A survey on IoT-enabled home automation systems: Attacks and defenses
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
[PDF][PDF] Evasion attacks and defenses on smart home physical event verification
In smart homes, when an actuator's state changes, it sends an event notification to the IoT
hub to report this change (eg, the door is unlocked). Prior works have shown that event …
hub to report this change (eg, the door is unlocked). Prior works have shown that event …
Data transparency design in internet of things: a systematic review
Data transparency plays a critical role in understanding IoT privacy practices and making
informed decisions. To gain a comprehensive understanding of transparency in the IoT …
informed decisions. To gain a comprehensive understanding of transparency in the IoT …
One key to rule them all: Secure group pairing for heterogeneous iot devices
Pairing schemes establish cryptographic keys to secure communication among IoT devices.
Existing pairing approaches that rely on trusted central entities, human interaction, or shared …
Existing pairing approaches that rely on trusted central entities, human interaction, or shared …
Discovering adversarial driving maneuvers against autonomous vehicles
Over 33% of vehicles sold in 2021 had integrated autonomous driving (AD) systems. While
many adversarial machine learning attacks have been studied against these systems, they …
many adversarial machine learning attacks have been studied against these systems, they …
Detecting and Handling {IoT} Interaction Threats in {Multi-Platform}{Multi-Control-Channel} Smart Homes
A smart home involves a variety of entities, such as IoT devices, automation applications,
humans, voice assistants, and companion apps. These entities interact in the same physical …
humans, voice assistants, and companion apps. These entities interact in the same physical …
Iot anomaly detection via device interaction graph
With diverse functionalities and advanced platform applications, Internet of Things (IoT)
devices extensively interact with each other, and these interactions govern the legitimate …
devices extensively interact with each other, and these interactions govern the legitimate …
Istelan: Disclosing sensitive user information by mobile magnetometer from finger touches
We show a new type of side-channel leakage in which the built-in magnetometer sensor in
Apple's mobile devices captures touch events of users. When a conductive material such as …
Apple's mobile devices captures touch events of users. When a conductive material such as …
Security Checking of Trigger-Action-Programming Smart Home Integrations
Internet of Things (IoT) has become prevalent in various fields, especially in the context of
home automation (HA). To better control HA-IoT devices, especially to integrate several …
home automation (HA). To better control HA-IoT devices, especially to integrate several …
Stealthy attacks formalized as STL formulas for Falsification of CPS Security
A Chandratre, T Hernandez Acosta… - Proceedings of the 26th …, 2023 - dl.acm.org
We propose a framework for security vulnerability analysis for Cyber-Physical Systems
(CPS). Our framework imposes only minimal assumptions on the structure of the CPS …
(CPS). Our framework imposes only minimal assumptions on the structure of the CPS …