A survey on IoT-enabled home automation systems: Attacks and defenses
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
Charting the attack surface of trigger-action IoT platforms
Internet of Things (IoT) deployments are becoming increasingly automated and vastly more
complex. Facilitated by programming abstractions such as trigger-action rules, end-users …
complex. Facilitated by programming abstractions such as trigger-action rules, end-users …
Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions
Abstract The Internet of Things (IoT) connects all emerging devices and services while
creating interactions between people and things. Allowing users to match devices and …
creating interactions between people and things. Allowing users to match devices and …
[PDF][PDF] IoTSafe: Enforcing Safety and Security Policy withReal IoT Physical Interaction Discovery
The Internet of Things (IoT) platforms bring significant convenience for increased home
automation. Especially, these platforms provide many new features for managing multiple …
automation. Especially, these platforms provide many new features for managing multiple …
“I would have to evaluate their objections”: Privacy tensions between smart home device owners and incidental users
C Cobb, S Bhagavatula, KA Garrett… - Proceedings on …, 2021 - petsymposium.org
Recent research and articles in popular press have raised concerns about the privacy risks
that smart home devices can create for incidental users—people who encounter smart home …
that smart home devices can create for incidental users—people who encounter smart home …
How users interpret bugs in trigger-action programming
W Brackenbury, A Deora, J Ritchey, J Vallee… - Proceedings of the …, 2019 - dl.acm.org
Trigger-action programming (TAP) is a programming model enabling users to connect
services and devices by writing if-then rules. As such systems are deployed in increasingly …
services and devices by writing if-then rules. As such systems are deployed in increasingly …
AutoTap: Synthesizing and repairing trigger-action programs using LTL properties
End-user programming, particularly trigger-action programming (TAP), is a popular method
of letting users express their intent for how smart devices and cloud services interact …
of letting users express their intent for how smart devices and cloud services interact …
Scalable analysis of interaction threats in iot systems
The ubiquity of Internet of Things (IoT) and our growing reliance on IoT apps are leaving us
more vulnerable to safety and security threats than ever before. Many of these threats are …
more vulnerable to safety and security threats than ever before. Many of these threats are …
Detecting and Handling {IoT} Interaction Threats in {Multi-Platform}{Multi-Control-Channel} Smart Homes
A smart home involves a variety of entities, such as IoT devices, automation applications,
humans, voice assistants, and companion apps. These entities interact in the same physical …
humans, voice assistants, and companion apps. These entities interact in the same physical …
Safechain: Securing trigger-action programming from attack chains
The proliferation of the Internet of Things (IoT) is reshaping our lifestyle. With IoT sensors
and devices communicating with each other via the Internet, people can customize …
and devices communicating with each other via the Internet, people can customize …