Security and Privacy Analyses of Internet of Things Children's Toys

Preprint English OPEN
Chu, Gordon; Apthorpe, Noah; Feamster, Nick;
(2018)

This paper investigates the security and privacy of Internet-connected children's smart toys through case studies of three commercially-available products. We conduct network and application vulnerability analyses of each toy using static and dynamic analysis techniques... View more
  • References (28)
    28 references, page 1 of 3

    [1] Aldo Cortesi. [n. d.]. mitmproxy. ([n. d.]). https://mitmproxy.org

    [2] Brian Barrett. 2017. Don't get your kid an internet-connected toy. (2017). https: //www.wired.com/story/dont-gift-internet-connected-toys/

    [3] Federal Trade Commission. 1998. Children's Online Privacy Protection Rule ("COPPA"). (1998). https://www.ftc.gov/ enforcement/rules/rulemaking-regulatory-reform-proceedings/ childrens-online-privacy-protection-rule

    [4] Federal Trade Commission. 2018. Electronic Toy Maker VTech Settles FTC Allegations That it Violated Children's Privacy Law and the FTC Act. (2018). https://www.ftc.gov/news-events/press-releases/2018/01/ electronic-toy-maker-vtech-settles-ftc-allegations-it-violated

    [5] Daniel Cooper. 2017. Researchers find another smart toy that's easy to hack. (2017). https://www.engadget.com/2017/12/08/ teksta-toucan-can-listen-to-kids-researchers-security/

    [6] Lorenzo Franceschi-Bicchierai. 2017. Internet of Things Teddy Bear Leaked 2 Million Parent and Kids Message Recordings. (2017). https://motherboard.vice.com/en_us/article/pgwean/ internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings

    [7] Samuel Gibbs. 2015. Hackers can hijack Wi-Fi Hello Barbie to spy on your children. (November 2015). https://www.theguardian.com/technology/2015/ nov/26/hackers-can-hijack-wi-fi-hello-barbie-to-spy-on-your-children [Online; posted 15-Nov-2016].

    [8] Gordon Lyon (Fyodor). [n. d.]. nmap. ([n. d.]). https://nmap.org

    [9] Jefrey Haynes, Maribette Ramirez, Thaier Hayajneh, and Md Zakirul Alam Bhuiyan. 2017. A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration. In International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. Springer, 581-592.

    [10] Patrick CK Hung, Farkhund Iqbal, Shih-Chia Huang, Mohammed Melaisi, and Kevin Pang. 2016. A glance of child's play privacy in smart toys. In International Conference on Cloud Computing and Security. Springer, 217-231.

  • Related Research Results (1)
  • Similar Research Results (1)
  • Related Organizations (4)
  • Metrics
Share - Bookmark