A survey on network verification and testing with formal methods: Approaches and challenges

Y Li, X Yin, Z Wang, J Yao, X Shi, J Wu… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Networks have grown increasingly complicated. Violations of intended policies can
compromise network availability and network reliability. Network operators need to ensure …

IotSan: Fortifying the safety of IoT systems

DT Nguyen, C Song, Z Qian… - Proceedings of the 14th …, 2018 - dl.acm.org
Today's IoT systems include event-driven smart applications (apps) that interact with sensors
and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app …

Systematically ensuring the confidence of real-time home automation IoT systems

L Bu, W Xiong, CJM Liang, S Han, D Zhang… - ACM Transactions on …, 2018 - dl.acm.org
Recent advances and industry standards in Internet of Things (IoT) have accelerated the
real-world adoption of connected devices. To manage this hybrid system of digital real-time …

Systematically debugging IoT control system correctness for building automation

CJM Liang, L Bu, Z Li, J Zhang, S Han… - Proceedings of the 3rd …, 2016 - dl.acm.org
Advances and standards in Internet of Things (IoT) have simplified the realization of building
automation. However, non-expert IoT users still lack tools that can help them to ensure the …

IOTA: a calculus for internet of things automation

JL Newcomb, S Chandra, JB Jeannin… - Proceedings of the …, 2017 - dl.acm.org
Programmatically controllable home devices are proliferating, ranging from lights, locks, and
motion sensors to smart refrigerators, televisions, and cameras, giving end users …

Security Checking of Trigger-Action-Programming Smart Home Integrations

L Bu, Q Zhang, S Li, J Dai, G Bai, K Chen… - Proceedings of the 32nd …, 2023 - dl.acm.org
Internet of Things (IoT) has become prevalent in various fields, especially in the context of
home automation (HA). To better control HA-IoT devices, especially to integrate several …

Viola: Trustworthy sensor notifications for enhanced privacy on mobile systems

S Mirzamohammadi, A Amiri Sani - Proceedings of the 14th Annual …, 2016 - dl.acm.org
Modern mobile systems such as smartphones, tablets, and wearables contain a plethora of
sensors such as camera, microphone, GPS, and accelerometer. Moreover, being mobile …

Automated generation of ltl specifications for smart home iot using natural language

S Zhang, J Zhai, L Bu, M Chen… - … Design, Automation & …, 2020 - ieeexplore.ieee.org
Ordinary users can build their smart home automation system easily nowadays, but such
user-customized systems could be error-prone. Using formal verification to prove the …

Transactuations: where transactions meet the physical world

A Sengupta, T Leesatapornwongsa… - 2019 USENIX Annual …, 2019 - usenix.org
A large class of IoT applications read sensors, execute application logic, and actuate
actuators. However, the lack of high-level programming abstractions compromises …

A Survey on IoT Vulnerability Discovery

X Ban, M Ding, S Liu, C Chen, J Zhang - International Conference on …, 2022 - Springer
The introduction of the Internet of Things (IoT) ecosystem into public and private sectors has
markedly changed the way people live, work, and entertain through integrating the digital …