Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events

C Fu, X Du, Q Zeng, Z Zhao, F Zuo, J Di - Proceedings of the 17th ACM …, 2024 - dl.acm.org
Along with the increasing popularity of smart home IoT devices, more users are turning to
smart home automation platforms to control and automate their IoT devices. However, IoT …

Compromised IoT Devices Detection in Smart Home via Semantic Information

K Li, Z Li, Z Gu, J Guo, Z Wang… - ICC 2022-IEEE …, 2022 - ieeexplore.ieee.org
The safety and security of IoT devices in smart home systems is attracting booming attention,
due to the cascading threat introduced by the interoperability of IoT devices. It is observed …

EScope: Effective event validation for IoT systems based on state correlation

J Mao, X Xu, Q Lin, L Ma, J Liu - Big Data Mining and Analytics, 2023 - ieeexplore.ieee.org
Typical Internet of Things (IoT) systems are event-driven platforms, in which smart sensing
devices sense or subscribe to events (device state changes), and react according to the …

Iotargos: A multi-layer security monitoring system for internet-of-things in smart homes

Y Wan, K Xu, G Xue, F Wang - IEEE INFOCOM 2020-IEEE …, 2020 - ieeexplore.ieee.org
The wide deployment of IoT systems in smart homes has changed the landscape of
networked systems, Internet traffic, and data communications in residential broadband …

[PDF][PDF] Evasion Attacks and Defenses on Smart Home Physical Event Verification.

MO Ozmen, R Song, H Farrukh, ZB Celik - NDSS, 2023 - researchgate.net
In smart homes, when an actuator's state changes, it sends an event notification to the IoT
hub to report this change (eg, the door is unlocked). Prior works have shown that event …

Network security for home iot devices must involve the user: a position paper

L De Carli, A Mignano - Foundations and Practice of Security: 13th …, 2021 - Springer
Many home IoT devices suffer from poor security design and confusing interfaces, lowering
the bar for successful cyberattacks. A popular approach to identify compromised IoT devices …

{ARGUS}:{Context-Based} Detection of Stealthy {IoT} Infiltration Attacks

P Rieger, M Chilese, R Mohamed, M Miettinen… - 32nd USENIX Security …, 2023 - usenix.org
IoT application domains, device diversity and connectivity are rapidly growing. IoT devices
control various functions in smart homes and buildings, smart cities, and smart factories …

Traditional IOCs Meet Dynamic App-Device Interactions for IoT-Specific Threat Intelligence

S Smolyakova, E Khodayarseresht… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
While enjoying widespread popularity, IoT faces numerous threats using both traditional (eg,
Common Vulnerabilities and Exposures (CVEs) and Common Weakness Enumerations …

IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System to Mitigate Trigger-action IoT Attacks

MM Alam, I Jahan, W Wang - arXiv preprint arXiv:2401.08141, 2024 - arxiv.org
In trigger-action IoT platforms, IoT devices report event conditions to IoT hubs notifying their
cyber states and let the hubs invoke actions in other IoT devices based on functional …

SSH-BA: Safeguarding Smart Homes with Intelligent IoT Behavior Analysis Using Classification Techniques

A Khan, I Sharma - 2024 21st Learning and Technology …, 2024 - ieeexplore.ieee.org
Smart home technologies automate regular operations like temperatures and lighting
reacting to voice commands, making life easier. Smartphones allow homeowners to …