Charting the attack surface of trigger-action IoT platforms

Q Wang, P Datta, W Yang, S Liu, A Bates… - Proceedings of the 2019 …, 2019 - dl.acm.org
Internet of Things (IoT) deployments are becoming increasingly automated and vastly more
complex. Facilitated by programming abstractions such as trigger-action rules, end-users …

[HTML][HTML] Security of Building Automation and Control Systems: Survey and future research directions

V Graveto, T Cruz, P Simöes - Computers & Security, 2022 - Elsevier
Abstract Building Automation and Control Systems (BACS) designate the mechanisms that
are used to automate buildings' operations such as climate control, lightning and access …

[PDF][PDF] IoTSafe: Enforcing Safety and Security Policy withReal IoT Physical Interaction Discovery

W Ding, H Hu, L Cheng - Network and Distributed System Security …, 2021 - par.nsf.gov
The Internet of Things (IoT) platforms bring significant convenience for increased home
automation. Especially, these platforms provide many new features for managing multiple …

A Survey on Verification of Security and Safety in IoT Systems

L Abuserrieh, MH Alalfi - IEEE Access, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) has been rapidly growing in the past few years in all life disciplines.
IoT provides automation and smart control across various domains, including home …

AutoTap: Synthesizing and repairing trigger-action programs using LTL properties

L Zhang, W He, J Martinez… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
End-user programming, particularly trigger-action programming (TAP), is a popular method
of letting users express their intent for how smart devices and cloud services interact …

Extending isolation forest for anomaly detection in big data via K-means

MTR Laskar, JX Huang, V Smetana, C Stewart… - ACM Transactions on …, 2021 - dl.acm.org
Industrial Information Technology infrastructures are often vulnerable to cyberattacks. To
ensure security to the computer systems in an industrial environment, it is required to build …

Towards a natural perspective of smart homes for practical security and safety analyses

S Manandhar, K Moran, K Kafle, R Tang… - … ieee symposium on …, 2020 - ieeexplore.ieee.org
Designing practical security systems for the smart home is challenging without the
knowledge of realistic home usage. This paper describes the design and implementation of …

[PDF][PDF] Tapfixer: Automatic detection and repair of home automation vulnerabilities based on negated-property reasoning

Y Yu, Y Xu, K Huang, J Liu - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
TAPFixer: Automatic Detection and Repair of Home Automation Vulnerabilities based on
Negated-property Reasoning Page 1 TAPFixer: Automatic Detection and Repair of Home …

Identifying privacy weaknesses from multi-party trigger-action integration platforms

K Mahadewa, Y Zhang, G Bai, L Bu, Z Zuo… - Proceedings of the 30th …, 2021 - dl.acm.org
With many trigger-action platforms that integrate Internet of Things (IoT) systems and online
services, rich functionalities transparently connecting digital and physical worlds become …

Discovering IoT physical channel vulnerabilities

MO Ozmen, X Li, A Chu, ZB Celik, B Hoxha… - Proceedings of the 2022 …, 2022 - dl.acm.org
Smart homes contain diverse sensors and actuators controlled by IoT apps that provide
custom automation. Prior works showed that an adversary could exploit physical interaction …