A survey of compiler testing

J Chen, J Patra, M Pradel, Y **ong, H Zhang… - ACM Computing …, 2020 - dl.acm.org
Virtually any software running on a computer has been processed by a compiler or a
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …

The security in optical wireless communication: A survey

X Zhang, G Klevering, X Lei, Y Hu, L **ao… - ACM Computing …, 2023 - dl.acm.org
With the demand for economical and high-speed wireless services, Optical Wireless
Communication (OWC) has attracted increasing attention in both research and the market. In …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

Modern authentication schemes in smartphones and IoT devices: An empirical survey

MT Ahvanooey, MX Zhu, Q Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …

Penetration vision through virtual reality headsets: identifying 360-degree videos from head movements

A Nguyen, X Zhang, Z Yan - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
In this paper, we present the first contactless side-channel attack for identifying 360 videos
being viewed in a Virtual Reality (VR) Head Mounted Display (HMD). Although the video …

Smart homes app vulnerabilities, threats, and solutions: A systematic literature review

AM Ansari, M Nazir, K Mustafa - Journal of Network and Systems …, 2024 - Springer
The smart home is one of the most significant applications of Internet of Things (IoT). Smart
home is basically the combination of different components like devices, hub, cloud, and …

Zoom on the keystrokes: Exploiting video calls for keystroke inference attacks

M Sabra, A Maiti, M Jadliwala - arxiv preprint arxiv:2010.12078, 2020 - arxiv.org
Due to recent world events, video calls have become the new norm for both personal and
professional remote communication. However, if a participant in a video call is not careful …

Sniffing visible light communication through walls

M Cui, Y Feng, Q Wang, J **ong - Proceedings of the 26th Annual …, 2020 - dl.acm.org
Visible light communication (VLC) is gaining a significant amount of interest as a new
paradigm to meet rapidly increasing demands on wireless capacity required by a digitalized …

Enabling security services in socially assistive robot scenarios for healthcare applications

A Vulpe, R Crăciunescu, AM Drăgulinescu… - Sensors, 2021 - mdpi.com
Today's IoT deployments are highly complex, heterogeneous and constantly changing. This
poses severe security challenges such as limited end-to-end security support, lack of cross …