A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
BurnFit: Analyzing and Exploiting Wearable Devices
[chapter]
2016
Lecture Notes in Computer Science
Wearable devices have recently become popular, and more and more people now buy and wear these devices to obtain health-related services. However, as wearable device technology quickly advances, its security cannot keep up with the speed of its development. As a result, it is highly likely for the devices to have severe vulnerabilities. Moreover, because these wearable devices are usually light-weight, they delegate a large portion of their operations as well as permissions to a software
doi:10.1007/978-3-319-31875-2_19
fatcat:drt44ue7tjeu3gij2tyn4k5xq4