Security and Privacy Analyses of Internet of Things Toys

05/07/2018
by   Gordon Chu, et al.
0

This paper investigates the security and privacy of Internet-connected children's smart toys through case studies of three commercially-available products. We conduct network and application vulnerability analyses of each toy using static and dynamic analysis techniques, including application binary decompilation and network monitoring. We discover several publicly undisclosed vulnerabilities that violate the Children's Online Privacy Protection Rule (COPPA) as well as the toys' individual privacy policies. These vulnerabilities, especially security flaws in network communications with first-party servers, are indicative of a disconnect between many IoT toy developers and security and privacy best practices despite increased attention to Internet-connected toy hacking risks.

READ FULL TEXT
research
12/10/2020

Virtual Classrooms and Real Harms

Universities have been forced to rely on remote educational technology t...
research
08/22/2018

Optical TEMPEST

Research on optical TEMPEST has moved forward since 2002 when the first ...
research
03/12/2019

Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA

Increased concern about data privacy has prompted new and updated data p...
research
06/04/2019

Anonymity Network Tor and Performance Analysis of ARANEA; an IOT Based Privacy-Preserving Router

There was a time when the word security was only confined to the physica...
research
02/02/2023

SSO-Monitor: Fully-Automatic Large-Scale Landscape, Security, and Privacy Analyses of Single Sign-On in the Wild

Single Sign-On (SSO) shifts the crucial authentication process on a webs...
research
05/07/2021

argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Binaries

Recent high-profile attacks on the Internet of Things (IoT) have brought...
research
06/15/2021

Best Practices for Notification Studies for Security and Privacy Issues on the Internet

Researchers help operators of vulnerable and non-compliant internet serv...

Please sign up or login with your details

Forgot password? Click here to reset