Machine learning-powered encrypted network traffic analysis: A comprehensive survey

M Shen, K Ye, X Liu, L Zhu, J Kang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …

A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

A survey on internet of things security: Requirements, challenges, and solutions

H HaddadPajouh, A Dehghantanha, RM Parizi… - Internet of Things, 2021 - Elsevier
Abstract Internet of Things (IoT) is one of the most promising technologies that aims to
enhance humans' quality of life (QoL). IoT plays a significant role in several fields such as …

A survey of compiler testing

J Chen, J Patra, M Pradel, Y Xiong, H Zhang… - ACM Computing …, 2020 - dl.acm.org
Virtually any software running on a computer has been processed by a compiler or a
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …

A survey on IoT-enabled home automation systems: Attacks and defenses

Z Wang, D Liu, Y Sun, X Pang, P Sun… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …

Packet-level signatures for smart home devices

R Trimananda, J Varmarken, A Markopoulou… - Network and …, 2020 - par.nsf.gov
mart home devices are vulnerable to passive inference attacks based on network traffic,
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …

{HAWatcher}:{Semantics-Aware} anomaly detection for appified smart homes

C Fu, Q Zeng, X Du - … USENIX Security Symposium (USENIX Security 21 …, 2021 - usenix.org
As IoT devices are integrated via automation and coupled with the physical environment,
anomalies in an appified smart home, whether due to attacks or device malfunctions, may …

Securing consumer IoT in the smart home: Architecture, challenges, and countermeasures

Y Meng, W Zhang, H Zhu… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
The consumer Internet of Things (IoT) platforms are gaining high popularity. However, due to
the open nature of wireless communications, smart home platforms are facing many new …

HomeSnitch: Behavior transparency and control for smart home IoT devices

TJ OConnor, R Mohamed, M Miettinen… - Proceedings of the 12th …, 2019 - dl.acm.org
The widespread adoption of smart home IoT devices has led to a broad and heterogeneous
market with flawed security designs and privacy concerns. While the quality of IoT device …

[HTML][HTML] The digital harms of smart home devices: A systematic literature review

D Buil-Gil, S Kemp, S Kuenzel, L Coventry… - Computers in Human …, 2023 - Elsevier
The connection of home electronic devices to the internet allows remote control of physical
devices and involves the collection of large volumes of data. With the increase in the uptake …