toys can be overlooked in the rush to market them and
to make them easy to use”. In fact, many of the repor-
ted flaws could have been avoided by fulfilling simple
requirements and following a process to test each se-
curity requirement.
Therefore, however theoretical, we believe the se-
curity requirements presented in this work along with
the security analysis and tests might be useful not
only for well known manufacturers, but also for re-
searchers and developers who aim at creating reliable
smart toys for many purposes, such as the case of the
EDUCERE, the smart toy designed to help detecting
delays in children’s psychomotor development.
As future work, we intend to build a prototype of a
smart toy to concretely implement all tests proposed
for this context. Moreover, we plan to identify spe-
cific security patterns and flaws that arises from toy
computing architectures.
REFERENCES
Baraniuk., C. (2016). Bbc news. call for privacy probes over
cayla doll and i-que toys.
Biswas, D. (2012). Privacy policies change management
for smartphones. In 2012 IEEE International Confe-
rence on Pervasive Computing and Communications
Workshops, pages 70–75.
Carr, J. (2017). The internet of toys – the impact on children
of a connected environment. Journal of Cyber Policy,
2(2):227–231.
Cuthbertson, A. (2017). Newsweek. internet-connected
teddy bear leaks 2 million voice recordings of parents
and children.
de Carvalho, L. G. and Eler, M. M. (2017). Security requi-
rements for smart toys. In ICEIS 2017 - Proceedings
of the 19th International Conference on Enterprise In-
formation Systems, volume 2, pages 144–154.
Dobbins, D. L. (2015). Analysis of Security Concerns and
Privacy Risks of Children’s Smart Toys. PhD thesis,
Washington University St. Louis, MO, USA.
FBI (2017). Federal bureau of investigation - consumer
notice: Internet-connected toys could present privacy
and contact concerns for children.
Franceschi-Bicchierai, L. (2016). Motherboard. hacked toy
company vtech’s tos now says it’s not liable for hacks.
Guti
´
errez Garc
´
ıa, A. M., Mart
´
ın Ruiz, L. M., Rivera, D.,
Vadillo, L., and Valero Duboy, A. M. (2017). A smart
toy to enhance the decision-making process at child-
ren’s psychomotor delay screenings: A pilot study. J
Med Internet Res, 19(5):e171.
Hackett, R. (2016). Fortune. this fisher-price smart toy bear
had data-leak vulnerability.
Hung, P. C. K., Iqbal, F., Huang, S.-C., Melaisi, M., and
Pang, K. (2016). A Glance of Child’s Play Privacy
in Smart Toys, pages 217–231. Springer International
Publishing, Cham.
Jones, M. L. and Meurer, K. (2016). Can (and should)
hello barbie keep a secret? In 2016 IEEE Interna-
tional Symposium on Ethics in Engineering, Science
and Technology (ETHICS), pages 1–6.
Kara, N., Aydin, C. C., and Cagiltay, K. (2013). Investi-
gating the activities of children toward a smart story-
telling toy. Journal of Educational Technology & So-
ciety, 16(1):28–43.
Lipner, S. (2004). The trustworthy computing security
development lifecycle. In Proceedings of the 20th
Annual Computer Security Applications Conference,
ACSAC’04, pages 2–13, Washington, DC, USA.
IEEE Computer Society.
McReynolds, E., Hubbard, S., Lau, T., Saraf, A., Cakmak,
M., and Roesner, F. (2017). Toys that listen: A study
of parents, children, and internet-connected toys. In
Proceedings of the 2017 CHI Conference on Human
Factors in Computing Systems, CHI ’17, pages 5197–
5207, New York, NY, USA. ACM.
Microsoft (2010). Simplified implementation of the micro-
soft sdl.
Nagappan, M. and Shihab, E. (2016). Future trends in
software engineering research for mobile apps. In
2016 IEEE 23rd International Conference on Soft-
ware Analysis, Evolution, and Reengineering (SA-
NER), volume 5, pages 21–32.
Newman, J. (2015). Pc world. internet-connected hello bar-
bie doll can be hacked.
Ng, G., Chow, M., and Salgado, A. d. L. (2015). Toys and
Mobile Applications: Current Trends and Related Pri-
vacy Issues, pages 51–76. Springer International Pu-
blishing, Cham.
OWASP (2013). Owasp testing guide 4.0.
OWASP (2017). Open web application security project
(owasp) homepage - source code analysis tools.
Poulter, S. (2017). Daily mail - science and tech. how safe is
your child? best-selling smart toys have worrying se-
curity failures that let strangers talk to your little ones
without your knowledge.
Rafferty, L. and Hung, P. C. K. (2015). Introduction to Toy
Computing, pages 1–7. Springer International Publis-
hing, Cham.
Rafferty, L., Hung, P. C. K., Fantinato, M., Peres, S. M., Iq-
bal, F., Kuo, S.-Y., and Huang, S.-C. (2017a). Towards
a Privacy Rule Conceptual Model for Smart Toys, pa-
ges 85–102. Springer International Publishing, Cham.
Rafferty, L., Iqbal, F., and Hung, P. C. K. (2017b). A Se-
curity Threat Analysis of Smart Home Network with
Vulnerable Dynamic Agents, pages 127–147. Sprin-
ger International Publishing, Cham.
Taylor, E. and Michael, K. (2016). Smart toys that are the
stuff of nightmares [editorial]. IEEE Technology and
Society Magazine, 35(1):8–10.
Yankson, B., Iqbal, F., and Hung, P. C. K. (2017). Pri-
vacy Preservation Framework for Smart Connected
Toys, pages 149–164. Springer International Publis-
hing, Cham.
Zapata, B. C., Ni
˜
nirola, A. H., Fern
´
andez-Alem
´
an, J. L.,
and Toval, A. (2014). Assessing the privacy policies in
mobile personal health records. In 2014 36th Annual
International Conference of the IEEE Engineering in
Medicine and Biology Society, pages 4956–4959.
ICEIS 2018 - 20th International Conference on Enterprise Information Systems
120