BurnFit: Analyzing and Exploiting Wearable Devices

Cited 0 time in webofscience Cited 9 time in scopus
  • Hit : 370
  • Download : 0
Wearable devices have recently become popular, and more and more people now buy and wear these devices to obtain health-related services. However, as wearable device technology quickly advances, its security cannot keep up with the speed of its development. As a result, it is highly likely for the devices to have severe vulnerabilities. Moreover, because these wearable devices are usually light-weight, they delegate a large portion of their operations as well as permissions to a software gateways on computers or smartphones, which put users at high risk if there are vulnerabilities in these gateways. In order to validate this claim, we analyzed three devices as a case study and found a total 17 vulnerabilities in them. We verified that an adversary can utilize these vulnerabilities to compromise the software gateway and take over a victim’s computers and smartphones. We also suggest possible mitigation to improve the security of wearable devices.
Publisher
Springer Verlag
Issue Date
2015-08-21
Language
English
Citation

16th International Workshop on Information Security Applications, WISA 2015, pp.227 - 239

DOI
10.1007/978-3-319-31875-2_19
URI
http://hdl.handle.net/10203/204385
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0