Burglars’ IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds
Supporting Materials
Videos
Videos
Video1:Will Message Attack on iRobot. (Section III-A)
Video2 : Impersonation Attack on Tuya Smart. (Section III-B)
Vendor Response
Vendor Response
Response from iRobot:
Response from AWS:
Response from Microsoft:
Response from IBM on hackerone:
Response from Suning Smart Living (in Chinese ):
They rated the vulnerabilities we reported as critical, and rewarded us through their bounty program.
Response from Tuya Smart (in Chinese):
They acknowledged our findings and rewarded us for our contributions.
Response from Eclipse Mosquitto:
Response from Samsung Artik: