A survey on IoT-enabled home automation systems: Attacks and defenses

Z Wang, D Liu, Y Sun, X Pang, P Sun… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …

[PDF][PDF] Evasion attacks and defenses on smart home physical event verification

MO Ozmen, R Song, H Farrukh, ZB Celik - Network and Distributed …, 2023 - par.nsf.gov
In smart homes, when an actuator's state changes, it sends an event notification to the IoT
hub to report this change (eg, the door is unlocked). Prior works have shown that event …

Data transparency design in internet of things: a systematic review

Y Long, X Luo, Y Zhu, KP Lee… - International Journal of …, 2023 - Taylor & Francis
Data transparency plays a critical role in understanding IoT privacy practices and making
informed decisions. To gain a comprehensive understanding of transparency in the IoT …

One key to rule them all: Secure group pairing for heterogeneous iot devices

H Farrukh, MO Ozmen, FK Ors… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Pairing schemes establish cryptographic keys to secure communication among IoT devices.
Existing pairing approaches that rely on trusted central entities, human interaction, or shared …

Discovering adversarial driving maneuvers against autonomous vehicles

R Song, MO Ozmen, H Kim, R Muller, ZB Celik… - 32nd USENIX Security …, 2023 - usenix.org
Over 33% of vehicles sold in 2021 had integrated autonomous driving (AD) systems. While
many adversarial machine learning attacks have been studied against these systems, they …

Detecting and Handling {IoT} Interaction Threats in {Multi-Platform}{Multi-Control-Channel} Smart Homes

H Chi, Q Zeng, X Du - … USENIX Security Symposium (USENIX Security 23 …, 2023 - usenix.org
A smart home involves a variety of entities, such as IoT devices, automation applications,
humans, voice assistants, and companion apps. These entities interact in the same physical …

Iot anomaly detection via device interaction graph

J Wang, Z Li, M Sun, B Yuan… - 2023 53rd Annual IEEE …, 2023 - ieeexplore.ieee.org
With diverse functionalities and advanced platform applications, Internet of Things (IoT)
devices extensively interact with each other, and these interactions govern the legitimate …

Istelan: Disclosing sensitive user information by mobile magnetometer from finger touches

R Mohamed, H Farrukh, Y Lu, H Wang… - Proceedings on Privacy …, 2023 - petsymposium.org
We show a new type of side-channel leakage in which the built-in magnetometer sensor in
Apple's mobile devices captures touch events of users. When a conductive material such as …

Security Checking of Trigger-Action-Programming Smart Home Integrations

L Bu, Q Zhang, S Li, J Dai, G Bai, K Chen… - Proceedings of the 32nd …, 2023 - dl.acm.org
Internet of Things (IoT) has become prevalent in various fields, especially in the context of
home automation (HA). To better control HA-IoT devices, especially to integrate several …

Stealthy attacks formalized as STL formulas for Falsification of CPS Security

A Chandratre, T Hernandez Acosta… - Proceedings of the 26th …, 2023 - dl.acm.org
We propose a framework for security vulnerability analysis for Cyber-Physical Systems
(CPS). Our framework imposes only minimal assumptions on the structure of the CPS …