4.5 Article

Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions

期刊

COMPUTERS & SECURITY
卷 120, 期 -, 页码 -

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2022.102812

关键词

Internet of things; IFTTT; Smartthings; Trigger-Action Programming; TAP security

资金

  1. National Natural Science Foundation of China [61701190]
  2. National Key Research and Development Plan of China [2017YFA0604500]
  3. Science and Technology Development Plan of Jilin Province of China
  4. Project of Jilin Province Development and Reform Commission [2019FGWTZC001]

向作者/读者索取更多资源

This paper summarizes the existing literature on the security issues of Trigger-Action Programming (TAP) in IoT smart home platforms, including logical errors in TAP rules and vulnerabilities in well-known TAP platforms. It also provides detection techniques and solutions based on different approaches, such as Model Checking and Natural Language Processing. Additionally, datasets from literature or publicly available sources are summarized for potential future TAP security research.
The Internet of Things (IoT) connects all emerging devices and services while creating interactions between people and things. Allowing users to match devices and services by causal relationship, Trigger-Action Programming (TAP) is a common user-programming paradigm in IoT smart home platforms. Thus, the security issues of TAP need to be addressed to ensure the privacy and security of data and human safety. This paper summarizes the existing literature on 1) security issues caused by different types of logical errors found in TAP rules and the vulnerabilities on well-known TAP platforms, and 2) the corresponding detection techniques and solutions that are classified based on different types of approaches adopted (e.g., Model Checking and Natural Language Processing). Finally, we summarized the datasets from literature or publicly available on the Internet in a separate section for potential reference of future TAP security research. (C) 2022 Published by Elsevier Ltd.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据