Detection and Response to Data Exfiltration from Internet of Things Android Devices - ICT Systems Security and Privacy Protection Access content directly
Conference Papers Year : 2018

Detection and Response to Data Exfiltration from Internet of Things Android Devices

Mariem Graa
  • Function : Author
  • PersonId : 1023781
Nora Cuppens-Boulahia
  • Function : Author
  • PersonId : 1023782
Frédéric Cuppens
  • Function : Author
  • PersonId : 1023783
Vincent Frey
  • Function : Author
  • PersonId : 989228

Abstract

Hackers can exfiltrate sensitive data stored in an IoT device such as Android smartphones. He/She abuses the Android pairing mode and targets a personal computer system previously trusted by the device user. The existing protocols that allow file transfer from Android IoT devices to the computer cannot detect this attack. In this paper, we propose an approach to detect attacks exploiting trusted relationship between a third party system such as personal computer and an Android device to exfiltrate user data from the victim device to an attacker. We implement a protocol to secure communication between IoT Android device and third party system. Our approach has been proved to be effective in detecting these category of attacks with reasonable performance overheads.
Fichier principal
Vignette du fichier
472722_1_En_24_Chapter.pdf (685.92 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-02023715 , version 1 (19-02-2019)

Licence

Attribution

Identifiers

Cite

Mariem Graa, Ivan Marco Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey. Detection and Response to Data Exfiltration from Internet of Things Android Devices. 33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.339-354, ⟨10.1007/978-3-319-99828-2_24⟩. ⟨hal-02023715⟩
119 View
145 Download

Altmetric

Share

Gmail Facebook X LinkedIn More