Skip to Main content Skip to Navigation
Conference papers

Detection and Response to Data Exfiltration from Internet of Things Android Devices

Abstract : Hackers can exfiltrate sensitive data stored in an IoT device such as Android smartphones. He/She abuses the Android pairing mode and targets a personal computer system previously trusted by the device user. The existing protocols that allow file transfer from Android IoT devices to the computer cannot detect this attack. In this paper, we propose an approach to detect attacks exploiting trusted relationship between a third party system such as personal computer and an Android device to exfiltrate user data from the victim device to an attacker. We implement a protocol to secure communication between IoT Android device and third party system. Our approach has been proved to be effective in detecting these category of attacks with reasonable performance overheads.
Document type :
Conference papers
Complete list of metadatas

Cited literature [16 references]  Display  Hide  Download

https://hal.inria.fr/hal-02023715
Contributor : Hal Ifip <>
Submitted on : Tuesday, February 19, 2019 - 11:29:21 AM
Last modification on : Wednesday, June 24, 2020 - 4:19:39 PM
Long-term archiving on: : Monday, May 20, 2019 - 4:18:15 PM

File

 Restricted access
To satisfy the distribution rights of the publisher, the document is embargoed until : 2021-01-01

Please log in to resquest access to the document

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Mariem Graa, Ivan Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey. Detection and Response to Data Exfiltration from Internet of Things Android Devices. 33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.339-354, ⟨10.1007/978-3-319-99828-2_24⟩. ⟨hal-02023715⟩

Share

Metrics

Record views

285