Threat Analysis of Wi-Fi Connected Dashboard Camera

Won Park, Dahee Choi, Kyung Ho Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Recently dashboard camera (dashcam) has a function of connecting Wi-Fi to a smartphone for usability. But, it has severe vulnerabilities that it doesn't have authentication process. We analyzed threats of overall functions of dashcam using Data Flow Diagram and STRIDE analysis. After that, we found that dashcam' s vulnerabilities are closely related to Wi-Fi function and lack of authentication process. We made sets of possible attacks and presented as attack trees. Attack Tree Analysis was used to categorize and prioritize among several ways of possible attacks. This research contributes to suggest vulnerabilities of a dashcam. This emphasizes the importance that information security standards of dashcam should be made and manufacturers of dashcam should apply the standards.

Original languageEnglish
Title of host publication2018 International Conference on Platform Technology and Service, PlatCon 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538647103
DOIs
Publication statusPublished - 2018 Sep 25
Event2018 International Conference on Platform Technology and Service, PlatCon 2018 - Jeju, Korea, Republic of
Duration: 2018 Jan 292018 Jan 31

Other

Other2018 International Conference on Platform Technology and Service, PlatCon 2018
CountryKorea, Republic of
CityJeju
Period18/1/2918/1/31

Fingerprint

Wi-Fi
Cameras
Authentication
Smartphones
Security of data

Keywords

  • Attack Tree
  • Dashboard Camera
  • Data Flow Diagram
  • STRIDE
  • Threat Analysis
  • Wi-Fi vulnerability

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Hardware and Architecture
  • Computer Networks and Communications
  • Computer Science Applications

Cite this

Park, W., Choi, D., & Lee, K. H. (2018). Threat Analysis of Wi-Fi Connected Dashboard Camera. In 2018 International Conference on Platform Technology and Service, PlatCon 2018 [8472768] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/PlatCon.2018.8472768

Threat Analysis of Wi-Fi Connected Dashboard Camera. / Park, Won; Choi, Dahee; Lee, Kyung Ho.

2018 International Conference on Platform Technology and Service, PlatCon 2018. Institute of Electrical and Electronics Engineers Inc., 2018. 8472768.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Park, W, Choi, D & Lee, KH 2018, Threat Analysis of Wi-Fi Connected Dashboard Camera. in 2018 International Conference on Platform Technology and Service, PlatCon 2018., 8472768, Institute of Electrical and Electronics Engineers Inc., 2018 International Conference on Platform Technology and Service, PlatCon 2018, Jeju, Korea, Republic of, 18/1/29. https://doi.org/10.1109/PlatCon.2018.8472768
Park W, Choi D, Lee KH. Threat Analysis of Wi-Fi Connected Dashboard Camera. In 2018 International Conference on Platform Technology and Service, PlatCon 2018. Institute of Electrical and Electronics Engineers Inc. 2018. 8472768 https://doi.org/10.1109/PlatCon.2018.8472768
Park, Won ; Choi, Dahee ; Lee, Kyung Ho. / Threat Analysis of Wi-Fi Connected Dashboard Camera. 2018 International Conference on Platform Technology and Service, PlatCon 2018. Institute of Electrical and Electronics Engineers Inc., 2018.
@inproceedings{271775e4d79b45558b354d5b0fef2f2e,
title = "Threat Analysis of Wi-Fi Connected Dashboard Camera",
abstract = "Recently dashboard camera (dashcam) has a function of connecting Wi-Fi to a smartphone for usability. But, it has severe vulnerabilities that it doesn't have authentication process. We analyzed threats of overall functions of dashcam using Data Flow Diagram and STRIDE analysis. After that, we found that dashcam' s vulnerabilities are closely related to Wi-Fi function and lack of authentication process. We made sets of possible attacks and presented as attack trees. Attack Tree Analysis was used to categorize and prioritize among several ways of possible attacks. This research contributes to suggest vulnerabilities of a dashcam. This emphasizes the importance that information security standards of dashcam should be made and manufacturers of dashcam should apply the standards.",
keywords = "Attack Tree, Dashboard Camera, Data Flow Diagram, STRIDE, Threat Analysis, Wi-Fi vulnerability",
author = "Won Park and Dahee Choi and Lee, {Kyung Ho}",
year = "2018",
month = "9",
day = "25",
doi = "10.1109/PlatCon.2018.8472768",
language = "English",
booktitle = "2018 International Conference on Platform Technology and Service, PlatCon 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Threat Analysis of Wi-Fi Connected Dashboard Camera

AU - Park, Won

AU - Choi, Dahee

AU - Lee, Kyung Ho

PY - 2018/9/25

Y1 - 2018/9/25

N2 - Recently dashboard camera (dashcam) has a function of connecting Wi-Fi to a smartphone for usability. But, it has severe vulnerabilities that it doesn't have authentication process. We analyzed threats of overall functions of dashcam using Data Flow Diagram and STRIDE analysis. After that, we found that dashcam' s vulnerabilities are closely related to Wi-Fi function and lack of authentication process. We made sets of possible attacks and presented as attack trees. Attack Tree Analysis was used to categorize and prioritize among several ways of possible attacks. This research contributes to suggest vulnerabilities of a dashcam. This emphasizes the importance that information security standards of dashcam should be made and manufacturers of dashcam should apply the standards.

AB - Recently dashboard camera (dashcam) has a function of connecting Wi-Fi to a smartphone for usability. But, it has severe vulnerabilities that it doesn't have authentication process. We analyzed threats of overall functions of dashcam using Data Flow Diagram and STRIDE analysis. After that, we found that dashcam' s vulnerabilities are closely related to Wi-Fi function and lack of authentication process. We made sets of possible attacks and presented as attack trees. Attack Tree Analysis was used to categorize and prioritize among several ways of possible attacks. This research contributes to suggest vulnerabilities of a dashcam. This emphasizes the importance that information security standards of dashcam should be made and manufacturers of dashcam should apply the standards.

KW - Attack Tree

KW - Dashboard Camera

KW - Data Flow Diagram

KW - STRIDE

KW - Threat Analysis

KW - Wi-Fi vulnerability

UR - http://www.scopus.com/inward/record.url?scp=85055667785&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85055667785&partnerID=8YFLogxK

U2 - 10.1109/PlatCon.2018.8472768

DO - 10.1109/PlatCon.2018.8472768

M3 - Conference contribution

AN - SCOPUS:85055667785

BT - 2018 International Conference on Platform Technology and Service, PlatCon 2018

PB - Institute of Electrical and Electronics Engineers Inc.

ER -