Real-time analysis of privacy-(un) aware IoT applications

L Babun, ZB Celik, P McDaniel, AS Uluagac - arXiv preprint arXiv …, 2019 - arxiv.org
Users trust IoT apps to control and automate their smart devices. These apps necessarily
have access to sensitive data to implement their functionality. However, users lack visibility …

Context-rich privacy leakage analysis through inferring apps in smart home iot

Y Luo, L Cheng, H Hu, G Peng… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Emerging Internet of Things (IoT) systems leverage connected devices to enable intelligent
and automated functionalities. Despite the benefits, there exist privacy risks of network traffic …

Are you spying on me?{Large-Scale} analysis on {IoT} data exposure through companion apps

Y Nan, X Wang, L Xing, X Liao, R Wu, J Wu… - 32nd USENIX Security …, 2023 - usenix.org
Recent research has highlighted privacy as a primary concern for IoT device users.
However, due to the challenges in conducting a large-scale study to analyze thousands of …

Understanding iot security from a market-scale perspective

X Jin, S Manandhar, K Kafle, Z Lin… - Proceedings of the 2022 …, 2022 - dl.acm.org
Consumer IoT products and services are ubiquitous; yet, a proper characterization of
consumer IoT security is infeasible without an understanding of what IoT products are on the …

Securing cross-app interactions in IoT platforms

M Balliu, M Merro, M Pasqua - 2019 IEEE 32nd computer …, 2019 - ieeexplore.ieee.org
IoT platforms enable users to connect various smart devices and online services via reactive
apps running on the cloud. These apps, often developed by third-parties, perform simple …

Soteria: Automated {IoT} safety and security analysis

ZB Celik, P McDaniel, G Tan - 2018 USENIX annual technical …, 2018 - usenix.org
Broadly defined as the Internet of Things (IoT), the growth of commodity devices that
integrate physical processes with digital systems have changed the way we live, play and …

Iotflow: Inferring iot device behavior at scale through static mobile companion app analysis

D Schmidt, C Tagliaro, K Borgolte… - Proceedings of the 2023 …, 2023 - dl.acm.org
The number of" smart''devices, that is, devices making up the Internet of Things (IoT), is
steadily growing. They suffer from vulnerabilities just as other software and hardware …

Securing iot apps

M Balliu, I Bastys, A Sabelfeld - IEEE Security & Privacy, 2019 - ieeexplore.ieee.org
Users increasingly rely on Internet of Things (IoT) apps to manage their digital lives through
the overwhelming diversity of IoT services and devices. Are the IoT app platforms doing …

Sensitive information tracking in commodity {IoT}

ZB Celik, L Babun, AK Sikder, H Aksu, G Tan… - 27th USENIX Security …, 2018 - usenix.org
Broadly defined as the Internet of Things (IoT), the growth of commodity devices that
integrate physical processes with digital connectivity has had profound effects on society …

PGFit: Static permission analysis of health and fitness apps in IoT programming frameworks

M Nobakht, Y Sui, A Seneviratne, W Hu - Journal of Network and Computer …, 2020 - Elsevier
Abstract Popular Internet of Things (IoT) programming frameworks, such as Google Fit,
enable third-party developers to build apps that store and retrieve user data from a variety of …