A survey on IoT-enabled home automation systems: Attacks and defenses
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities
Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart
homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive …
homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive …
Holmes: real-time apt detection through correlation of suspicious information flows
In this paper, we present HOLMES, a system that implements a new approach to the
detection of Advanced and Persistent Threats (APTs). HOLMES is inspired by several case …
detection of Advanced and Persistent Threats (APTs). HOLMES is inspired by several case …
[PDF][PDF] Iotguard: Dynamic enforcement of security and safety policy in commodity IoT.
Broadly defined as the Internet of Things (IoT), the growth of commodity devices that
integrate physical processes with digital connectivity has changed the way we live, play, and …
integrate physical processes with digital connectivity has changed the way we live, play, and …
Sok: Security evaluation of home-based iot deployments
Home-based IoT devices have a bleak reputation regarding their security practices. On the
surface, the insecurities of IoT devices seem to be caused by integration problems that may …
surface, the insecurities of IoT devices seem to be caused by integration problems that may …
[PDF][PDF] You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
To subvert recent advances in perimeter and host security, the attacker community has
developed and employed various attack vectors to make a malware much stealthier than …
developed and employed various attack vectors to make a malware much stealthier than …
Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}})
Computing is transitioning from single-user devices to the Internet of Things (IoT), in which
multiple users with complex social relationships interact with a single device. Currently …
multiple users with complex social relationships interact with a single device. Currently …
All things considered: An analysis of {IoT} devices on home networks
D Kumar, K Shen, B Case, D Garg… - 28th USENIX security …, 2019 - usenix.org
In this paper, we provide the first large-scale empirical analysis of IoT devices in real-world
homes by leveraging data collected from user-initiated network scans of 83M devices in 16M …
homes by leveraging data collected from user-initiated network scans of 83M devices in 16M …
Understanding and improving security and privacy in {multi-user} smart homes: A design exploration and {in-home} user study
Smart homes face unique security, privacy, and usability challenges because they are multi-
user, multi-device systems that affect the physical environment of all inhabitants of the home …
user, multi-device systems that affect the physical environment of all inhabitants of the home …
Nodoze: Combatting threat alert fatigue with automated provenance triage
Large enterprises are increasingly relying on threat detection softwares (eg, Intrusion
Detection Systems) to allow them to spot suspicious activities. These softwares generate …
Detection Systems) to allow them to spot suspicious activities. These softwares generate …