Smartpatch: Verifying the authenticity of the trigger-event in the IoT platform

B Yuan, Y Wu, M Yang, L Xing, X Wang… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Emerging IoT clouds are playing a more important role in modern lives, enabling
users/developers to program applications to make better use of smart devices. However …

All your IoT devices are belong to us: Security weaknesses in IoT management platforms

B Tejaswi, M Mannan, A Youssef - … of the Thirteenth ACM Conference on …, 2023 - dl.acm.org
IoT devices have become an integral part of our day to day activities, and are also being
deployed to fulfil a number of industrial, enterprise and agricultural use cases. To efficiently …

IotSan: Fortifying the safety of IoT systems

DT Nguyen, C Song, Z Qian… - Proceedings of the 14th …, 2018 - dl.acm.org
Today's IoT systems include event-driven smart applications (apps) that interact with sensors
and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app …

Security Weaknesses in IoT Management Platforms

B Tejaswi, M Mannan, A Youssef - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
A diverse set of Internet of Things (IoT) devices are becoming an integrated part of daily
lives, and playing an increasingly vital role in various industry, enterprise and agricultural …

Rethinking the security of IoT from the perspective of developer customized device-cloud interaction

Y Zhang, J Li, D Gu - Proceedings of the 37th ACM/SIGAPP Symposium …, 2022 - dl.acm.org
IoT cloud involved communication is widely deployed due to its various services. While IoT
clouds provide many strong security mechanisms, lots of IoT devices are still configured with …

Security vulnerabilities in consumer iot applications

A Shakdher, S Agrawal, B Yang - … on big data security on cloud …, 2019 - ieeexplore.ieee.org
Extensive penetration testing to IoT applications was conducted in this work to discover the
vulnerabilities. In addition to the study the most vulnerable security flaws defined by the …

An intent-based automation framework for securing dynamic consumer iot infrastructures

V Nagendra, A Bhattacharya, V Yegneswaran… - Proceedings of The …, 2020 - dl.acm.org
Consumer IoT networks are characterized by heterogeneous devices with diverse
functionality and programming interfaces. This lack of homogeneity makes the integration …

Discovering and understanding the security hazards in the interactions between {IoT} devices, mobile apps, and clouds on smart home platforms

W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao… - 28th USENIX security …, 2019 - usenix.org
A smart home connects tens of home devices to the Internet, where an IoT cloud runs
various home automation applications. While bringing unprecedented convenience and …

Detection and Analysis of Broken Access Control Vulnerabilities in App-Cloud Interaction in IoT

Z Zhang, F Zou, J Hong, L Chen… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
At present, there is less research on the detection of broken access control vulnerabilities in
IoT systems, mostly using state machines to analyze abnormal state transitions, and no …

Soteria: Automated {IoT} safety and security analysis

ZB Celik, P McDaniel, G Tan - 2018 USENIX annual technical …, 2018 - usenix.org
Broadly defined as the Internet of Things (IoT), the growth of commodity devices that
integrate physical processes with digital systems have changed the way we live, play and …