A Comparative Reverse Engineering Analysis of Smart Pet IoT Devices

Presenter Information

Honors Capstone Project

1

Advisor(s)

Dr. Estell

Confirmation

1

Document Type

Paper

Location

ONU McIntosh Center; Activities Room

Start Date

21-4-2026 5:15 PM

End Date

21-4-2026 5:30 PM

Abstract

The rapid growth of consumer Internet of Things (IoT) devices has led to the widespread adoption of smart pet products. This project focuses on evaluating the security implementations of three such devices: a security camera used for pet monitoring that connects to a mobile application using cloud connectivity, a remote-controlled interactive cat toy that utilizes Bluetooth capabilities, and an automatic litter box that uses Wi-Fi and cloud capabilities to send data to a companion mobile app. To develop a better understanding of these devices’ communication patterns, control logic, and security assumptions, tools such as Bluetooth protocol scanners, network traffic analysis software, and mobile application inspection tools were used to identify communication flows and control mechanisms. These findings provide insight into how commercially available pet devices are designed with security in mind, exploring common design patterns, trust boundaries, and potential areas of concern.

This document is currently not available here.

Restricted

Available to ONU community via local IP address and ONU login.

Share

COinS
 
Apr 21st, 5:15 PM Apr 21st, 5:30 PM

A Comparative Reverse Engineering Analysis of Smart Pet IoT Devices

ONU McIntosh Center; Activities Room

The rapid growth of consumer Internet of Things (IoT) devices has led to the widespread adoption of smart pet products. This project focuses on evaluating the security implementations of three such devices: a security camera used for pet monitoring that connects to a mobile application using cloud connectivity, a remote-controlled interactive cat toy that utilizes Bluetooth capabilities, and an automatic litter box that uses Wi-Fi and cloud capabilities to send data to a companion mobile app. To develop a better understanding of these devices’ communication patterns, control logic, and security assumptions, tools such as Bluetooth protocol scanners, network traffic analysis software, and mobile application inspection tools were used to identify communication flows and control mechanisms. These findings provide insight into how commercially available pet devices are designed with security in mind, exploring common design patterns, trust boundaries, and potential areas of concern.