A survey of compiler testing

J Chen, J Patra, M Pradel, Y **ong, H Zhang… - ACM Computing …, 2020 - dl.acm.org
Virtually any software running on a computer has been processed by a compiler or a
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …

[HTML][HTML] Setting privacy “by default” in social IoT: Theorizing the challenges and directions in Big Data Research

JR Saura, D Ribeiro-Soriano, D Palacios-Marqués - Big Data Research, 2021 - Elsevier
Abstract The social Internet of Things (SIoT) shares large amounts of data that are then
processed by other Internet of Thing (IoT) devices, which results in the generation …

Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers

J Lau, B Zimmerman, F Schaub - Proceedings of the ACM on human …, 2018 - dl.acm.org
Smart speakers with voice assistants, like Amazon Echo and Google Home, provide benefits
and convenience but also raise privacy concerns due to their continuously listening …

Music, search, and IoT: How people (really) use voice assistants

T Ammari, J Kaye, JY Tsai, F Bentley - ACM Transactions on Computer …, 2019 - dl.acm.org
Voice has become a widespread and commercially viable interaction mechanism with the
introduction of voice assistants (VAs), such as Amazon's Alexa, Apple's Siri, Google …

User perceptions of smart home IoT privacy

S Zheng, N Apthorpe, M Chetty… - Proceedings of the ACM on …, 2018 - dl.acm.org
Smart home Internet of Things (IoT) devices are rapidly increasing in popularity, with more
households including Internet-connected devices that continuously monitor user activities. In …

{BlackIoT}:{IoT} botnet of high wattage devices can disrupt the power grid

S Soltan, P Mittal, HV Poor - 27th USENIX Security Symposium (USENIX …, 2018 - usenix.org
We demonstrate that an Internet of Things (IoT) botnet of high wattage devices–such as air
conditioners and heaters–gives a unique ability to adversaries to launch large-scale …

Exploring how privacy and security factor into IoT device purchase behavior

P Emami-Naeini, H Dixon, Y Agarwal… - Proceedings of the 2019 …, 2019 - dl.acm.org
Despite growing concerns about security and privacy of Internet of Things (IoT) devices,
consumers generally do not have access to security and privacy information when …

Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}})

W He, M Golla, R Padhi, J Ofek, M Dürmuth… - 27th USENIX Security …, 2018 - usenix.org
Computing is transitioning from single-user devices to the Internet of Things (IoT), in which
multiple users with complex social relationships interact with a single device. Currently …

Privacy attitudes of smart speaker users

N Malkin, J Deatrick, A Tong, P Wijesekera… - Proceedings on Privacy …, 2019 - par.nsf.gov
As devices with always-on microphones located in people's homes, smart speakers have
significant privacy implications. We surveyed smart speaker owners about their beliefs …

Tangible privacy: Towards user-centric sensor designs for bystander privacy

I Ahmad, R Farzan, A Kapadia, AJ Lee - Proceedings of the ACM on …, 2020 - dl.acm.org
Sensor-enabled computers in the form of'IoT'devices such as home security cameras and
voice assistants are increasingly becoming pervasive in our environment. With the …