A survey of compiler testing

J Chen, J Patra, M Pradel, Y Xiong, H Zhang… - ACM Computing …, 2020 - dl.acm.org
Virtually any software running on a computer has been processed by a compiler or a
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …

[HTML][HTML] Access control for IoT: A survey of existing research, dynamic policies and future directions

K Ragothaman, Y Wang, B Rimal, M Lawrence - Sensors, 2023 - mdpi.com
Internet of Things (IoT) provides a wide range of services in domestic and industrial
environments. Access control plays a crucial role in granting access rights to users and …

Anticipating smart home security and privacy threats with survivors of intimate partner abuse

R Leitão - Proceedings of the 2019 on designing interactive …, 2019 - dl.acm.org
This paper presents a design-led qualitative study investigating the (mis) use of digital
technologies as tools for stalking, threats, and harassment within the context of intimate …

Kratos: Multi-user multi-device-aware access control system for the smart home

AK Sikder, L Babun, ZB Celik, A Acar, H Aksu… - Proceedings of the 13th …, 2020 - dl.acm.org
In a smart home system, multiple users have access to multiple devices, typically through a
dedicated app installed on a mobile device. Traditional access control mechanisms consider …

Child safety in the smart home: parents' perceptions, needs, and mitigation strategies

K Sun, Y Zou, J Radesky, C Brooks… - Proceedings of the ACM …, 2021 - dl.acm.org
Concerns about child physical and digital safety are emerging with families' adoption of
smart home technologies such as robot vacuums and smart speakers. To better understand …

[HTML][HTML] Facial kinship verification: A comprehensive review and outlook

X Wu, X Feng, X Cao, X Xu, D Hu, MB López… - International Journal of …, 2022 - Springer
Abstract The goal of Facial Kinship Verification (FKV) is to automatically determine whether
two individuals have a kin relationship or not from their given facial images or videos. It is an …

Exploring tenants' preferences of privacy negotiation in airbnb

Z Wang, DY Huang, Y Yao - 32nd USENIX Security Symposium …, 2023 - usenix.org
Literature suggests the unmatched or conflicting privacy needs between users and
bystanders in smart homes due to their different privacy concerns and priorities. A promising …

Who's controlling my device? Multi-user multi-device-aware access control system for shared smart home environment

AK Sikder, L Babun, ZB Celik, H Aksu… - ACM Transactions on …, 2022 - dl.acm.org
Multiple users have access to multiple devices in a smart home system–typically through a
dedicated app installed on a mobile device. Traditional access control mechanisms consider …

Understanding motivators, constraints, and practices of sharing internet of things

R Garg, C Moreno - Proceedings of the ACM on Interactive, Mobile …, 2019 - dl.acm.org
Smart devices such as mobile phones, tablets, and smart watches are designed under the
assumption that they will be used by a single user. In contrast, many other devices, such as …

A survey of user perspectives on security and privacy in a home networking environment

N Pattnaik, S Li, JRC Nurse - ACM Computing Surveys, 2023 - dl.acm.org
The security and privacy of smart home systems, particularly from a home user's perspective,
have been a very active research area in recent years. However, via a meta-review of 52 …