A survey of public IoT datasets for network security research

F De Keersmaeker, Y Cao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Publicly available datasets are an indispensable tool for researchers, as they allow testing
new algorithms on a wide range of different scenarios and making scientific experiments …

[HTML][HTML] Blockchain Technology for IoT Security and Trust: A Comprehensive SLR

S Almarri, A Aljughaiman - Sustainability, 2024 - mdpi.com
After the emergence of the Internet of Things (IoT), the way devices interact with each other
changed, as it allowed automation and seamless communication in various fields. However …

Understanding dark patterns in home IoT devices

M Kowalczyk, JT Gunawan, D Choffnes… - Proceedings of the …, 2023 - dl.acm.org
Internet-of-Things (IoT) devices are ubiquitous, but little attention has been paid to how they
may incorporate dark patterns despite consumer protections and privacy concerns arising …

Iotflow: Inferring iot device behavior at scale through static mobile companion app analysis

D Schmidt, C Tagliaro, K Borgolte… - Proceedings of the 2023 …, 2023 - dl.acm.org
The number of" smart''devices, that is, devices making up the Internet of Things (IoT), is
steadily growing. They suffer from vulnerabilities just as other software and hardware …

Behaviot: Measuring smart home iot behavior using network-inferred behavior models

T Hu, DJ Dubois, D Choffnes - Proceedings of the 2023 ACM on Internet …, 2023 - dl.acm.org
Smart home IoT platforms are typically closed systems, meaning that there is poor visibility
into device behavior. Understanding device behavior is important not only for determining …

Hammurabi: A framework for pluggable, logic-based X. 509 certificate validation policies

J Larisch, W Aqeel, M Lum, Y Goldschlag… - Proceedings of the …, 2022 - dl.acm.org
This paper proposes using a logic programming language to disentangle X. 509 certificate
validation policy from mechanism. Expressing validation policies in a logic programming …

HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants

J Carrillo-Mondéjar, H Turtiainen… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) devices and their firmware are notorious for their lifelong
vulnerabilities. As device infection increases, vendors also fail to release patches at a …

MetaVRadar: Measuring Metaverse Virtual Reality Network Activity

M Lyu, RD Tripathi, V Sivaraman - … of the ACM on Measurement and …, 2023 - dl.acm.org
The" metaverse", wherein users can enter virtual worlds to work, study, play, shop, socialize,
and entertain, is fast becoming a reality, attracting billions of dollars in investment from …

Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting

E Papadogiannaki, S Ioannidis - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The growing adoption of network encryption protocols, like TLS, has altered the scene of
monitoring network traffic. With the advent increase in network encryption, typical DPI …

Connecting the Dots: Tracing Data Endpoints in IoT Devices

M Jakaria, DY Huang, A Das - Proceedings on Privacy …, 2024 - petsymposium.org
Smart home devices are constantly exchanging data with a variety of remote endpoints. This
data encompasses diverse information, from device operation and status to sensitive user …