[PDF][PDF] Evasion attacks and defenses on smart home physical event verification

MO Ozmen, R Song, H Farrukh, ZB Celik - Network and Distributed …, 2023 - par.nsf.gov
In smart homes, when an actuator's state changes, it sends an event notification to the IoT
hub to report this change (eg, the door is unlocked). Prior works have shown that event …

MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations

B Yuan, Z Song, Y Jia, Z Lu, D Zou, H Jin… - 2024 IEEE Symposium …, 2023 - computer.org
IoT messaging protocols are critical to connecting users and IoT devices. Among all the
protocols, the Message Queuing and Telemetry Transport (MQTT) is arguably the most …

CCDF-TAP: A Context-Aware Conflict Detection Framework for IoT Trigger-Action Programming With Graph Neural Network

Y Xing, L Hu, X Du, Z Shen, J Hu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The rapid expansion of the Internet of Things (IoT) has led to the development of smart
homes and automation systems. Trigger-action programming (TAP) has emerged as a …

Traditional IOCs Meet Dynamic App-Device Interactions for IoT-Specific Threat Intelligence

S Smolyakova, E Khodayarseresht… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
While enjoying widespread popularity, IoT faces numerous threats using both traditional (eg,
Common Vulnerabilities and Exposures (CVEs) and Common Weakness Enumerations …

Detection and Analysis of Broken Access Control Vulnerabilities in App-Cloud Interaction in IoT

Z Zhang, F Zou, J Hong, L Chen… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
At present, there is less research on the detection of broken access control vulnerabilities in
IoT systems, mostly using state machines to analyze abnormal state transitions, and no …

Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure

B Yuan, M Yang, Z Xu, Q Chen, Z Song… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Device sharing among users is a common functionality in today's IoT clouds. Supporting
device sharing are the delegation methods proposed by different IoT clouds, which we find …

Sharing can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms

Y Yang, J Zhao, Y Li, X Li, P Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The “sharing” feature provided by smart home platforms enables multiple users to access
the device simultaneously with different roles and permissions, but it also presents new …

Interior design applications based on IoT as detection and es-timation methods

A Amin, T Soliman, A Hasanein… - International Journal of …, 2023 - journals.ekb.eg
The Internet of Things (IoT) is a paradigm in which objects equipped with sensors, actuators,
and processors communicate with each other to serve a meaningful purpose. The current …