Intellectual Property(IP)includes ideas,innovations,methodologies,works of authorship(viz.,literary and artistic works),emblems,brands,images,etc.This property is intangible since it is pertinent to the human intellec...Intellectual Property(IP)includes ideas,innovations,methodologies,works of authorship(viz.,literary and artistic works),emblems,brands,images,etc.This property is intangible since it is pertinent to the human intellect.Therefore,IP entities are indisputably vulnerable to infringements and modifications without the owner’s consent.IP protection regulations have been deployed and are still in practice,including patents,copyrights,contracts,trademarks,trade secrets,etc.,to address these challenges.Unfortunately,these protections are insufficient to keep IP entities from being changed or stolen without permission.As for this,some IPs require hardware IP protection mechanisms,and others require software IP protection techniques.To secure these IPs,researchers have explored the domain of Intellectual Property Protection(IPP)using different approaches.In this paper,we discuss the existing IP rights and concurrent breakthroughs in the field of IPP research;provide discussions on hardware IP and software IP attacks and defense techniques;summarize different applications of IP protection;and lastly,identify the challenges and future research prospects in hardware and software IP security.展开更多
Since its launch in 2014,Amazon Echo family of devices has seen a considerable increase in adaptation in consumer homes and offices.With a market worth millions of dollars,Echo is used for diverse tasks such as access...Since its launch in 2014,Amazon Echo family of devices has seen a considerable increase in adaptation in consumer homes and offices.With a market worth millions of dollars,Echo is used for diverse tasks such as accessing online information,making phone calls,purchasing items,and controlling the smart home.Echo offers user-friendly voice interaction to automate everyday tasks making it a massive success.Though many people view Amazon Echo as a helpful assistant at home or office,few know its underlying security and privacy implications.In this paper,we present the findings of our research on Amazon Echo’s security and privacy concerns.The findings are divided into different categories by vulnerability or attacks.The proposed mitigation(s)to the vulnerabilities are also presented in the paper.We conclude that though numerous privacy concerns and security vulnerabilities associated with the device are mitigated,many vulnerabilities still need to be addressed.展开更多
文摘Intellectual Property(IP)includes ideas,innovations,methodologies,works of authorship(viz.,literary and artistic works),emblems,brands,images,etc.This property is intangible since it is pertinent to the human intellect.Therefore,IP entities are indisputably vulnerable to infringements and modifications without the owner’s consent.IP protection regulations have been deployed and are still in practice,including patents,copyrights,contracts,trademarks,trade secrets,etc.,to address these challenges.Unfortunately,these protections are insufficient to keep IP entities from being changed or stolen without permission.As for this,some IPs require hardware IP protection mechanisms,and others require software IP protection techniques.To secure these IPs,researchers have explored the domain of Intellectual Property Protection(IPP)using different approaches.In this paper,we discuss the existing IP rights and concurrent breakthroughs in the field of IPP research;provide discussions on hardware IP and software IP attacks and defense techniques;summarize different applications of IP protection;and lastly,identify the challenges and future research prospects in hardware and software IP security.
文摘Since its launch in 2014,Amazon Echo family of devices has seen a considerable increase in adaptation in consumer homes and offices.With a market worth millions of dollars,Echo is used for diverse tasks such as accessing online information,making phone calls,purchasing items,and controlling the smart home.Echo offers user-friendly voice interaction to automate everyday tasks making it a massive success.Though many people view Amazon Echo as a helpful assistant at home or office,few know its underlying security and privacy implications.In this paper,we present the findings of our research on Amazon Echo’s security and privacy concerns.The findings are divided into different categories by vulnerability or attacks.The proposed mitigation(s)to the vulnerabilities are also presented in the paper.We conclude that though numerous privacy concerns and security vulnerabilities associated with the device are mitigated,many vulnerabilities still need to be addressed.