{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:44:50Z","timestamp":1743014690315,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811399411"},{"type":"electronic","value":"9789811399428"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-9942-8_4","type":"book-chapter","created":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T03:03:25Z","timestamp":1563419005000},"page":"32-45","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cyber Threat Analysis of Consumer Devices"],"prefix":"10.1007","author":[{"given":"Hemant","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Mayank","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Liu, H., Li, C., Jin, X., Li, J., Zhang, Y., Gu, D.: Smart solution, poor protection: an empirical study of security and privacy issues in developing and deploying smart home devices. In: Proceeding of Internet of Things on Security and Privacy, IoTS&P@CCS in Dallas, TX, USA, 3 November 2017","DOI":"10.1145\/3139937.3139948"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Kanuparthi, A., Karri, R., Addepalli, S.: Hardware and embedded security in the context of internet of things. In: Proceedings of the 2013 ACM Workshop on Security, Privacy & Dependability for Cyber Vehicles (CyCAR 2013), pp. 61\u201364. ACM, New York (2013)","DOI":"10.1145\/2517968.2517976"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Jang, W., Chhabra, A., Prasad, A.: Enabling multi-user controls in smart home devices. In: Proceeding of Internet of Things on Security and Privacy, IoTS&P@CCS in Dallas, TX, USA, 3 November 2017","DOI":"10.1145\/3139937.3139941"},{"key":"4_CR4","unstructured":"ABIresearch. Smart, April 2017. \n                    https:\/\/www.abiresearch.com\/market-research\/service\/smart-home\/"},{"key":"4_CR5","unstructured":"Oblick, D.: Just what is a \u2018smart-home\u2019 anyway?, May 2016. \n                    https:\/\/www.cnbc.com\/2016\/05\/09\/just-what-is-a-smart-home-anyway.html"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Ozmen, M.O., Yavuz, A.A.: Low-cost standard public key cryptography services for wireless IoT systems. In: Proceeding of Internet of Things on Security and Privacy, IoTS&P@CCS in Dallas, TX, USA, 3 November 2017","DOI":"10.1145\/3139937.3139940"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Ronen, E., Shamir, A.: Extended functionality attacks on IoT devices: the case of smart lights. In: Proceedings of IEEE European Symposium on Security and Privacy (2016)","DOI":"10.1109\/EuroSP.2016.13"},{"key":"4_CR8","unstructured":"https:\/\/www.zigbee.org\/zigbee-for-developers\/applicationstandards\/zigbee-light-link\/"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., Wagner, D.: Smart locks: lessons for securing commodity internet of things devices. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIA CCS 2016), pp. 461\u2013472. ACM, New York (2016)","DOI":"10.1145\/2897845.2897886"},{"issue":"1","key":"4_CR10","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2018.1331033","volume":"16","author":"E Ronen","year":"2018","unstructured":"Ronen, E., Shamir, A., Weingarten, A.O., O\u2019Flynn, C.: IoT goes nuclear: creating a Zigbee chain reaction. IEEE Secur. Priv. 16(1), 54\u201362 (2018)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: Proceeding of 37th IEEE Symposium on Security and Privacy (2016)","DOI":"10.1109\/SP.2016.44"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Avizheh, S., Doan, T.T., Liu, X., Safavi-Naini, R.: A secure event logging system for smart homes. In: Proceeding of Internet of Things on Security and Privacy, IoTS&P@CCS in Dallas, TX, USA, 3 November 2017","DOI":"10.1145\/3139937.3139945"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Nawir, M., Amir, A., Yaakob, N., Lynn, O.B.: Internet of Things (IoT): taxonomy of security attacks. In: The Proceedings of 3rd International Conference on Electronic Design (ICED), 11\u201312 August 2016","DOI":"10.1109\/ICED.2016.7804660"},{"issue":"1","key":"4_CR14","first-page":"28","volume":"14","author":"L Bauer","year":"2011","unstructured":"Bauer, L., Garriss, S., Reiter, M.K.: Detecting and resolving policy misconfigurations in access-control systems. ACM Trans. Inf. Syst. Secure. 14(1), 28 (2011). Article id 2","journal-title":"ACM Trans. Inf. Syst. Secure."