CMD: co-analyzed iot malware detection and forensics via network and hardware domains

Z Zhao, Z Li, J Yu, F Zhang, X Xie… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the widespread use of Internet of Things (IoT) devices, malware detection has become
a hot spot for both academic and industrial communities. Existing approaches can be …

Graph learning for interactive threat detection in heterogeneous smart home rule data

G Wang, N Ivanov, B Chen, Q Wang… - Proceedings of the …, 2023 - dl.acm.org
The interactions among automation configuration rule data have led to undesired and
insecure issues in smart homes, which are known as interactive threats. Most existing …

Iot anomaly detection via device interaction graph

J Wang, Z Li, M Sun, B Yuan… - 2023 53rd Annual IEEE …, 2023 - ieeexplore.ieee.org
With diverse functionalities and advanced platform applications, Internet of Things (IoT)
devices extensively interact with each other, and these interactions govern the legitimate …

Iot phantom-delay attacks: Demystifying and exploiting iot timeout behaviors

C Fu, Q Zeng, H Chi, X Du… - 2022 52nd Annual IEEE …, 2022 - ieeexplore.ieee.org
This paper unveils a set of new attacks against Internet of Things (IoT) automation systems.
We first propose two novel IoT attack primitives: Event Message Delay and Command …

Iotmosaic: Inferring user activities from iot network traffic in smart homes

Y Wan, K Xu, F Wang, G Xue - IEEE INFOCOM 2022-IEEE …, 2022 - ieeexplore.ieee.org
Recent advances in cyber-physical systems, artificial intelligence, and cloud computing
have driven the wide deployment of Internet-of-things (IoT) in smart homes. As IoT devices …

Sniffmislead: Non-intrusive privacy protection against wireless packet sniffers in smart homes

X Liu, Q Zeng, X Du, SL Valluru, C Fu, X Fu… - Proceedings of the 24th …, 2021 - dl.acm.org
With the booming deployment of smart homes, concerns about user privacy keep growing.
Recent research has shown that encrypted wireless traffic of IoT devices can be exploited by …

ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol

CK Nkuba, S Woo, H Lee, S Dietrich - IEEE Access, 2023 - ieeexplore.ieee.org
Smart home automation is part of the Internet of Things that enables house remote control
via the use of smart devices, sensors, and actuators. Despite its convenience, vulnerabilities …

TAPInspector: Safety and liveness verification of concurrent trigger-action IoT systems

Y Yu, J Liu - IEEE Transactions on Information Forensics and …, 2022 - ieeexplore.ieee.org
Trigger-action programming (TAP) is a popular end-user programming framework that can
simplify the Internet of Things (IoT) automation with simple trigger-action rules. However, it …

Perils and mitigation of security risks of cooperation in mobile-as-a-gateway iot

X Zhou, J Guan, L Xing, Z Qian - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Mobile-as-a-Gateway (MaaG) is a popular feature using mobile devices as gateways to
connect IoT devices to cloud services for management. MaaG IoT access control systems …

Toward situational awareness in threat detection. A survey

K Rendall, A Mylonas, S Vidalis - … Reviews: Forensic Science, 2022 - Wiley Online Library
The pervasiveness of the Internet did not come without security risk. The current threat
landscape is characterized by the rise of sophisticated cyber attacks, which target user …