Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions

X Chen, X Zhang, M Elliot, X Wang, F Wang - Computers & Security, 2022 - Elsevier
Abstract The Internet of Things (IoT) connects all emerging devices and services while
creating interactions between people and things. Allowing users to match devices and …

Behaviot: Measuring smart home iot behavior using network-inferred behavior models

T Hu, DJ Dubois, D Choffnes - Proceedings of the 2023 ACM on Internet …, 2023 - dl.acm.org
Smart home IoT platforms are typically closed systems, meaning that there is poor visibility
into device behavior. Understanding device behavior is important not only for determining …

Lazytap: On-demand data minimization for trigger-action applications

MM Ahmadpanah, D Hedin… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Trigger-Action Platforms (TAPs) empower applications (apps) for connecting otherwise
unconnected devices and services. The current TAPs like IFTTT require trigger services to …

IoTCom: Dissecting Interaction Threats in IoT Systems

M Alhanahnah, C Stevens, B Chen… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Due to the growing presence of Internet of Things (IoT) apps and devices in smart homes
and smart cities, there are more and more concerns about their security and privacy risks …

Perils and mitigation of security risks of cooperation in mobile-as-a-gateway iot

X Zhou, J Guan, L Xing, Z Qian - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Mobile-as-a-Gateway (MaaG) is a popular feature using mobile devices as gateways to
connect IoT devices to cloud services for management. MaaG IoT access control systems …

[PDF][PDF] Scalable Metadata-Hiding for Privacy-Preserving IoT Systems

Y Chen, D Heath, R Chatterjee… - Proceedings on Privacy …, 2024 - petsymposium.org
Modern cloud-based IoT services comprise an integrator service and several device vendor
services. The vendor services enable users to remotely control their devices, while the …

Security Weaknesses in IoT Management Platforms

B Tejaswi, M Mannan, A Youssef - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
A diverse set of Internet of Things (IoT) devices are becoming an integrated part of daily
lives, and playing an increasingly vital role in various industry, enterprise and agricultural …

Threat Detection in Trigger-Action Programming Rules of Smart Home With Heterogeneous Information Network Model

D Sun, L Hu, G Wu, Y Xing, J Hu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The increased utilization of trigger-action programming (TAP) rules in smart homes has
raised concerns regarding potential security threats in the interactions between smart digital …

Don't Bite Off More than You Can Chew: Investigating Excessive Permission Requests in Trigger-Action Integrations

L Wan, K Wang, K Mahadewa, H Wang… - Proceedings of the ACM …, 2024 - dl.acm.org
Web-based trigger-action platforms (TAP) allow users to integrate Internet of Things (IoT)
systems and online services into trigger-action integrations (TAIs), facilitating rich …

Poster: Data Minimization by Construction for Trigger-Action Applications

MM Ahmadpanah, D Hedin, A Sabelfeld - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Trigger-Action Platforms (TAPs) enable applications to integrate various devices and
services otherwise unconnected. Recent features of TAPs introduce additional sources of …