A survey of compiler testing

J Chen, J Patra, M Pradel, Y **ong, H Zhang… - ACM Computing …, 2020 - dl.acm.org
Virtually any software running on a computer has been processed by a compiler or a
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …

Access control for IoT: A survey of existing research, dynamic policies and future directions

K Ragothaman, Y Wang, B Rimal, M Lawrence - Sensors, 2023 - mdpi.com
Internet of Things (IoT) provides a wide range of services in domestic and industrial
environments. Access control plays a crucial role in granting access rights to users and …

Discovering and understanding the security hazards in the interactions between {IoT} devices, mobile apps, and clouds on smart home platforms

W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao… - 28th USENIX security …, 2019 - usenix.org
A smart home connects tens of home devices to the Internet, where an IoT cloud runs
various home automation applications. While bringing unprecedented convenience and …

Understanding iot security from a market-scale perspective

X **, S Manandhar, K Kafle, Z Lin… - Proceedings of the 2022 …, 2022 - dl.acm.org
Consumer IoT products and services are ubiquitous; yet, a proper characterization of
consumer IoT security is infeasible without an understanding of what IoT products are on the …

Why eve and mallory still love android: Revisiting {TLS}({In) Security} in android applications

M Oltrogge, N Huaman, S Klivan, Y Acar… - 30th USENIX Security …, 2021 - usenix.org
Android applications have a long history of being vulnerable to man-in-the-middle attacks
due to insecure custom TLS certificate validation implementations. To resolve this, Google …

Personal data stores (PDS): a review

KU Fallatah, M Barhamgi, C Perera - Sensors, 2023 - mdpi.com
Internet services have collected our personal data since their inception. In the beginning, the
personal data collection was uncoordinated and was limited to a few selected data types …

Why crypto-detectors fail: A systematic evaluation of cryptographic misuse detection techniques

AS Ami, N Cooper, K Kafle, K Moran… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The correct use of cryptography is central to ensuring data security in modern software
systems. Hence, several academic and commercial static analysis tools have been …

Towards a natural perspective of smart homes for practical security and safety analyses

S Manandhar, K Moran, K Kafle, R Tang… - … ieee symposium on …, 2020 - ieeexplore.ieee.org
Designing practical security systems for the smart home is challenging without the
knowledge of realistic home usage. This paper describes the design and implementation of …

Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review

AM Ansari, M Nazir, K Mustafa - Journal of Network and Systems …, 2024 - Springer
The smart home is one of the most significant applications of Internet of Things (IoT). Smart
home is basically the combination of different components like devices, hub, cloud, and …

Assessing certificate validation user interfaces of WPA supplicants

K Wang, Y Zheng, Q Zhang, G Bai, M Qin… - Proceedings of the 28th …, 2022 - dl.acm.org
WPA (Wi-Fi Protected Access) Enterprise is the de facto standard for safeguarding
enterprise-level wireless networks. It relies on Transport Layer Security (TLS) to establish a …