"Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills.
Dan SuJiqiang LiuSencun ZhuXiaoyang WangWei WangPublished in: CoRR (2020)
Keyphrases
- security issues
- information security
- privacy concerns
- security risks
- security mechanisms
- data privacy
- security threats
- privacy preserving
- security vulnerabilities
- security concerns
- sensitive information
- private information
- preserving privacy
- private data
- privacy preserving data mining
- privacy issues
- personal information
- security and privacy issues
- security problems
- personal data
- data security
- sensitive data
- countermeasures
- privacy preservation
- statistical databases
- security services
- cloud computing
- network security
- security properties
- intrusion detection
- information systems
- security requirements
- access control
- privacy requirements
- smart card
- protection mechanisms
- security policies
- security measures
- confidential information
- individual privacy
- buffer overflow
- resource constrained
- identity management
- distributed data
- cyber security
- security breaches
- data sharing
- outsourced databases
- biometric template
- security patterns
- rfid systems
- authentication protocol
- security protocols
- privacy protection