{6thSense}: A context-aware sensor-based attack detector for smart devices

AK Sikder, H Aksu, AS Uluagac - 26th USENIX Security Symposium …, 2017 - usenix.org
Sensors (eg, light, gyroscope, accelerometer) and sensing enabled applications on a smart
device make the applications more user-friendly and efficient. However, the current …

A context-aware framework for detecting sensor-based threats on smart devices

AK Sikder, H Aksu, AS Uluagac - IEEE Transactions on Mobile …, 2019 - ieeexplore.ieee.org
Sensors (eg, light, gyroscope, and accelerometer) and sensing-enabled applications on a
smart device make the applications more user-friendly and efficient. However, the current …

Aegis: A context-aware security framework for smart home systems

AK Sikder, L Babun, H Aksu, AS Uluagac - Proceedings of the 35th …, 2019 - dl.acm.org
Our everyday lives are expanding fast with the introduction of new Smart Home Systems
(SHSs). Today, a myriad of SHS devices and applications are widely available to users and …

A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

Semadroid: A privacy-aware sensor management framework for smartphones

Z Xu, S Zhu - Proceedings of the 5th ACM Conference on Data and …, 2015 - dl.acm.org
While mobile sensing applications are booming, the sensor management mechanisms in
current smartphone operating systems are left behind--they are incomprehensive and …

A survey on smartphones security: software vulnerabilities, malware, and attacks

MT Ahvanooey, Q Li, M Rabbani, AR Rajput - arXiv preprint arXiv …, 2020 - arxiv.org
Nowadays, the usage of smartphones and their applications have become rapidly
increasing popular in people's daily life. Over the last decade, availability of mobile money …

{ARGUS}:{Context-Based} Detection of Stealthy {IoT} Infiltration Attacks

P Rieger, M Chilese, R Mohamed, M Miettinen… - 32nd USENIX Security …, 2023 - usenix.org
IoT application domains, device diversity and connectivity are rapidly growing. IoT devices
control various functions in smart homes and buildings, smart cities, and smart factories …

[PDF][PDF] Smv-hunter: Large scale, automated detection of ssl/tls man-in-the-middle vulnerabilities in android apps

DSJSG Greenwood, ZLL Khan - Network and Distributed System …, 2014 - lilicoding.github.io
Many Android apps use SSL/TLS to transmit sensitive information securely. However,
developers often provide their own implementation of the standard SSL/TLS certificate …

WebLogger: Stealing your personal PINs via mobile web application

R Song, Y Song, Q Dong, A Hu… - 2017 9th international …, 2017 - ieeexplore.ieee.org
In recent years, various sensors have been integrated into smartphones to sense the slight
motions of human body. However, security researchers found that these sensors can not …

IotSan: Fortifying the safety of IoT systems

DT Nguyen, C Song, Z Qian… - Proceedings of the 14th …, 2018 - dl.acm.org
Today's IoT systems include event-driven smart applications (apps) that interact with sensors
and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app …