Z Wang, W Xie, B Wang, J Tao, E Wang - Applied Sciences, 2021 - mdpi.com
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate computing, communication, and control. Malicious attacks on CPSs can lead to both …
C Fu, Q Zeng, X Du - … USENIX Security Symposium (USENIX Security 21 …, 2021 - usenix.org
As IoT devices are integrated via automation and coupled with the physical environment, anomalies in an appified smart home, whether due to attacks or device malfunctions, may …
In smart homes, when an actuator's state changes, it sends an event notification to the IoT hub to report this change (eg, the door is unlocked). Prior works have shown that event …
W Ding, H Hu, L Cheng - Network and Distributed System Security …, 2021 - par.nsf.gov
The Internet of Things (IoT) platforms bring significant convenience for increased home automation. Especially, these platforms provide many new features for managing multiple …
D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in seemingly contradictory results and expands the boundaries of known discoveries …
Pairing schemes establish cryptographic keys to secure communication among IoT devices. Existing pairing approaches that rely on trusted central entities, human interaction, or shared …
H Chi, C Fu, Q Zeng, X Du - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices and platforms, it becomes a trend that IoT devices associated with different IoT platforms coexist in a smart home …
H Chi, Q Zeng, X Du - … USENIX Security Symposium (USENIX Security 23 …, 2023 - usenix.org
A smart home involves a variety of entities, such as IoT devices, automation applications, humans, voice assistants, and companion apps. These entities interact in the same physical …
W He, V Zhao, O Morkved, S Siddiqui… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
In smart homes, access-control policies increasingly depend on contexts, such as who is taking an action, whether there is an emergency, or whether an adult is nearby. The vast …