Presenter Information

Anna MillerhagenFollow

Abstract

Infiltrating Cloud Storage of IoT devices using Ransomware

Anna Millerhagen

Computer science Department

Advisor: Eric Wright

Security is necessary for all areas of computer science. The expanding world of IT is IoT devices. There are many smart devices in our daily lives such as smart speakers, smart light bulbs, smart watches, doorbell cams, security systems, smart smoke alarms, smart cars, and many more. The need for security in these devices is critical. Any one of these devices could be the weak link to a security breach. These devices are all enabled and communicate through cloud services. They interact with various devices from different vendors all operating to provide the user with the best possible experience. The cloud authentication between devices could lead to a possible inflatable vulnerability. This paper explores the possible weakness and seeks to exploit them to understand the how to better prevent the attacks in the future. The aim of this paper is to infiltrate a device with known security weaknesses and access the cloud through the weak device. Then the final process would be to access a more secure device that holds more user data through the previously infiltrated cloud. This process proved unsuccessful.

College

College of Science & Engineering

Department

Computer Science

Breakout Room

21

Start Date

4-14-2021 3:00 PM

End Date

4-14-2021 3:45 PM

Presentation Type

Video (Live-Zoom)

Share

COinS
 
Apr 14th, 3:00 PM Apr 14th, 3:45 PM

Infiltrating Cloud Storage of IoT devices using Ransomware

Infiltrating Cloud Storage of IoT devices using Ransomware

Anna Millerhagen

Computer science Department

Advisor: Eric Wright

Security is necessary for all areas of computer science. The expanding world of IT is IoT devices. There are many smart devices in our daily lives such as smart speakers, smart light bulbs, smart watches, doorbell cams, security systems, smart smoke alarms, smart cars, and many more. The need for security in these devices is critical. Any one of these devices could be the weak link to a security breach. These devices are all enabled and communicate through cloud services. They interact with various devices from different vendors all operating to provide the user with the best possible experience. The cloud authentication between devices could lead to a possible inflatable vulnerability. This paper explores the possible weakness and seeks to exploit them to understand the how to better prevent the attacks in the future. The aim of this paper is to infiltrate a device with known security weaknesses and access the cloud through the weak device. Then the final process would be to access a more secure device that holds more user data through the previously infiltrated cloud. This process proved unsuccessful.

 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.