Related references
Note: Only part of the references are listed.Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective
Luis Puche Rondon et al.
AD HOC NETWORKS (2022)
Man-in-the-middle attack against cyber-physical systems under random access protocol
Xiao-Guang Zhang et al.
INFORMATION SCIENCES (2021)
Friendly Fire: Cross-app Interactions in IoT Platforms
Musard Balliu et al.
ACM TRANSACTIONS ON PRIVACY AND SECURITY (2021)
Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms
Kulani Mahadewa et al.
ISSTA '21: PROCEEDINGS OF THE 30TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS (2021)
Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem
Christopher Lentzsch et al.
28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021) (2021)
IoTSAFE: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery
Wenbo Ding et al.
28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021) (2021)
A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications
Amit Kumar Sikder et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)
A survey on data provenance in IoT
Rui Hu et al.
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2020)
An inaudible voice attack to context-based device authentication in smart IoT systems
Jian Mao et al.
JOURNAL OF SYSTEMS ARCHITECTURE (2020)
A Prospect Theoretic Approach for Trust Management in IoT Networks Under Manipulation Attacks
Mehrdad Salimitari et al.
ACM TRANSACTIONS ON SENSOR NETWORKS (2020)
A Time-efficient Multi-Protocol Probe Scheme for Fine-grain IoT Device Identification
Dan Yu et al.
SENSORS (2020)
Short Frame Structure Optimization for Industrial IoT with Heterogeneous Traffic and Shared Pilot
Jie Cao et al.
2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) (2020)
SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves
Qiben Yan et al.
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020) (2020)
Research and Application of Anomaly Detection of Industrial Control System Based on Improved Zoe Algorithm
Xin Xie et al.
CYBERSPACE SAFETY AND SECURITY, PT I (2020)
IOTGAZE: IoT Security Enforcement via Wireless Context Analysis
Tianbo Gu et al.
IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (2020)
Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds
Yan Jia et al.
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) (2020)
Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling
Haotian Chi et al.
2020 50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2020) (2020)
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
Mohammed Ali Al-Garadi et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication
Samuel Marchal et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2019)
Securing IoT Apps
Musard Balliu et al.
IEEE SECURITY & PRIVACY (2019)
SAFECHAIN: Securing Trigger-Action Programming From Attack Chains
Kai-Hsiang Hsu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
A Systematic Review for Smart City Data Analytics
Vaia Moustaka et al.
ACM COMPUTING SURVEYS (2019)
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey
Jehad M. Hamamreh et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
AutoTap: Synthesizing and Repairing Trigger-Action Programs Using LTL Properties
Lefan Zhang et al.
2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019) (2019)
Misbinding Attacks on Secure Device Pairing and Bootstrapping
Mohit Sethi et al.
PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19) (2019)
Vision: Exploring Challenges and Opportunities for Usable Authentication in the Smart Home
Sarah Prange et al.
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW) (2019)
Achieving Consistency of Software Updates against Strong Attackers
Lamya Abdullah et al.
THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019) (2019)
Charting the Attack Surface of Trigger-Action IoT Platforms
Qi Wang et al.
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
Nan Zhang et al.
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)
HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices
T. J. OConnor et al.
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19) (2019)
DeviceMien: Network Device Behavior Modeling for Identifying Unknown IoT Devices
Jorge Ortiz et al.
PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION (IOTDI '19) (2019)
How Users Interpret Bugs in Trigger-Action Programming
Will Brackenbury et al.
CHI 2019: PROCEEDINGS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2019)
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT
Seyed Farhad Aghili et al.
JOURNAL OF SUPERCOMPUTING (2018)
Distributed attack detection scheme using deep learning approach for Internet of Things
Abebe Abeshu Diro et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
IoT Goes Nuclear: Creating a Zigbee Chain Reaction
Eyal Ronen et al.
IEEE SECURITY & PRIVACY (2018)
A survey on communication components for IoT-based technologies in smart homes
A. A. Zaidan et al.
TELECOMMUNICATION SYSTEMS (2018)
An overview of potential authentication threats and attacks on Internet of Things(IoT): A focus on Smart home applications.
Attlee M. Gamundani et al.
IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY (2018)
WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment
Yan Meng et al.
PROCEEDINGS OF THE 2018 THE NINETEENTH INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING (MOBIHOC '18) (2018)
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic
Wei Zhang et al.
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)
On the Safety of IoT Device Physical Interaction Control
Wenbo Ding et al.
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)
BF-IoT: Securing the IoT Networks via Fingerprinting-based Device Authentication
Tianbo Gu et al.
2018 IEEE 15TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS) (2018)
IOTSAN: Fortifying the Safety of IoT Systems
Dang Tu Nguyen et al.
CONEXT'18: PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (2018)
A statistical unsupervised method against false data injection attacks: A visualization-based approach
Mostafa Mohammadpourfard et al.
EXPERT SYSTEMS WITH APPLICATIONS (2017)
Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges
Yiliang Liu et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)
Internet of Things security: A survey
Fadele Ayotunde Alaba et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
Network Traffic Classifier With Convolutional and Recurrent Neural Networks for Internet of Things
Manuel Lopez-Martin et al.
IEEE ACCESS (2017)
Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System
Zhen Ling et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
DolphinAttack: Inaudible Voice Commands
Guoming Zhang et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting
Zain Shamsi et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
Secure Smart Homes: Opportunities and Challenges
Jordi Mongay Batalla et al.
ACM COMPUTING SURVEYS (2017)
Software-Defined Edge Defense Against IoT-Based DDoS
Mert Ozcelik et al.
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT) (2017)
ContexIoT: Towards Providing Contextual Integrity to Appified IoT Platforms
Yunhan Jack Jia et al.
24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017) (2017)
Continuous Authentication for Voice Assistants
Huan Feng et al.
PROCEEDINGS OF THE 23RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM '17) (2017)
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis
Claude Fachkha et al.
24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017) (2017)
Secure Firmware Validation and Update for Consumer Devices in Home Networking
Byung-Chul Choi et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2016)
A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends
Yulong Zou et al.
PROCEEDINGS OF THE IEEE (2016)
Smart-Phones Attacking Smart-Homes
Vijay Sivaraman et al.
PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16) (2016)
Security Analysis of Emerging Smart Home Applications
Earlence Fernandes et al.
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)
Extended Functionality Attacks on IoT Devices: The Case of Smart Lights (Invited Paper)
Eyal Ronen et al.
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (2016)
Smart Locks: Lessons for Securing Commodity Internet of Things Devices
Grant Ho et al.
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
Security, privacy and trust in Internet of Things: The road ahead
S. Sicari et al.
COMPUTER NETWORKS (2015)
An end-to-end secure key management protocol for e-health applications
Mohammed Riyadh Abdmeziem et al.
COMPUTERS & ELECTRICAL ENGINEERING (2015)
A lightweight attribute-based encryption scheme for the Internet of Things
Xuanxia Yao et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
Ala Al-Fuqaha et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)
Garage Door Openers: An Internet of Things Case Study
Jonathan Margulies
IEEE SECURITY & PRIVACY (2015)
An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems
Qi Xiong et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures
Nikos Komninos et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Information Flow Control for Secure Cloud Computing
Jean Bacon et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2014)
A Survey on Near Field Communication (NFC) Technology
Vedat Coskun et al.
WIRELESS PERSONAL COMMUNICATIONS (2013)
Stacking the Deck Attack on Software Updates: Solution by Distributed Recommendation of Testers
Khalid Alhamed et al.
2013 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON INTELLIGENT AGENT TECHNOLOGY (IAT 2013) (2013)
Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) AttacksE
Shadi Esnaashari et al.
2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA) (2013)
Secure Communication Over Parallel Relay Channel
Zohaib Hassan Awan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)
Physical Layer Authentication over MIMO Fading Wiretap Channels
Paolo Baracca et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2012)
A survey on security issues in service delivery models of cloud computing
S. Subashini et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)
Software model checking
Ranjit Jhala et al.
ACM COMPUTING SURVEYS (2009)
A Survey on Jamming Attacks and Countermeasures in WSNs
Aristides Mpitziopoulos et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2009)
Using the physical layer for wireless authentication in time-variant channels
Liang Xiao et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2008)