Scalable analysis of interaction threats in iot systems

M Alhanahnah, C Stevens, H Bagheri - Proceedings of the 29th ACM …, 2020 - dl.acm.org
The ubiquity of Internet of Things (IoT) and our growing reliance on IoT apps are leaving us
more vulnerable to safety and security threats than ever before. Many of these threats are …

Soteria: Automated {IoT} safety and security analysis

ZB Celik, P McDaniel, G Tan - 2018 USENIX annual technical …, 2018 - usenix.org
Broadly defined as the Internet of Things (IoT), the growth of commodity devices that
integrate physical processes with digital systems have changed the way we live, play and …

Iotflow: Inferring iot device behavior at scale through static mobile companion app analysis

D Schmidt, C Tagliaro, K Borgolte… - Proceedings of the 2023 …, 2023 - dl.acm.org
The number of" smart''devices, that is, devices making up the Internet of Things (IoT), is
steadily growing. They suffer from vulnerabilities just as other software and hardware …

IotSan: Fortifying the safety of IoT systems

DT Nguyen, C Song, Z Qian… - Proceedings of the 14th …, 2018 - dl.acm.org
Today's IoT systems include event-driven smart applications (apps) that interact with sensors
and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app …

Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities

ZB Celik, E Fernandes, E Pauley, G Tan… - ACM Computing …, 2019 - dl.acm.org
Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart
homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive …

[PDF][PDF] Iotguard: Dynamic enforcement of security and safety policy in commodity IoT.

ZB Celik, G Tan, PD McDaniel - NDSS, 2019 - cs.uwaterloo.ca
Broadly defined as the Internet of Things (IoT), the growth of commodity devices that
integrate physical processes with digital connectivity has changed the way we live, play, and …

Understanding and securing device vulnerabilities through automated bug report analysis

X Feng, X Liao, X Wang, H Wang, Q Li, K Yang… - SEC'19: Proceedings of …, 2019 - par.nsf.gov
Recent years have witnessed the rise of Internet-of-Things (IoT) based cyber attacks. These
attacks, as expected, are launched from compromised IoT devices by exploiting security …

On the safety of iot device physical interaction control

W Ding, H Hu - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018 - dl.acm.org
Emerging Internet of Things (IoT) platforms provide increased functionality to enable human
interaction with the physical world in an autonomous manner. The physical interaction …

Covert: Compositional analysis of android inter-app permission leakage

H Bagheri, A Sadeghi, J Garcia… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Android is the most popular platform for mobile devices. It facilitates sharing of data and
services among applications using a rich inter-app communication system. While access to …

Automatic generation of inter-component communication exploits for android applications

J Garcia, M Hammad, N Ghorbani… - Proceedings of the 2017 …, 2017 - dl.acm.org
Although a wide variety of approaches identify vulnerabilities in Android apps, none attempt
to determine exploitability of those vulnerabilities. Exploitability can aid in reducing false …