• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

物联网中安卓配套应用的安全性评估:以智能安全设备为例

Security Evaluation of Companion Android Applications in IoT: The Case of Smart Security Devices.

作者信息

Allen Ashley, Mylonas Alexios, Vidalis Stilianos, Gritzalis Dimitris

机构信息

Cybersecurity and Computing Systems Research Group, Department of Computer Science, University of Hertfordshire, Hatfield, AL10 9AB, UK.

Department of Informatics, Athens University of Economics and Business (AUEB), 76 Patission Ave., GR-10434 Athens, Greece.

出版信息

Sensors (Basel). 2024 Aug 23;24(17):5465. doi: 10.3390/s24175465.

DOI:10.3390/s24175465
PMID:39275376
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11398053/
Abstract

Smart security devices, such as smart locks, smart cameras, and smart intruder alarms are increasingly popular with users due to the enhanced convenience and new features that they offer. A significant part of this convenience is provided by the device's companion smartphone app. Information on whether secure and ethical development practices have been used in the creation of these applications is unavailable to the end user. As this work shows, this means that users are impacted both by potential third-party attackers that aim to compromise their device, and more subtle threats introduced by developers, who may track their use of their devices and illegally collect data that violate users' privacy. Our results suggest that users of every application tested are susceptible to at least one potential commonly found vulnerability regardless of whether their device is offered by a known brand name or a lesser-known manufacturer. We present an overview of the most common vulnerabilities found in the scanned code and discuss the shortcomings of state-of-the-art automated scanners when looking at less structured programming languages such as C and C++. Finally, we also discuss potential methods for mitigation, and provide recommendations for developers to follow with respect to secure coding practices.

摘要

智能安全设备,如智能锁、智能摄像头和智能入侵报警器,因其提供的更高便利性和新功能而越来越受用户欢迎。这种便利性的很大一部分是由设备配套的智能手机应用程序提供的。终端用户无法获得有关这些应用程序创建过程中是否采用了安全和合乎道德的开发实践的信息。正如这项研究所示,这意味着用户既受到旨在破坏其设备的潜在第三方攻击者的影响,也受到开发者引入的更微妙威胁的影响,开发者可能会跟踪他们对设备的使用情况,并非法收集侵犯用户隐私的数据。我们的结果表明,无论测试的每个应用程序的用户使用的设备是知名品牌还是不太知名的制造商提供的,都至少容易受到一种常见潜在漏洞的影响。我们概述了在扫描代码中发现的最常见漏洞,并讨论了在查看C和C++等结构化程度较低的编程语言时,现有自动化扫描器的缺点。最后,我们还讨论了潜在的缓解方法,并为开发者提供了有关安全编码实践的建议。

相似文献

1
Security Evaluation of Companion Android Applications in IoT: The Case of Smart Security Devices.物联网中安卓配套应用的安全性评估:以智能安全设备为例
Sensors (Basel). 2024 Aug 23;24(17):5465. doi: 10.3390/s24175465.
2
Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny.《揭开锅盖:备受关注的安卓物联网应用程序安全评估》
Sensors (Basel). 2022 Jan 10;22(2):513. doi: 10.3390/s22020513.
3
Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.利用威胁建模方法识别和缓解物联网用例中的网络钓鱼攻击威胁。
Sensors (Basel). 2021 Jul 14;21(14):4816. doi: 10.3390/s21144816.
4
Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review.基于智能家居的物联网,利用身体传感器实现分诊和优先级系统的实时安全远程健康监测:多驱动系统评价。
J Med Syst. 2019 Jan 15;43(3):42. doi: 10.1007/s10916-019-1158-z.
5
Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm.基于 PUF 和边缘计算范式的智能家居认证。
Sensors (Basel). 2022 Nov 25;22(23):9174. doi: 10.3390/s22239174.
6
A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes.基于物联网的智能家居的安全轻量级认证协议。
Sensors (Basel). 2021 Feb 21;21(4):1488. doi: 10.3390/s21041488.
7
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.基于物联网的智能家居的网络与物理安全漏洞评估
Sensors (Basel). 2018 Mar 8;18(3):817. doi: 10.3390/s18030817.
8
Framework to perform taint analysis and security assessment of IoT devices in smart cities.用于对智慧城市中的物联网设备进行污点分析和安全评估的框架。
PeerJ Comput Sci. 2023 Dec 21;9:e1771. doi: 10.7717/peerj-cs.1771. eCollection 2023.
9
Teaching and Learning IoT Cybersecurity andVulnerability Assessment with Shodan through Practical Use Cases.通过实际用例教授和学习物联网网络安全和漏洞评估以及 Shodan 的使用。
Sensors (Basel). 2020 May 27;20(11):3048. doi: 10.3390/s20113048.
10
A rhythm-based authentication scheme for smart media devices.一种用于智能媒体设备的基于节奏的认证方案。
ScientificWorldJournal. 2014;2014:781014. doi: 10.1155/2014/781014. Epub 2014 Jul 7.

本文引用的文献

1
A Secure and reliable RFID authentication protocol using digital schnorr cryptosystem for IoT-enabled healthcare in COVID-19 scenario.一种在新冠疫情场景下用于物联网医疗保健的、使用数字施诺尔密码系统的安全可靠的射频识别认证协议。
Sustain Cities Soc. 2021 Dec;75:103354. doi: 10.1016/j.scs.2021.103354. Epub 2021 Sep 20.