IoTGaze: IoT security enforcement via wireless context analysis

T Gu, Z Fang, A Abhishek, H Fu, P Hu… - IEEE INFOCOM 2020 …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) has become the most promising technology for service automation,
monitoring, and interconnection, etc. However, the security and privacy issues caused by IoT …

Towards learning-automation IoT attack detection through reinforcement learning

T Gu, A Abhishek, H Fu, H Zhang… - 2020 IEEE 21st …, 2020 - ieeexplore.ieee.org
As a massive number of the Internet of Things (IoT) devices are deployed, the security and
privacy issues in IoT arouse more and more attention. The IoT attacks are causing …

A Survey on Verification of Security and Safety in IoT Systems

L Abuserrieh, MH Alalfi - IEEE Access, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) has been rapidly growing in the past few years in all life disciplines.
IoT provides automation and smart control across various domains, including home …

A method for vulnerability detection by IoT network traffic analytics

U Brezolin, A Vergütz, M Nogueira - Ad Hoc Networks, 2023 - Elsevier
Abstract The Internet of Things comprises wireless devices with limited computing
resources. It targets attacks that exploit vulnerabilities such as unencrypted data transfer …

An automated context-aware IoT vulnerability assessment rule-set generator

F Hashmat, SG Abbas, S Hina, GA Shah… - Computer …, 2022 - Elsevier
While introducing unprecedented applications, Internet of Things (IoT) has simultaneously
provoked acute security challenges, in the form of the vulnerabilities. Mainly because …

Iotspy: Uncovering human privacy leakage in iot networks via mining wireless context

T Gu, Z Fang, A Abhishek… - 2020 IEEE 31st Annual …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) has been emerging as one of the most significant technologies that
may change the world. The development and deployment of IoT systems significantly …

Towards System-Level Security Analysis of IoT Using Attack Graphs

Z Fang, H Fu, T Gu, P Hu, J Song… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Most IoT systems involve IoT devices, communication protocols, remote cloud, IoT
applications, mobile apps, and the physical environment. However, existing IoT security …

Detecting Smart Home Automation Application Interferences with Domain Knowledge

T Wang, W Chen, L Liu, G Wu, J Wei… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
Trigger-action programming (TAP) is a widely used development paradigm that simplifies
the Internet of Things (loT) automation. However, the exceptional interactions between …

A Survey of Analysis Methods for Security and Safety verification in IoT Systems

L Abuserrieh, MH Alalfi - arXiv preprint arXiv:2203.01464, 2022 - arxiv.org
Internet of Things (IoT) has been rapidly growing in the past few years in all life disciplines.
IoT provides automation and smart control to its users in different domains such as home …

Iota: A framework for analyzing system-level security of iots

Z Fang, H Fu, T Gu, P Hu, J Song… - 2022 IEEE/ACM …, 2022 - ieeexplore.ieee.org
Most IoT systems involve IoT devices, communication protocols, remote cloud, IoT
applications, mobile apps, and the physical environment. However, existing IoT security …