A survey on IoT-enabled home automation systems: Attacks and defenses

Z Wang, D Liu, Y Sun, X Pang, P Sun… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …

A survey on blockchain, SDN and NFV for the smart-home security

M Bhuyan, S Kashihara, D Fall, Y Taenaka… - Internet of Things, 2022 - Elsevier
Due to millions of loosely coupled devices, the smart-home security is gaining the attention
of industry professionals, attackers, and academic researchers. The smart home is a typical …

Chatbots to chatgpt in a cybersecurity space: Evolution, vulnerabilities, attacks, challenges, and future recommendations

A Qammar, H Wang, J Ding, A Naouri… - arXiv preprint arXiv …, 2023 - arxiv.org
Chatbots shifted from rule-based to artificial intelligence techniques and gained traction in
medicine, shopping, customer services, food delivery, education, and research. OpenAI …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

AI invading the workplace: negative emotions towards the organizational use of personal virtual assistants

O Hornung, S Smolnik - Electronic Markets, 2022 - Springer
Personal virtual assistants (PVAs) based on artificial intelligence are frequently used in
private contexts but have yet to find their way into the workplace. Regardless of their …

Scrutinizing privacy policy compliance of virtual personal assistant apps

F Xie, Y Zhang, C Yan, S Li, L Bu, K Chen… - Proceedings of the 37th …, 2022 - dl.acm.org
A large number of functionality-rich and easily accessible applications have become popular
among various virtual personal assistant (VPA) services such as Amazon Alexa. VPA …

Tracking, profiling, and ad targeting in the Alexa echo smart speaker ecosystem

U Iqbal, PN Bahrami, R Trimananda, H Cui… - Proceedings of the …, 2023 - dl.acm.org
Smart speakers collect voice commands, which can be used to infer sensitive information
about users. Given the potential for privacy harms, there is a need for greater transparency …

{OVRseen}: Auditing network traffic and privacy policies in oculus {VR}

R Trimananda, H Le, H Cui, JT Ho, A Shuba… - 31st USENIX security …, 2022 - usenix.org
Virtual reality (VR) is an emerging technology that enables new applications but also
introduces privacy risks. In this paper, we focus on Oculus VR (OVR), the leading platform in …

Hello me, meet the real me: Voice synthesis attacks on voice assistants

D Bilika, N Michopoulou, E Alepis, C Patsakis - Computers & Security, 2024 - Elsevier
The radical advances in telecommunications and computer science have enabled a myriad
of applications and novel seamless interactions with computing interfaces. Voice Assistants …

{SkillDetective}: Automated {Policy-Violation} detection of voice assistant applications in the wild

J Young, S Liao, L Cheng, H Hu, H Deng - 31st USENIX Security …, 2022 - usenix.org
Today's voice personal assistant (VPA) services have been largely expanded by allowing
third-party developers to build voice-apps and publish them to marketplaces (eg, the …