A survey on conflict detection in iot-based smart homes

B Huang, D Chaki, A Bouguettaya, KY Lam - ACM Computing Surveys, 2023 - dl.acm.org
As the adoption of IoT-based smart homes continues to grow, the importance of addressing
potential conflicts becomes increasingly vital for ensuring seamless functionality and user …

Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions

X Chen, X Zhang, M Elliot, X Wang, F Wang - Computers & Security, 2022 - Elsevier
Abstract The Internet of Things (IoT) connects all emerging devices and services while
creating interactions between people and things. Allowing users to match devices and …

Detecting and Handling {IoT} Interaction Threats in {Multi-Platform}{Multi-Control-Channel} Smart Homes

H Chi, Q Zeng, X Du - … USENIX Security Symposium (USENIX Security 23 …, 2023 - usenix.org
A smart home involves a variety of entities, such as IoT devices, automation applications,
humans, voice assistants, and companion apps. These entities interact in the same physical …

Towards Usable Security Analysis Tools for {Trigger-Action} Programming

MK McCall, E Zeng, FH Shezan, M Yang… - … Symposium on Usable …, 2023 - usenix.org
Research has shown that trigger-action programming (TAP) is an intuitive way to automate
smart home IoT devices, but can also lead to undesirable behaviors. For instance, if two TAP …

ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol

CK Nkuba, S Woo, H Lee, S Dietrich - IEEE Access, 2023 - ieeexplore.ieee.org
Smart home automation is part of the Internet of Things that enables house remote control
via the use of smart devices, sensors, and actuators. Despite its convenience, vulnerabilities …

HSAS-MD analyzer: a hybrid security analysis system using model-checking technique and deep learning for malware detection in IoT apps

AA Hamza, IT Abdel Halim, MA Sobh, AM Bahaa-Eldin - Sensors, 2022 - mdpi.com
Established Internet of Things (IoT) platforms suffer from their inability to determine whether
an IoT app is secure or not. A security analysis system (SAS) is a protective shield against …

Helping Users Debug Trigger-Action Programs

L Zhang, C Zhou, ML Littman, B Ur, S Lu - Proceedings of the ACM on …, 2023 - dl.acm.org
Trigger-action programming (TAP) empowers a wide array of users to automate Internet of
Things (IoT) devices. However, it can be challenging for users to create completely correct …

Proactive Detection of Physical Inter-rule Vulnerabilities in IoT Services Using a Deep Learning Approach

B Huang, C Chen, KY Lam, F Huang - arXiv preprint arXiv:2406.03836, 2024 - arxiv.org
Emerging Internet of Things (IoT) platforms provide sophisticated capabilities to automate
IoT services by enabling occupants to create trigger-action rules. Multiple trigger-action rules …

A Points-to-Sensitive Model Checker for C Programs in IoT Firmware

Y Yu, J Liu, D Mu - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) provides convenience for our daily lives via a huge number of
devices. However, due to low-resource and poor computing capability, these devices have a …

A Survey of Analysis Methods for Security and Safety verification in IoT Systems

L Abuserrieh, MH Alalfi - arXiv preprint arXiv:2203.01464, 2022 - arxiv.org
Internet of Things (IoT) has been rapidly growing in the past few years in all life disciplines.
IoT provides automation and smart control to its users in different domains such as home …