhone Security Bug Lets Innocent-Looking Apps Go Bad (Nov. 7, 2011); http://www.forbes.com/sites/andygreenberg/2011/11/07/iphone-security-bug-lets-innocent-looking-apps-go-bad/Google Scholar
- Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T. and Maisel, W.H. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. IEEE 2008. Google ScholarDigital Library
- Khurana, H., Hadley, M., Lu, N. and Frincke, D.A. Smart-grid security issues. IEEE Security and Privacy 8 (2010), 81--85. Google ScholarDigital Library
- Kim, T-H.J., Bauer, L., Newsome, J., Perrig, A. and Walker, J. Challenges in access right assignment for secure home networks. In Proceedings for HotSec'10. Google ScholarDigital Library
- Mazurek, M.L., Arsenault, J.P., Bresee, J., Gupta, N., Ion, I., Johns, C., Lee, D., Liang, Y., Olsen, J., Salmon, B., Shay, R., Vaniea, K., Bauer, L., Cranor, L.F., Ganger, G.R. and Reiter, M.K. Access control for home data sharing: Attitudes, needs and practices. In Proceedings of CHI '10. Google ScholarDigital Library
- Microsoft NAP; http://technet.microsoft.com/en-us/network/bb545879.Google Scholar
- Mills, E. More malware targeting Android (July 11, 2011); http://news.cnet.com/8301-27080_320078606-245/more-malware-targeting-android/Google Scholar
- Nest; http://www.nest.com/.Google Scholar
- Patel, S.N., Reynolds, M.S. and Abowd, G.D. Detecting human movement by differential air pressure sensing in HVAC system ductwork: An exploration in infrastructure mediated sensing. In Proceedings of Pervasive '08. Google ScholarDigital Library
- Rock Star in your kitchen; (Aug. 29, 2008); http://www.gorenjegroup.com/en/news?aid=933Google Scholar
- Spykee; http://www.spykeeworld.com/.Google Scholar
- Withings WiFi Body Scale; http://www.withings.com/en/bodyscale.Google Scholar
- XFINITY Home Security; http://www.comcast.com/homesecurity/.Google Scholar
- Yang, J., Edwards, W.K. and Haslem, D. Eden: Supporting home network management through interactive visual tools. In Proceedings of UIST '10. Google ScholarDigital Library
Index Terms
- Computer security and the modern home
Recommendations
Security in smart home environment: issues, challenges, and countermeasures - a survey
The accelerated spread of the IoT and rapid development of modern communication networks and technologies have connected the physical world with computational elements in the smart home environment. The smart home is based on IoT technology which ...
The Psychology of Security for the Home Computer User
SP '12: Proceedings of the 2012 IEEE Symposium on Security and PrivacyThe home computer user is often said to be the weakest link in computer security. They do not always follow security advice, and they take actions, as in phishing, that compromise themselves. In general, we do not understand why users do not always ...
Security in intelligent home
Papers of the 23rd Annual CCSC Northwestern ConferenceAs human needs of intelligent aid are growing higher and higher, people's lives are becoming more dependent on various technologies. One of the fastest-growing Internet of Things' (IoT') technologies, Intelligent Home is becoming more involved in people'...
Comments