[HTML][HTML] The digital harms of smart home devices: A systematic literature review

D Buil-Gil, S Kemp, S Kuenzel, L Coventry… - Computers in Human …, 2023 - Elsevier
The connection of home electronic devices to the internet allows remote control of physical
devices and involves the collection of large volumes of data. With the increase in the uptake …

On the use of artificial intelligence to deal with privacy in IoT systems: A systematic literature review

G Giordano, F Palomba, F Ferrucci - Journal of Systems and Software, 2022 - Elsevier
Abstract The Internet of Things (IoT) refers to a network of Internet-enabled devices that can
make different operations, like sensing, communicating, and reacting to changes arising in …

Spying through your voice assistants: realistic voice command fingerprinting

D Ahmed, A Sabir, A Das - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Voice assistants are becoming increasingly pervasive due to the convenience and
automation they provide through the voice interface. However, such convenience often …

[HTML][HTML] Robust open-set classification for encrypted traffic fingerprinting

T Dahanayaka, Y Ginige, Y Huang, G Jourjon… - Computer Networks, 2023 - Elsevier
Encrypted network traffic has been known to leak information about their underlying content
through side-channel information leaks. Traffic fingerprinting attacks exploit this by using …

A survey on amazon alexa attack surfaces

Y Lit, S Kim, E Sy - 2021 IEEE 18th Annual Consumer …, 2021 - ieeexplore.ieee.org
Since being launched in 2014, Alexa, Amazon's versatile cloud-based voice service, is now
active in over 100 million households worldwide [1]. Alexa's user-friendly, personalized …

Are you really muted?: A privacy analysis of mute buttons in video conferencing apps

Y Yang, J West, GK Thiruvathukal… - arXiv preprint arXiv …, 2022 - arxiv.org
Video conferencing apps (VCAs) make it possible for previously private spaces--bedrooms,
living rooms, and kitchens--into semi-public extensions of the office. For the most part, users …

Designing a Forensic-Ready Wi-Fi Access Point for the Internet of Things

F Palmese, AEC Redondi… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Recent advances in the Internet of Things are leading to a proliferation of smart devices in
our daily life. Having so many connected devices around us potentially introduces new …

Sok: Privacy-enhancing smart home hubs

I Zavalyshyn, A Legay, A Rath… - Proceedings on Privacy …, 2022 - petsymposium.org
Smart homes are IoT systems enabling the automation of household operation. The
unrestricted collection and processing of data by smart home systems raises legitimate …

FingerprinTV: Fingerprinting Smart TV Apps

J Varmarken, J Al Aaraj, R Trimananda… - Proceedings on Privacy …, 2022 - par.nsf.gov
This paper proposes FingerprinTV, a fully automated methodology for extracting fingerprints
from the network traffic of smart TV apps and assessing their performance. FingerprinTV (1) …

Classification of encrypted IoT traffic despite padding and shaping

A Engelberg, A Wool - Proceedings of the 21st Workshop on Privacy in …, 2022 - dl.acm.org
It is well-known that when IoT traffic is unencrypted it is possible to identify the active devices
based on their TCP/IP headers. And when traffic is encrypted, packet-sizes and timings can …