Charting the attack surface of trigger-action IoT platforms

Q Wang, P Datta, W Yang, S Liu, A Bates… - Proceedings of the 2019 …, 2019 - dl.acm.org
Internet of Things (IoT) deployments are becoming increasingly automated and vastly more
complex. Facilitated by programming abstractions such as trigger-action rules, end-users …

Safechain: Securing trigger-action programming from attack chains

KH Hsu, YH Chiang, HC Hsiao - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The proliferation of the Internet of Things (IoT) is reshaping our lifestyle. With IoT sensors
and devices communicating with each other via the Internet, people can customize …

Decentralized action integrity for trigger-action IoT platforms

E Fernandes, A Rahmati, J Jung… - Proceedings 2018 Network …, 2018 - par.nsf.gov
Trigger-Action platforms are web-based systems that enable users to create automation
rules by stitching together online services representing digital and physical resources using …

Clear as MUD: Generating, validating and applying IoT behavioral profiles

A Hamza, D Ranathunga, HH Gharakheili… - Proceedings of the …, 2018 - dl.acm.org
IoT devices are increasingly being implicated in cyber-attacks, raising community concern
about the risks they pose to critical infrastructure, corporations, and citizens. In order to …

If this then what? Controlling flows in IoT apps

I Bastys, M Balliu, A Sabelfeld - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
IoT apps empower users by connecting a variety of otherwise unconnected services. These
apps (or applets) are triggered by external information sources to perform actions on …

Identifying security and privacy violation rules in trigger-action IoT platforms with NLP models

B Breve, G Cimino, V Deufemia - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Trigger-action platforms are systems that enable users to easily define, in terms of
conditional rules, custom behaviors concerning Internet of Things (IoT) devices and Web …

{ARGUS}:{Context-Based} Detection of Stealthy {IoT} Infiltration Attacks

P Rieger, M Chilese, R Mohamed, M Miettinen… - 32nd USENIX Security …, 2023 - usenix.org
IoT application domains, device diversity and connectivity are rapidly growing. IoT devices
control various functions in smart homes and buildings, smart cities, and smart factories …

Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

Combining MUD policies with SDN for IoT intrusion detection

A Hamza, HH Gharakheili, V Sivaraman - … of the 2018 Workshop on IoT …, 2018 - dl.acm.org
The IETF's push towards standardizing the Manufacturer Usage Description (MUD) grammar
and mechanism for specifying IoT device behavior is gaining increasing interest from …

On the safety of iot device physical interaction control

W Ding, H Hu - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018 - dl.acm.org
Emerging Internet of Things (IoT) platforms provide increased functionality to enable human
interaction with the physical world in an autonomous manner. The physical interaction …