首页> 外文会议>Annual International Conference on Privacy, Security and Trust >Exploiting Known Vulnerabilities of a Smart Thermostat
【24h】

Exploiting Known Vulnerabilities of a Smart Thermostat

机译:利用智能恒温器的已知漏洞

获取原文

摘要

We address security vulnerabilities for a smart thermostat. As this kind of smart appliance is adopted in homes around the world, every user will be opening up a new avenue for cyber attack. Since these devices have known vulnerabilities and they are being managed by non-technical users, we anticipate that smart thermostats are likely to be targetted by unsophisticated attackers relying on publicly available exploits to take advantage of weakly protected devices. As such, in this paper, we take the role of a 'script kiddy' and we assess the security of a smart thermostat by using Internet resources for attacks at both the physical level and the network level. We demonstrate that such attacks are unlikely to be effective without some additional social engineering to obtain user credentials. Moreover, we suggest that the vulnerability to attack can be further minimized by simply reducing the use of remote storage where possible.
机译:我们解决智能恒温器的安全漏洞。 随着世界各地的家园采用这种智能设备,每个用户都将开辟一个新的网络攻击大道。 由于这些设备具有已知的漏洞,并且他们正在由非技术用户管理,因此我们预计智能恒温器可能被依赖于公开可用的攻击者来瞄准才能利用弱保护的设备。 因此,在本文中,我们采取了“脚本小孩”的作用,我们通过使用Internet资源对物理级别和网络级别进行攻击来评估智能恒温器的安全性。 我们证明,如果没有一些额外的社交工程,则不太可能有效地获得用户凭据。 此外,我们建议通过简单地减少可能在可能的情况下,进一步最小化攻击的漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号