Presenter Information

Anna MillerhagenFollow

Abstract

Infiltrating Cloud Storage of IoT devices using Ransomware

Anna Millerhagen

Computer science Department

Advisor: Eric Wright

Security is necessary for all areas of computer science. The expanding world of IT is IoT devices. There are many smart devices in our daily lives such as smart speakers, smart light bulbs, smart watches, doorbell cams, security systems, smart smoke alarms, smart cars, and many more. The need for security in these devices is critical. Any one of these devices could be the weak link to a security breach. These devices are all enabled and communicate through cloud services. They interact with various devices from different vendors all operating to provide the user with the best possible experience. The cloud authentication between devices could lead to a possible inflatable vulnerability. This paper explores the possible weakness and seeks to exploit them to understand the how to better prevent the attacks in the future. The aim of this paper is to infiltrate a device with known security weaknesses and access the cloud through the weak device. Then the final process would be to access a more secure device that holds more user data through the previously infiltrated cloud. This process proved unsuccessful.

College

College of Science & Engineering

Department

Computer Science

Breakout Room

21

Start Date

4-14-2021 3:00 PM

End Date

4-14-2021 3:45 PM

Presentation Type

Video (Live-Zoom)

Share

COinS
 
Apr 14th, 3:00 PM Apr 14th, 3:45 PM

Infiltrating Cloud Storage of IoT devices using Ransomware

Infiltrating Cloud Storage of IoT devices using Ransomware

Anna Millerhagen

Computer science Department

Advisor: Eric Wright

Security is necessary for all areas of computer science. The expanding world of IT is IoT devices. There are many smart devices in our daily lives such as smart speakers, smart light bulbs, smart watches, doorbell cams, security systems, smart smoke alarms, smart cars, and many more. The need for security in these devices is critical. Any one of these devices could be the weak link to a security breach. These devices are all enabled and communicate through cloud services. They interact with various devices from different vendors all operating to provide the user with the best possible experience. The cloud authentication between devices could lead to a possible inflatable vulnerability. This paper explores the possible weakness and seeks to exploit them to understand the how to better prevent the attacks in the future. The aim of this paper is to infiltrate a device with known security weaknesses and access the cloud through the weak device. Then the final process would be to access a more secure device that holds more user data through the previously infiltrated cloud. This process proved unsuccessful.