[PDF][PDF] Evasion attacks and defenses on smart home physical event verification

MO Ozmen, R Song, H Farrukh, ZB Celik - Network and Distributed …, 2023 - par.nsf.gov
In smart homes, when an actuator's state changes, it sends an event notification to the IoT
hub to report this change (eg, the door is unlocked). Prior works have shown that event …

Haunted house: physical smart home event verification in the presence of compromised sensors

S Birnbach, S Eberz, I Martinovic - ACM Transactions on Internet of …, 2022 - dl.acm.org
In this article, we verify physical events using data from an ensemble of smart home sensors.
This approach both protects against event sensor faults and sophisticated attackers. To …

{HAWatcher}:{Semantics-Aware} anomaly detection for appified smart homes

C Fu, Q Zeng, X Du - … USENIX Security Symposium (USENIX Security 21 …, 2021 - usenix.org
As IoT devices are integrated via automation and coupled with the physical environment,
anomalies in an appified smart home, whether due to attacks or device malfunctions, may …

Detecting and Handling {IoT} Interaction Threats in {Multi-Platform}{Multi-Control-Channel} Smart Homes

H Chi, Q Zeng, X Du - … USENIX Security Symposium (USENIX Security 23 …, 2023 - usenix.org
A smart home involves a variety of entities, such as IoT devices, automation applications,
humans, voice assistants, and companion apps. These entities interact in the same physical …

Discovering IoT physical channel vulnerabilities

MO Ozmen, X Li, A Chu, ZB Celik, B Hoxha… - Proceedings of the 2022 …, 2022 - dl.acm.org
Smart homes contain diverse sensors and actuators controlled by IoT apps that provide
custom automation. Prior works showed that an adversary could exploit physical interaction …

{ARGUS}:{Context-Based} Detection of Stealthy {IoT} Infiltration Attacks

P Rieger, M Chilese, R Mohamed, M Miettinen… - 32nd USENIX Security …, 2023 - usenix.org
IoT application domains, device diversity and connectivity are rapidly growing. IoT devices
control various functions in smart homes and buildings, smart cities, and smart factories …

Fear and logging in the internet of things

Q Wang, WU Hassan, A Bates, C Gunter - Network and Distributed …, 2018 - par.nsf.gov
As the Internet of Things (IoT) continues to proliferate, diagnosing incorrect behavior within
increasingly-automated homes becomes considerably more difficult. Devices and apps may …

IotSan: Fortifying the safety of IoT systems

DT Nguyen, C Song, Z Qian… - Proceedings of the 14th …, 2018 - dl.acm.org
Today's IoT systems include event-driven smart applications (apps) that interact with sensors
and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app …

Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things

TJ OConnor, W Enck, B Reaves - … of the 12th Conference on Security …, 2019 - dl.acm.org
The always-on, always-connected nature of smart home devices complicates Internet-of-
Things (IoT) security and privacy. Unlike traditional hosts, IoT devices constantly send …

Discovering and understanding the security hazards in the interactions between {IoT} devices, mobile apps, and clouds on smart home platforms

W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao… - 28th USENIX security …, 2019 - usenix.org
A smart home connects tens of home devices to the Internet, where an IoT cloud runs
various home automation applications. While bringing unprecedented convenience and …