On the safety implications of misordered events and commands in IoT systems

F Goksel, MO Ozmen, M Reeves… - 2021 IEEE Security …, 2021 - ieeexplore.ieee.org
IoT devices, equipped with embedded actuators and sensors, provide custom automation in
the form of IoT apps. IoT apps subscribe to events and upon receipt, transmit actuation …

[PDF][PDF] Discovering physical interaction vulnerabilities in IoT deployments

MO Ozmen, X Li, ACA Chu, ZB Celik… - arXiv preprint arXiv …, 2021 - researchgate.net
ABSTRACT Internet of Things (IoT) applications drive the behavior of IoT deployments
according to installed sensors and actuators. It has recently been shown that IoT …

Ruledger: Ensuring execution integrity in trigger-action IoT platforms

J Fan, Y He, B Tang, Q Li… - IEEE INFOCOM 2021 …, 2021 - ieeexplore.ieee.org
Smart home IoT systems utilize trigger-action platforms, eg, IFTTT, to manage devices from
various vendors. These platforms allow users to define rules for automatically triggering …

Rethinking the security of IoT from the perspective of developer customized device-cloud interaction

Y Zhang, J Li, D Gu - Proceedings of the 37th ACM/SIGAPP Symposium …, 2022 - dl.acm.org
IoT cloud involved communication is widely deployed due to its various services. While IoT
clouds provide many strong security mechanisms, lots of IoT devices are still configured with …

An actuation conflicts management flow for smart iot-based systems

G Rocher, T Gonnin, F Dechavanne… - … on Internet of Things …, 2020 - ieeexplore.ieee.org
IoT-based applications have long been limited to collecting field information; at the edge of
their underlying infrastructure, IoT devices utilization is mainly motivated by their capacity at …

Multi-platform application interaction extraction for iot devices

Z Chen, F Zeng, T Lu, W Shu - 2019 IEEE 25th international …, 2019 - ieeexplore.ieee.org
IoT devices used in smart home have become a fundamental part of modern society. Such
devices enable our living space to be more convenient. This enables human interaction with …

Discovering and understanding the security hazards in the interactions between {IoT} devices, mobile apps, and clouds on smart home platforms

W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao… - 28th USENIX security …, 2019 - usenix.org
A smart home connects tens of home devices to the Internet, where an IoT cloud runs
various home automation applications. While bringing unprecedented convenience and …

OAT: Attesting operation integrity of embedded devices

Z Sun, B Feng, L Lu, S Jha - 2020 IEEE Symposium on Security …, 2020 - ieeexplore.ieee.org
Due to the wide adoption of IoT/CPS systems, embedded devices (IoT frontends) become
increasingly connected and mission-critical, which in turn has attracted advanced attacks …

Towards IoT security automation and orchestration

Y Zheng, A Pal, S Abuadbba… - 2020 Second IEEE …, 2020 - ieeexplore.ieee.org
The massive boom of Internet of Things (IoT) has led to the explosion of smart IoT devices
and the emergence of various applications such as smart cities, smart grids, smart mining …

Ensuring compliance of IoT devices with their privacy policy agreement

A Subahi, G Theodorakopoulos - 2018 IEEE 6th International …, 2018 - ieeexplore.ieee.org
In the past few years, Internet of Things (IoT) devices have emerged and spread
everywhere. Many researchers have been motivated to study the security issues of IoT …