Skip to the content.

Logo

For this category of connected devices, the feature tests were divided into four categories, covering the different stages of the interaction of a user with the device and the possible security and privacy adjustments that can be made. Thus, we focus the study on common configuration aspects, and actions that a person can perform on the devices.

(Back Testing)

Logo

(Back Testing)

Logo

The analysis has shown that protection of minor users through simple and quick settings is practically non-existent in the tested conditions (device versions, app versions and mobile device to which they have been paired). In all cases it is necessary to go through the full set of device settings, even needing to switch between different configuration menus, to disable all features that may be unsafe for an unsupervised minor user. It was found that in many cases, restricted device settings affect all users equally, leaving features unusable for all members of the household, which is impractical and does not encourage users to establish these restrictions.

With respect to SPA authentication systems, it has been found that they can be compromised by the lack of protection measures against commands originated by an artificial source, that make the devices vulnerable to impersonation attacks.

Finally, a wireless speaker has been tested by means of a DoS attack supported by a portable device (Raspberry Pi 4 model B). This test shows that, in addition to being susceptible to more complex attacks such as KNOB or BIAS, it is possible to disconnect said device from its master. In this way, by creating false device identities, it would be possible to connect the master to a fake device, which will be used as an access vector for the attacker.

(Back Testing)