4.5 Article

Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

TapChain: A Rule Chain Recognition Model Based on Multiple Features

Keyu Jiang et al.

Summary: This paper proposes TapChain, a rule chain recognition model based on multiple features, which can accurately identify rule chains without source code. By extracting 12 features from 5 aspects of the rules, TapChain increases accuracy rate by 3.1%, recall rate by 1.4%, and achieves a precision rate of 88.2%. More accurate identification of rule chains can help in the implementation of security policies and balancing security and availability. Additionally, TapChain can identify new threats in rule chains, as shown in relevant case studies in the evaluation.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Information Systems

Context-Rich Privacy Leakage Analysis Through Inferring Apps in Smart Home IoT

Yuan Luo et al.

Summary: This study highlights the privacy risks in IoT systems and introduces a privacy leakage analysis method called ALTA, which can infer specific running applications in smart homes through IoT traffic tracking and learn rich contextual information.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Interdisciplinary Applications

IoT and digital twin enabled smart tracking for safety management

Zhiheng Zhao et al.

Summary: Modern warehousing systems for fresh and cold-keeping storage have complex operation procedures, accelerated pace, and high labour intensity, leading to hazardous working environments. This paper introduces an IoT and digital twin-enabled tracking solution framework for safety management, with an indoor safety tracking mechanism developed for real-time precise location information. A case study demonstrates the feasibility and effectiveness of the proposed techniques, showing high accuracy in detecting abnormal behavior and ensuring long-term use through adaptation.

COMPUTERS & OPERATIONS RESEARCH (2021)

Article Computer Science, Information Systems

A3ID: An Automatic and Interpretable Implicit Interference Detection Method for Smart Home via Knowledge Graph

Ding Xiao et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Construction & Building Technology

A formal methods-based Rule Verification Framework for end-user programming in campus Building Automation Systems

Hamada Ibrhim et al.

BUILDING AND ENVIRONMENT (2020)

Article Computer Science, Cybernetics

Supporting end-user debugging of trigger-action rules for IoT applications

Marco Manca et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2019)

Article Computer Science, Theory & Methods

SAFECHAIN: Securing Trigger-Action Programming From Attack Chains

Kai-Hsiang Hsu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study

Rixin Xu et al.

IEEE ACCESS (2019)

Review Computer Science, Information Systems

Static analysis of android apps: A systematic literature review

Li Li et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2017)

Article Computer Science, Theory & Methods

Rewriting modulo SMT and open system analysis

Camilo Rocha et al.

JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING (2017)

Review Computer Science, Information Systems

A Survey from the Perspective of Evolutionary Process in the Internet of Things

Feng Wang et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2015)

Article Computer Science, Theory & Methods

Software model checking

Ranjit Jhala et al.

ACM COMPUTING SURVEYS (2009)

Article Computer Science, Software Engineering

Alloy: A lightweight object modelling notation

D Jackson

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY (2002)