[HTML][HTML] Anomaly-based cyberattacks detection for smart homes: A systematic literature review

JII Araya, H Rifà-Pous - Internet of Things, 2023 - Elsevier
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …

Detecting and Handling {IoT} Interaction Threats in {Multi-Platform}{Multi-Control-Channel} Smart Homes

H Chi, Q Zeng, X Du - … USENIX Security Symposium (USENIX Security 23 …, 2023 - usenix.org
A smart home involves a variety of entities, such as IoT devices, automation applications,
humans, voice assistants, and companion apps. These entities interact in the same physical …

Graph learning for interactive threat detection in heterogeneous smart home rule data

G Wang, N Ivanov, B Chen, Q Wang… - Proceedings of the …, 2023 - dl.acm.org
The interactions among automation configuration rule data have led to undesired and
insecure issues in smart homes, which are known as interactive threats. Most existing …

Behaviot: Measuring smart home iot behavior using network-inferred behavior models

T Hu, DJ Dubois, D Choffnes - Proceedings of the 2023 ACM on Internet …, 2023 - dl.acm.org
Smart home IoT platforms are typically closed systems, meaning that there is poor visibility
into device behavior. Understanding device behavior is important not only for determining …

Towards Usable Security Analysis Tools for {Trigger-Action} Programming

MK McCall, E Zeng, FH Shezan, M Yang… - … Symposium on Usable …, 2023 - usenix.org
Research has shown that trigger-action programming (TAP) is an intuitive way to automate
smart home IoT devices, but can also lead to undesirable behaviors. For instance, if two TAP …

Federated iot interaction vulnerability analysis

G Wang, H Guo, A Li, X Liu… - 2023 IEEE 39th …, 2023 - ieeexplore.ieee.org
IoT devices provide users with great convenience in smart homes. However, the
interdependent behaviors across devices may yield unexpected interactions. To analyze the …

Perils and mitigation of security risks of cooperation in mobile-as-a-gateway IoT

X Zhou, J Guan, L Xing, Z Qian - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Mobile-as-a-Gateway (MaaG) is a popular feature using mobile devices as gateways to
connect IoT devices to cloud services for management. MaaG IoT access control systems …

Anomaly-based cyberattacks detection for smart homes: A systematic literature review

JI Iturbe Araya, H Rifà-Pous - Internet of Things, 2023, Vol. 22 …, 2023 - openaccess.uoc.edu
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …

Privacy leakage analysis for colluding smart Apps

J Wang, L Luo - 2022 52nd Annual IEEE/IFIP International …, 2022 - ieeexplore.ieee.org
The rapid proliferation of Internet-of-Things (IoT) has advanced the development of smart
environments. By installing smart apps on IoT platforms, users can integrate IoT devices for …

SmartTracer: Anomaly-Driven Provenance Analysis Based on Device Correlation in Smart Home Systems

J Mao, Q Lin, S Zhu, L Ma, J Liu - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
As a typical application of the Internet of Things (IoT), smart home systems facilitate home
setup where appliances and devices can be controlled automatically and remotely from …