Burglars’ IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds

Supporting Materials

Videos

Video1:Will Message Attack on iRobot. (Section III-A)

Video2 : Impersonation Attack on Tuya Smart. (Section III-B)

Vendor Response

Response from iRobot:

Response from AWS:

Response from Microsoft:

Response from IBM on hackerone:

Response from Suning Smart Living (in Chinese ):

They rated the vulnerabilities we reported as critical, and rewarded us through their bounty program.

Response from Tuya Smart (in Chinese):

They acknowledged our findings and rewarded us for our contributions.

Response from Eclipse Mosquitto:

Response from Samsung Artik: