A survey on IoT-enabled home automation systems: Attacks and defenses
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
A survey on blockchain, SDN and NFV for the smart-home security
Due to millions of loosely coupled devices, the smart-home security is gaining the attention
of industry professionals, attackers, and academic researchers. The smart home is a typical …
of industry professionals, attackers, and academic researchers. The smart home is a typical …
Chatbots to chatgpt in a cybersecurity space: Evolution, vulnerabilities, attacks, challenges, and future recommendations
Chatbots shifted from rule-based to artificial intelligence techniques and gained traction in
medicine, shopping, customer services, food delivery, education, and research. OpenAI …
medicine, shopping, customer services, food delivery, education, and research. OpenAI …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
AI invading the workplace: negative emotions towards the organizational use of personal virtual assistants
O Hornung, S Smolnik - Electronic Markets, 2022 - Springer
Personal virtual assistants (PVAs) based on artificial intelligence are frequently used in
private contexts but have yet to find their way into the workplace. Regardless of their …
private contexts but have yet to find their way into the workplace. Regardless of their …
Scrutinizing privacy policy compliance of virtual personal assistant apps
A large number of functionality-rich and easily accessible applications have become popular
among various virtual personal assistant (VPA) services such as Amazon Alexa. VPA …
among various virtual personal assistant (VPA) services such as Amazon Alexa. VPA …
Tracking, profiling, and ad targeting in the Alexa echo smart speaker ecosystem
Smart speakers collect voice commands, which can be used to infer sensitive information
about users. Given the potential for privacy harms, there is a need for greater transparency …
about users. Given the potential for privacy harms, there is a need for greater transparency …
{OVRseen}: Auditing network traffic and privacy policies in oculus {VR}
Virtual reality (VR) is an emerging technology that enables new applications but also
introduces privacy risks. In this paper, we focus on Oculus VR (OVR), the leading platform in …
introduces privacy risks. In this paper, we focus on Oculus VR (OVR), the leading platform in …
Hello me, meet the real me: Voice synthesis attacks on voice assistants
D Bilika, N Michopoulou, E Alepis, C Patsakis - Computers & Security, 2024 - Elsevier
The radical advances in telecommunications and computer science have enabled a myriad
of applications and novel seamless interactions with computing interfaces. Voice Assistants …
of applications and novel seamless interactions with computing interfaces. Voice Assistants …
{SkillDetective}: Automated {Policy-Violation} detection of voice assistant applications in the wild
Today's voice personal assistant (VPA) services have been largely expanded by allowing
third-party developers to build voice-apps and publish them to marketplaces (eg, the …
third-party developers to build voice-apps and publish them to marketplaces (eg, the …