Identifying privacy weaknesses from multi-party trigger-action integration platforms

K Mahadewa, Y Zhang, G Bai, L Bu, Z Zuo… - Proceedings of the 30th …, 2021 - dl.acm.org
With many trigger-action platforms that integrate Internet of Things (IoT) systems and online
services, rich functionalities transparently connecting digital and physical worlds become …

Are they toeing the line? diagnosing privacy compliance violations among browser extensions

Y Ling, K Wang, G Bai, H Wang, JS Dong - Proceedings of the 37th IEEE …, 2022 - dl.acm.org
Browser extensions have emerged as integrated characteristics in modern browsers, with
the aim to boost the online browsing experience. Their advantageous position between a …

Knowledge-based cyber physical security at smart home: a review

A Alsufyani, O Rana, C Perera - ACM Computing Surveys, 2024 - dl.acm.org
Smart-home systems represent the future of modern building infrastructure as they integrate
numerous devices and applications to improve the overall quality of life. These systems …

Security Checking of Trigger-Action-Programming Smart Home Integrations

L Bu, Q Zhang, S Li, J Dai, G Bai, K Chen… - Proceedings of the 32nd …, 2023 - dl.acm.org
Internet of Things (IoT) has become prevalent in various fields, especially in the context of
home automation (HA). To better control HA-IoT devices, especially to integrate several …

Recovering fitness gradients for interprocedural Boolean flags in search-based testing

Y Lin, J Sun, G Fraser, Z **u, T Liu… - Proceedings of the 29th …, 2020 - dl.acm.org
In Search-based Software Testing (SBST), test generation is guided by fitness functions that
estimate how close a test case is to reach an uncovered test goal (eg, branch). A popular …

Detecting contradictions from IoT protocol specification documents based on neural generated knowledge graph

X Feng, Y Zhang, MH Meng, Y Li, CE Joe, Z Wang… - ISA transactions, 2023 - Elsevier
Due to the boom of Internet of Things (IoT) in recent years, various IoT devices are
connected to the Internet and communicate with each other through network protocols such …

Uncovering Access Token Security Flaws in Multi-User Scenario of Smart Home Platforms

Y Yang, J Wang, P Liu, A Fu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Access tokens have been thoroughly researched in website and mobile application security.
However, we believe that the traditional application of access tokens must fulfill new security …

MFF-IoT: A Multi-Granularity Formal Framework of User Authentication for IoT

Y Fei, J Yin, L Yan - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) generates vast amounts of data from numerous applications.
However, since wireless channels are the primary means of communication, IoT networks …

Detecting contradictions from coap rfc based on knowledge graph

X Feng, Y Zhang, MH Meng, SG Teo - International Conference on …, 2022 - Springer
Due to the boom of Internet of Things (IoT) in recent years, various IoT devices are
connected to the internet and communicate with each other through web protocols such as …

Deep bidirectional gated recurrent unit for botnet detection in smart homes

SI Popoola, R Ande, KB Fatai, B Adebisi - Machine Learning and Data …, 2021 - Springer
Bidirectional gated recurrent unit (BGRU) can learn hierarchical feature representations from
both past and future information to perform multi-class classification. However, its …