{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:05:25Z","timestamp":1773194725757,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsacw69556.2025.00066","type":"proceedings-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:56:13Z","timestamp":1773086173000},"page":"569-578","source":"Crossref","is-referenced-by-count":0,"title":["Systematic evaluation of security attacks to household consumer smart doorbells"],"prefix":"10.1109","author":[{"given":"Ashley Mark","family":"Brown","sequence":"first","affiliation":[{"name":"University College London,London,United Kingdom"}]},{"given":"Nilufer","family":"Tuptuk","sequence":"additional","affiliation":[{"name":"University College London,London,United Kingdom"}]},{"given":"Enrico","family":"Mariconti","sequence":"additional","affiliation":[{"name":"University College London,London,United Kingdom"}]},{"given":"Shane D","family":"Johnson","sequence":"additional","affiliation":[{"name":"University College London,London,United Kingdom"}]}],"member":"263","reference":[{"key":"ref1","article-title":"One in 5 Brits now have a video doorbell in home security tech boom","author":"Carey","year":"2022"},{"key":"ref2","article-title":"Family threatened after their smart doorbell is hacked","author":"Griffiths","year":"2020"},{"key":"ref3","article-title":"Securing home security","year":"2024"},{"key":"ref4","article-title":"A systematic review on crimes facilitated by consumer internet of things devices","author":"Brown","year":"2025"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0004"},{"key":"ref6","article-title":"Consumer IoT Cybersecurity","year":"2025"},{"key":"ref7","volume-title":"Explanatory memorandum to the product security and telecommunications infrastructure (security requirements for relevant connectable products)","year":"2024"},{"key":"ref8","volume-title":"Government to strengthen security of internet-connected products","author":"Warman","year":"2020"},{"key":"ref9","article-title":"Smart doorbell security issues","year":"2020"},{"key":"ref10","article-title":"Security flaws in smart doorbells may open the door to hackers","author":"Folt\u00fdn","year":"2020"},{"key":"ref11","article-title":"The smart video doorbells letting hackers into your home","author":"Pratt"},{"key":"ref12","article-title":"CVE-2019-9483 Detail","year":"2019"},{"key":"ref13","article-title":"Update Amazon Now\u20143 Dangerous Security Vulnerabilities Hit The Cloud","author":"Winder","year":"2024"},{"key":"ref14","article-title":"Bitdefender Finds Ring Doorbell Vulnerability that Exposes User\u2019s Wi-Fi Password","volume-title":"Hot for Security","author":"Stahie","year":"2019"},{"key":"ref15","article-title":"Rip Off Britain - Security flaw in Amazon\u2019s Ring doorbells exposed","year":"2025"},{"key":"ref16","article-title":"Ethical hacking of a ring doorbell","author":"P\u00e9tursson","year":"2023"},{"key":"ref17","article-title":"Man charged over","author":"Mohan-Hickson","year":"2024"},{"key":"ref18","first-page":"435","article-title":"I don\u2019t own the data: End User Perceptions of Smart Home Device Data Practices and Risks","volume-title":"Fifteenth symposium on usable privacy and security (SOUPS 2019), Conference Proceedings","author":"Tabassum"},{"key":"ref19","volume-title":"Neighbour CCTV harassment and data protection claim succeeds","year":"2021"},{"key":"ref20","article-title":"LAPD warns residents after spike in burglaries using Wi-Fi jammers that disable security cameras, smart doorbells. Tom\u2019s Hardware","author":"Tyson","year":"2024"},{"key":"ref21","volume-title":"Secure by design","year":"2019"},{"key":"ref22","article-title":"The UK Product Security and Telecommunications Infrastructure (Product Security) regime","year":"2023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2024.106009"},{"key":"ref24","article-title":"H.R.1668 - 116th Congress (2019-2020): IoT Cybersecurity Improvement Act of 2020","author":"Kelly","year":"2020"},{"key":"ref25","article-title":"NIST Cybersecurity for IoT Program","year":"2019"},{"key":"ref26","article-title":"The Personal Information Protection and Electronic Documents Act (PIPEDA)","year":"2021"},{"key":"ref27","volume-title":"IoT Regulatory Framework - National Telecom Regulatory Authority","year":"2023"},{"key":"ref28","article-title":"Code of Practice for Securing Consumer Internet of Things (IoT)","year":"2021"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/23311886.2022.2029249"},{"key":"ref30","article-title":"Owasp Top 10","author":"\u0160kofic","year":"2012"},{"key":"ref31","volume-title":"A0xnirudh\/WebXploiter: WebXploiter - an OWASP top 10 security scanner!"},{"key":"ref32","article-title":"Why Raspberry Pi is a Recommended Tool for Aspiring Hackers","author":"Thomas","year":"2023"},{"key":"ref33","article-title":"Modern DDoS Attacks and Defences\u2013Survey","author":"Burgess","year":"2022"},{"key":"ref34","first-page":"29","article-title":"Comparative analysis of password cracking tools","volume":"1","author":"Zulkafli","year":"2024","journal-title":"Progress in Computer and Mathematics Journal (PCMJ)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz005"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.2172\/967712"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2972774"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-018-0396-1"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795501"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2024.01505136"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3711117"}],"event":{"name":"2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,9]]}},"container-title":["2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11417955\/11417996\/11418013.pdf?arnumber=11418013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:28:27Z","timestamp":1773120507000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11418013\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/acsacw69556.2025.00066","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}