Privacy norms for smart home personal assistants

N Abdi, X Zhan, KM Ramokapane, J Such - Proceedings of the 2021 CHI …, 2021 - dl.acm.org
Smart Home Personal Assistants (SPA) have a complex ecosystem that enables them to
carry out various tasks on behalf of the user with just voice commands. SPA capabilities are …

Understanding iot security from a market-scale perspective

X **, S Manandhar, K Kafle, Z Lin… - Proceedings of the 2022 …, 2022 - dl.acm.org
Consumer IoT products and services are ubiquitous; yet, a proper characterization of
consumer IoT security is infeasible without an understanding of what IoT products are on the …

[PDF][PDF] IoTSafe: Enforcing Safety and Security Policy withReal IoT Physical Interaction Discovery

W Ding, H Hu, L Cheng - Network and Distributed System Security …, 2021 - par.nsf.gov
The Internet of Things (IoT) platforms bring significant convenience for increased home
automation. Especially, these platforms provide many new features for managing multiple …

物联网安全研究综述: 威胁, 检测与防御

杨毅宇, 周威, 赵尚儒, 刘聪, 张宇辉, 王鹤… - 通信 …, 2021 - infocomm-journal.com
基于**5 年网安国际会议(ACM CCS, USENIX Security, NDSS, IEEE S&P)
中发表的物联网安全文献, 以及其他部分高水**研究工作, 从威胁, 检测, 防御的视角对物联网 …

Detecting and Handling {IoT} Interaction Threats in {Multi-Platform}{Multi-Control-Channel} Smart Homes

H Chi, Q Zeng, X Du - … USENIX Security Symposium (USENIX Security 23 …, 2023 - usenix.org
A smart home involves a variety of entities, such as IoT devices, automation applications,
humans, voice assistants, and companion apps. These entities interact in the same physical …

Characterizing everyday misuse of smart home devices

P Moh, P Datta, N Warford, A Bates… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Exploration of Internet of Things (IoT) security often focuses on threats posed by external
and technically-skilled attackers. While it is important to understand these most extreme …

Behaviot: Measuring smart home iot behavior using network-inferred behavior models

T Hu, DJ Dubois, D Choffnes - Proceedings of the 2023 ACM on Internet …, 2023 - dl.acm.org
Smart home IoT platforms are typically closed systems, meaning that there is poor visibility
into device behavior. Understanding device behavior is important not only for determining …

PFirewall: Semantics-aware customizable data flow control for smart home privacy protection

H Chi, Q Zeng, X Du, L Luo - arxiv preprint arxiv:2101.10522, 2021 - arxiv.org
Internet of Things (IoT) platforms enable users to deploy home automation applications.
Meanwhile, privacy issues arise as large amounts of sensitive device data flow out to IoT …

Accurate generation of trigger-action programs with domain-adapted sequence-to-sequence learning

INB Yusuf, L Jiang, D Lo - Proceedings of the 30th IEEE/ACM …, 2022 - dl.acm.org
Trigger-action programming allows end users to write event-driven rules to automate smart
devices and internet services. Users can create a trigger-action program (TAP) by specifying …

Discovering IoT physical channel vulnerabilities

MO Ozmen, X Li, A Chu, ZB Celik, B Hoxha… - Proceedings of the 2022 …, 2022 - dl.acm.org
Smart homes contain diverse sensors and actuators controlled by IoT apps that provide
custom automation. Prior works showed that an adversary could exploit physical interaction …