A room with an overview: Towards meaningful transparency for the consumer Internet of Things
As our physical environments become ever-more connected, instrumented, and automated,
it can be increasingly difficult for users to understand what is happening within them and …
it can be increasingly difficult for users to understand what is happening within them and …
Understanding dark patterns in home IoT devices
Internet-of-Things (IoT) devices are ubiquitous, but little attention has been paid to how they
may incorporate dark patterns despite consumer protections and privacy concerns arising …
may incorporate dark patterns despite consumer protections and privacy concerns arising …
IoTLS: understanding TLS usage in consumer IoT devices
Consumer IoT devices are becoming increasingly popular, with most leveraging TLS to
provide connection security. In this work, we study a large number of TLS-enabled consumer …
provide connection security. In this work, we study a large number of TLS-enabled consumer …
Tracking, profiling, and ad targeting in the Alexa echo smart speaker ecosystem
Smart speakers collect voice commands, which can be used to infer sensitive information
about users. Given the potential for privacy harms, there is a need for greater transparency …
about users. Given the potential for privacy harms, there is a need for greater transparency …
Iotflow: Inferring iot device behavior at scale through static mobile companion app analysis
The number of" smart''devices, that is, devices making up the Internet of Things (IoT), is
steadily growing. They suffer from vulnerabilities just as other software and hardware …
steadily growing. They suffer from vulnerabilities just as other software and hardware …
Peekaboo: A hub-based approach to enable transparency in data processing within smart homes
We present Peekaboo, a new privacy-sensitive architecture for smart homes that leverages
an in-home hub to pre-process and minimize outgoing data in a structured and enforceable …
an in-home hub to pre-process and minimize outgoing data in a structured and enforceable …
Protected or porous: A comparative analysis of threat detection capability of IoT safeguards
Consumer Internet of Things (IoT) devices are increasingly common, from smart speakers to
security cameras, in homes. Along with their benefits come potential privacy and security …
security cameras, in homes. Along with their benefits come potential privacy and security …
Behaviot: Measuring smart home iot behavior using network-inferred behavior models
Smart home IoT platforms are typically closed systems, meaning that there is poor visibility
into device behavior. Understanding device behavior is important not only for determining …
into device behavior. Understanding device behavior is important not only for determining …
Towards a real-time IoT: Approaches for incoming packet processing in cyber–physical systems
Embedded real-time devices for monitoring, controlling, and collaboration purposes in cyber–
physical systems are now commonly equipped with IP networking capabilities. However, the …
physical systems are now commonly equipped with IP networking capabilities. However, the …
Connecting the Dots: Tracing Data Endpoints in IoT Devices
Smart home devices are constantly exchanging data with a variety of remote endpoints. This
data encompasses diverse information, from device operation and status to sensitive user …
data encompasses diverse information, from device operation and status to sensitive user …