Show simple item record

dc.contributor.authorAllen, Ashley
dc.contributor.authorMylonas, Alexios
dc.contributor.authorVidalis, Stilianos
dc.contributor.authorGritzalis, Dimitris
dc.contributor.editorTalamo, Maurizio
dc.date.accessioned2024-09-10T12:00:03Z
dc.date.available2024-09-10T12:00:03Z
dc.date.issued2024-08-23
dc.identifier.citationAllen , A , Mylonas , A , Vidalis , S , Gritzalis , D & Talamo , M (ed.) 2024 , ' Security Evaluation of Companion Android Applications in IoT: The Case of Smart Security Devices ' , Sensors , vol. 24 , no. 17 , 5465 . https://doi.org/10.3390/s24175465
dc.identifier.issn1424-3210
dc.identifier.otherJisc: 2242137
dc.identifier.otherpublisher-id: sensors-24-05465
dc.identifier.otherORCID: /0000-0001-8819-5831/work/167438522
dc.identifier.urihttp://hdl.handle.net/2299/28157
dc.description© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
dc.description.abstractSmart security devices, such as smart locks, smart cameras, and smart intruder alarms are increasingly popular with users due to the enhanced convenience and new features that they offer. A significant part of this convenience is provided by the device’s companion smartphone app. Information on whether secure and ethical development practices have been used in the creation of these applications is unavailable to the end user. As this work shows, this means that users are impacted both by potential third-party attackers that aim to compromise their device, and more subtle threats introduced by developers, who may track their use of their devices and illegally collect data that violate users’ privacy. Our results suggest that users of every application tested are susceptible to at least one potential commonly found vulnerability regardless of whether their device is offered by a known brand name or a lesser-known manufacturer. We present an overview of the most common vulnerabilities found in the scanned code and discuss the shortcomings of state-of-the-art automated scanners when looking at less structured programming languages such as C and C++. Finally, we also discuss potential methods for mitigation, and provide recommendations for developers to follow with respect to secure coding practices.en
dc.format.extent19
dc.format.extent289500
dc.language.isoeng
dc.relation.ispartofSensors
dc.subjectcybersecurity
dc.subjectAndroid
dc.subjectsmart home
dc.subjectsoftware development
dc.subjectIoT
dc.subjectSAST
dc.titleSecurity Evaluation of Companion Android Applications in IoT: The Case of Smart Security Devicesen
dc.contributor.institutionCybersecurity and Computing Systems
dc.contributor.institutionDepartment of Computer Science
dc.contributor.institutionSchool of Physics, Engineering & Computer Science
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.contributor.institutionSchool of Computer Science
dc.description.statusPeer reviewed
rioxxterms.versionofrecord10.3390/s24175465
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record