A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
If This Then What?
2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18
IoT apps empower users by connecting a variety of otherwise unconnected services. These apps (or applets) are triggered by external information sources to perform actions on external information sinks. We demonstrate that the popular IoT app platforms, including IFTTT (If This Then That), Zapier, and Microsoft Flow are susceptible to attacks by malicious applet makers, including stealthy privacy attacks to exfiltrate private photos, leak user location, and eavesdrop on user input to
doi:10.1145/3243734.3243841
dblp:conf/ccs/BastysBS18
fatcat:voeddsb5zndsjk3rphygofpvsa