Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities

ZB Celik, E Fernandes, E Pauley, G Tan… - ACM Computing …, 2019 - dl.acm.org
Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart
homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive …

Information exposure from consumer iot devices: A multidimensional, network-informed measurement approach

J Ren, DJ Dubois, D Choffnes, AM Mandalari… - Proceedings of the …, 2019 - dl.acm.org
Internet of Things (IoT) devices are increasingly found in everyday homes, providing useful
functionality for devices such as TVs, smart speakers, and video doorbells. Along with their …

HomeSnitch: behavior transparency and control for smart home IoT devices

TJ OConnor, R Mohamed, M Miettinen… - Proceedings of the 12th …, 2019 - dl.acm.org
The widespread adoption of smart home IoT devices has led to a broad and heterogeneous
market with flawed security designs and privacy concerns. While the quality of IoT device …

Aegis: A context-aware security framework for smart home systems

AK Sikder, L Babun, H Aksu, AS Uluagac - Proceedings of the 35th …, 2019 - dl.acm.org
Our everyday lives are expanding fast with the introduction of new Smart Home Systems
(SHSs). Today, a myriad of SHS devices and applications are widely available to users and …

Peeves: Physical event verification in smart homes

S Birnbach, S Eberz - 2019 - ora.ox.ac.uk
This report contains the documentation of the smart home event and sensor dataset
collected and used in the paper” Peeves: Physical Event Verification in Smart Homes”[1] …

Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things

TJ OConnor, W Enck, B Reaves - … of the 12th Conference on Security …, 2019 - dl.acm.org
The always-on, always-connected nature of smart home devices complicates Internet-of-
Things (IoT) security and privacy. Unlike traditional hosts, IoT devices constantly send …

Real-time analysis of privacy-(un) aware IoT applications

L Babun, ZB Celik, P McDaniel, AS Uluagac - arXiv preprint arXiv …, 2019 - arxiv.org
Users trust IoT apps to control and automate their smart devices. These apps necessarily
have access to sensitive data to implement their functionality. However, users lack visibility …

A context-aware framework for detecting sensor-based threats on smart devices

AK Sikder, H Aksu, AS Uluagac - IEEE Transactions on Mobile …, 2019 - ieeexplore.ieee.org
Sensors (eg, light, gyroscope, and accelerometer) and sensing-enabled applications on a
smart device make the applications more user-friendly and efficient. However, the current …

PingPong: Packet-level signatures for smart home device events

R Trimananda, J Varmarken, A Markopoulou… - arXiv preprint arXiv …, 2019 - arxiv.org
Smart home devices are vulnerable to passive inference attacks based on network traffic,
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …

Protecting IoT-environments against traffic analysis attacks with traffic morphing

I Hafeez, M Antikainen… - 2019 IEEE international …, 2019 - ieeexplore.ieee.org
Traffic analysis attacks allow an attacker to infer sensitive information about users by
analyzing network traffic of user devices. These attacks are passive in nature and are difficult …