Completed
Deep Cause for phantom device attack
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Interactions involved in Smart Home Platform
- 3 Example 1- Phantom Device Substitution Attack
- 4 Deep Cause for phantom device attack
- 5 Analyzing the Deep Cause
- 6 Analyzing the Interaction
- 7 Challenge 1: Decrypting the Interaction
- 8 State Machines of Three Entities
- 9 Identifying Unexpected State Transitions
- 10 Flaw 1: Insufficient State Guard
- 11 Identified Attacks
- 12 Flaw 2 illegal State Combination
- 13 Example 2: Phantom Device Hijacking Attack
- 14 Mitigation Suggestions
- 15 State Machine Enforcement
- 16 Conclusion