T Van Ede, R Bortolameotti, A Continella… - Network and distributed …, 2020 - par.nsf.gov
Mobile-application fingerprinting of network traffic is valuable for many security solutions as it provides insights into the apps active on a network. Unfortunately, existing techniques …
mart home devices are vulnerable to passive inference attacks based on network traffic, even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
The modern Internet of Things (IoT)-based smart home is a challenging environment to secure: devices change, new vulnerabilities are discovered and often remain unpatched …
Y Wan, K Xu, G Xue, F Wang - IEEE INFOCOM 2020-IEEE …, 2020 - ieeexplore.ieee.org
The wide deployment of IoT systems in smart homes has changed the landscape of networked systems, Internet traffic, and data communications in residential broadband …
Cyber-security risks for Internet of Things (IoT) devices sourced from a diversity of vendors and deployed in large numbers, are growing rapidly. Therefore, management of these …
In a smart home system, multiple users have access to multiple devices, typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider …
The ubiquity of Internet of Things (IoT) and our growing reliance on IoT apps are leaving us more vulnerable to safety and security threats than ever before. Many of these threats are …
L Fang, Y Li, Z Liu, C Yin, M Li… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The application of the Internet of Things (IoT) in medical field has brought unprecedented convenience to human beings. However, attackers can use device configuration …
S Dong, Z Li, D Tang, J Chen, M Sun… - Proceedings of the 15th …, 2020 - dl.acm.org
The IoT (Internet of Things) technology has been widely adopted in recent years and has profoundly changed the people's daily lives. However, in the meantime, such a fast-growing …