which can be translated in the creation of future
security standards to be met by the toy industry.
6 CONCLUSIONS
Computer systems have been a target of cybernetic
attacks for a long time. Their association with
traditional toys has created a new type of product
called smart toy, which has also become a target for
attackers. In this paper, we presented the main
concepts and architectures behind this new
environment called toy computing and we discussed
the consequences of enlarging the attack surface by
introducing a physical toy equipped with sensors and
network communication and the vulnerabilities that
might be exploited in this scenario. The security issue
associated with the discussed scenario is aggravated
by the fact that children are the main users of this
technology and most of the time are not able to
perceive situations of risk. We thus presented an
analysis performed on the toy computing
environment using the Microsoft SDL process and its
threat modelling tool to identify the main
vulnerabilities, threats and consequently
the minimum security requirements that every smart
toy must meet, so it does not expose its users to
potentially harmful situations.
The identification of such security requirements is
important to allow the developers to plan how the
security mechanisms will be implemented during the
development life cycle of the smart toys. As each new
smart toy may have different characteristics and even
electronic components, enlarging the surface attack
and the potential threats, each new smart toy will
require a proper security requirements elicitation and
analysis in order to ensure that any new security
requirements can be identified and later included in
the general list of security requirements for smart
toys. Moreover, the security requirements identified
for toy computing can be used to derive security tests
for toy computing considering all vulnerabilities and
threats identified in different scenarios.
REFERENCES
Biswas, D., 2012. Privacy Policies Change Management for
Smartphones. In IEEE International Conference on
Pervasive Computing and Communications
Workshops, pages 70-75.
Canadian Public Works and Government Services, 2000.
Personal Information Protection and Electronic
Documents Act.
Baraniuk, C., 2016. Call for privacy probes over Cayla doll
and i-Que toys. BBC News, Technology, 6 Dec 2016.
Accessed 12 Dec 2016, available at
<http://www.bbc.com/news/technology-38222472>.
Broll, G., Hubmann, H., Prezerakos,G., Kapitsaki, G.,
Salsano, S., 2007. Modeling Context Information for
Realizing Simple Mobile Services. In Mobile and
Wireless Communications Summit, 2007. 16th IST, pp.
1-5.
Deloite, 2015. Global Mobile Consumer Survey: US
Edition - The rise of the always-connected consumer.
Accessed 22 May 2016, available at
<http:\\www.deloitte.com/us/mobileconsumer>.
Fox-Brewster, T., 2016. Hackers Could Have Turned
Vulnerable Smart Teddy Bear Into Demon Toy. Forbes,
Security, 2 Feb 2016. Accessed 08 Dec 2016, available
at
<http://www.forbes.com/sites/thomasbrewster/2016/0
2/02/fisher-price-hero-vulnerable-to-
hackers/#359130c71cfe>
GAO, 2016. United States Government Accountability
Office. Information Security – Agencies Need to
Improve Controls over Selected High-Impact Systems,
GAO-16-501. Accessed 24 May 2016, available at
<http://www.gao.gov/assets/680/677293.pdf>
Hackett, R., 2016. This FisherPrice Smart Toy Bear Had
Data-Leak Vulnerability. Fortune, Tech Internet of
Things, 2 Feb 2016. Accessed 08 Dec 2016, available
at < http://fortune.com/2016/02/02/fisher-price-smart-
toy-bear-data-leak/>
Lipner, S., 2004. The Trustworthy Computing Security
Development Lifecycle. Proceedings of the 20th
Annual Computer Security Applications Conference
(ACSAC’04), IEEE.
Mead, N., 2006. SQUARE Process. The Build Security In.
Software Engineering Institute, Carnegie Mellon
University. Accessed 03 Nov 2016, available at
<https://www.us-cert.gov/bsi/articles/best-practices/
requirements-engineering/square-process>.
Mead, N., Hough, E., Stehney, T., 2005. Security Quality
Requirements Engineering (SQUARE) Methodology.
CMU/SEI-2005-TR-009, Pittsburgh, PA: Software
Engineering Institute, Carnegie Mellon University.
Microsoft, 2011. Security Development Lifecycle, SDL
Process Guidance. Version 5.1, April 14. Accessed 24
Feb 2017, available at
<http://www.microsoft.com/sdl.>
Nagappan, M., Shihab, E., 2016. Future Trends in Software
Engineering Research for Mobile Apps. In IEEE 23rd
International Conference on Software Analysis,
Evolution, and Reengineering (SANER), Volume 5,
pages 21-32.
Newman, J. 2015. Internet-connected Hello Barbie doll can
be hacked. PCWorld, Security, News, 7 Dec 2015.
Accessed 12 Dec 2016, available at
<http://www.pcworld.com/article/3012220/security/intern
et-connected-hello-barbie-doll-can-be-hacked.html>
Ng, M., Chow, M., Salgado, A., 2015. Toys and Mobile
Applications: Current Trends and Related Privacy
Issues. Mobile Services for Toy Computing.