Charting the attack surface of trigger-action IoT platforms
Internet of Things (IoT) deployments are becoming increasingly automated and vastly more
complex. Facilitated by programming abstractions such as trigger-action rules, end-users …
complex. Facilitated by programming abstractions such as trigger-action rules, end-users …
[HTML][HTML] Security of Building Automation and Control Systems: Survey and future research directions
Abstract Building Automation and Control Systems (BACS) designate the mechanisms that
are used to automate buildings' operations such as climate control, lightning and access …
are used to automate buildings' operations such as climate control, lightning and access …
[PDF][PDF] IoTSafe: Enforcing Safety and Security Policy withReal IoT Physical Interaction Discovery
The Internet of Things (IoT) platforms bring significant convenience for increased home
automation. Especially, these platforms provide many new features for managing multiple …
automation. Especially, these platforms provide many new features for managing multiple …
A Survey on Verification of Security and Safety in IoT Systems
L Abuserrieh, MH Alalfi - IEEE Access, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) has been rapidly growing in the past few years in all life disciplines.
IoT provides automation and smart control across various domains, including home …
IoT provides automation and smart control across various domains, including home …
AutoTap: Synthesizing and repairing trigger-action programs using LTL properties
End-user programming, particularly trigger-action programming (TAP), is a popular method
of letting users express their intent for how smart devices and cloud services interact …
of letting users express their intent for how smart devices and cloud services interact …
Extending isolation forest for anomaly detection in big data via K-means
Industrial Information Technology infrastructures are often vulnerable to cyberattacks. To
ensure security to the computer systems in an industrial environment, it is required to build …
ensure security to the computer systems in an industrial environment, it is required to build …
Towards a natural perspective of smart homes for practical security and safety analyses
Designing practical security systems for the smart home is challenging without the
knowledge of realistic home usage. This paper describes the design and implementation of …
knowledge of realistic home usage. This paper describes the design and implementation of …
[PDF][PDF] Tapfixer: Automatic detection and repair of home automation vulnerabilities based on negated-property reasoning
Y Yu, Y Xu, K Huang, J Liu - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
TAPFixer: Automatic Detection and Repair of Home Automation Vulnerabilities based on
Negated-property Reasoning Page 1 TAPFixer: Automatic Detection and Repair of Home …
Negated-property Reasoning Page 1 TAPFixer: Automatic Detection and Repair of Home …
Identifying privacy weaknesses from multi-party trigger-action integration platforms
With many trigger-action platforms that integrate Internet of Things (IoT) systems and online
services, rich functionalities transparently connecting digital and physical worlds become …
services, rich functionalities transparently connecting digital and physical worlds become …
Discovering IoT physical channel vulnerabilities
Smart homes contain diverse sensors and actuators controlled by IoT apps that provide
custom automation. Prior works showed that an adversary could exploit physical interaction …
custom automation. Prior works showed that an adversary could exploit physical interaction …