A survey on IoT-enabled home automation systems: Attacks and defenses

Z Wang, D Liu, Y Sun, X Pang, P Sun… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …

Charting the attack surface of trigger-action IoT platforms

Q Wang, P Datta, W Yang, S Liu, A Bates… - Proceedings of the 2019 …, 2019 - dl.acm.org
Internet of Things (IoT) deployments are becoming increasingly automated and vastly more
complex. Facilitated by programming abstractions such as trigger-action rules, end-users …

Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions

X Chen, X Zhang, M Elliot, X Wang, F Wang - Computers & Security, 2022 - Elsevier
Abstract The Internet of Things (IoT) connects all emerging devices and services while
creating interactions between people and things. Allowing users to match devices and …

[PDF][PDF] IoTSafe: Enforcing Safety and Security Policy withReal IoT Physical Interaction Discovery

W Ding, H Hu, L Cheng - Network and Distributed System Security …, 2021 - par.nsf.gov
The Internet of Things (IoT) platforms bring significant convenience for increased home
automation. Especially, these platforms provide many new features for managing multiple …

“I would have to evaluate their objections”: Privacy tensions between smart home device owners and incidental users

C Cobb, S Bhagavatula, KA Garrett… - Proceedings on …, 2021 - petsymposium.org
Recent research and articles in popular press have raised concerns about the privacy risks
that smart home devices can create for incidental users—people who encounter smart home …

How users interpret bugs in trigger-action programming

W Brackenbury, A Deora, J Ritchey, J Vallee… - Proceedings of the …, 2019 - dl.acm.org
Trigger-action programming (TAP) is a programming model enabling users to connect
services and devices by writing if-then rules. As such systems are deployed in increasingly …

AutoTap: Synthesizing and repairing trigger-action programs using LTL properties

L Zhang, W He, J Martinez… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
End-user programming, particularly trigger-action programming (TAP), is a popular method
of letting users express their intent for how smart devices and cloud services interact …

Scalable analysis of interaction threats in iot systems

M Alhanahnah, C Stevens, H Bagheri - Proceedings of the 29th ACM …, 2020 - dl.acm.org
The ubiquity of Internet of Things (IoT) and our growing reliance on IoT apps are leaving us
more vulnerable to safety and security threats than ever before. Many of these threats are …

Detecting and Handling {IoT} Interaction Threats in {Multi-Platform}{Multi-Control-Channel} Smart Homes

H Chi, Q Zeng, X Du - … USENIX Security Symposium (USENIX Security 23 …, 2023 - usenix.org
A smart home involves a variety of entities, such as IoT devices, automation applications,
humans, voice assistants, and companion apps. These entities interact in the same physical …

Safechain: Securing trigger-action programming from attack chains

KH Hsu, YH Chiang, HC Hsiao - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The proliferation of the Internet of Things (IoT) is reshaping our lifestyle. With IoT sensors
and devices communicating with each other via the Internet, people can customize …