},{"key":"4_CR15","unstructured":"Hernandez, G., Arias, O., Buentello, D., Jin, Y.: Smart Nest Thermostat: A Smart Spy in Your Home. \n                    http:\/\/www.cisco.com\/web\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf"},{"key":"4_CR16","unstructured":"King, R.: Nest is Turning Up the Security on Its Thermostats, 7 March 2017. \n                    http:\/\/fortune.com\/2017\/03\/07\/nest-thermostat-security\/"},{"key":"4_CR17","unstructured":"Twentyman, J.: Hacking medical devices is the next big security concern | Financial Times (2018). \n                    https:\/\/www.ft.com\/content\/75912040-98ad-11e7-8c5c-c8d8fa6961bb"},{"key":"4_CR18","unstructured":"Qadir, M.: What is DNS hijacking and How It Works? PureVPN Blog (2018). \n                    https:\/\/www.purevpn.com\/blog\/dns-hijacking\/"},{"key":"4_CR19","unstructured":"Gilburg, J.: Rsaconference.com (2018). \n                    https:\/\/www.rsaconference.com\/writable\/presentations\/file_upload\/spo2-r10_zero-touch-device-onboarding-to-iot-control-platforms.pdf"},{"key":"4_CR20","unstructured":"Shoemaker, A.: Incapsula.com (2018). \n                    https:\/\/www.incapsula.com\/blog\/how-to-identify-a-mirai-style-ddos-attack.html\n                    \n                  . Accessed 10 July 2018"},{"key":"4_CR21","unstructured":"Ics-cert.us-cert.gov: Philips IntelliSpace Cardiovascular System Vulnerability | ICS-CERT, 25 January 2018. \n                    https:\/\/ics-cert.us-cert.gov\/advisories\/ICSMA-18-025-01"},{"key":"4_CR22","unstructured":"Pennic, J.: Philips Unveils IntelliSpace Cardiovascular 2.1: 5 Things to Know, 29 August 2018. Hitconsultant.net. \n                    http:\/\/hitconsultant.net\/2016\/08\/29\/philips-unveils-intellispace-cardiovascular-2-1-10-things-know\/"},{"key":"4_CR23","unstructured":"Cwe.mitre.org: CWE - CWE-613: Insufficient Session Expiration (3.0) (2018). \n                    http:\/\/cwe.mitre.org\/data\/definitions\/613.html"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Al Alkeem, E., Yeun, C.Y., Zemerly, M.J.: Security and privacy framework for ubiquitous healthcare IoT devices. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, pp. 70\u201375 (2015)","DOI":"10.1109\/ICITST.2015.7412059"},{"key":"4_CR25","unstructured":"Mcafee.com: McAfee Labs Threats Report, June 2018. \n                    https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-quarterly-threats-jun-2018.pdf"},{"key":"4_CR26","unstructured":"Palmer, D.: After WannaCry ransomware attack, the NHS is toughening its cyber defences | ZDNet (2018). ZDNet: \n                    https:\/\/www.zdnet.com\/article\/after-wannacry-ransomware-attack-the-nhs-is-toughening-its-cyber-defences\/"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Singh, K.: What is Aadhaar card and where is it mandatory?, 27 March 2017. The Indian Express. \n                    http:\/\/indianexpress.com\/article\/what-is\/what-is-aadhaar-card-and-where-is-it-mandatory-4587547\/","DOI":"10.5120\/ijca2016912440"},{"key":"4_CR28","unstructured":"Agarwal, S.: UIDAI firewalls 5,000 officials post \u2018breach\u2019, 9 January 2018. The Economic Times. \n                    https:\/\/economictimes.indiatimes.com\/news\/politics-and-nation\/uidai-firewalls-5000-officials-postbreach\/articleshow\/62423133.cms"},{"key":"4_CR29","unstructured":"Kerk, J.: First ATM \u2018Jackpotting\u2019 Attacks Hit US, 29 January 2018. \n                    https:\/\/www.bankinfosecurity.com\/first-cases-atm-jackpotting-hit-us-a-10610"},{"key":"4_CR30","unstructured":"Regalado, D.: Criminals Hit the ATM Jackpot, 11 October 2013. \n                    https:\/\/www.symantec.com\/connect\/blogs\/criminals-hit-atm-jackpot"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Nausheen, F., Begum, S.H.: Healthcare IoT: benefits, vulnerabilities and solutions. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, pp. 517\u2013522 (2018)","DOI":"10.1109\/ICISC.2018.8399126"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Hosseinzadeh, S., Rauti, S., Hyrynsalmi, S., Lepp\u00e4nen, V.: Security in the Internet of Things through obfuscation and diversification. In: 2015 International Conference on Computing, Communication and Security (ICCCS), Pamplemousses, pp. 1\u20135 (2015)","DOI":"10.1109\/CCCS.2015.7374189"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-9942-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T13:12:57Z","timestamp":1563455577000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-9942-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811399411","9789811399428"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-9942-8_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"19 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghazibad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds0a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"621","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"112","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"-","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}