Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

One key to rule them all: Secure group pairing for heterogeneous iot devices

H Farrukh, MO Ozmen, FK Ors… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Pairing schemes establish cryptographic keys to secure communication among IoT devices.
Existing pairing approaches that rely on trusted central entities, human interaction, or shared …

Discovering adversarial driving maneuvers against autonomous vehicles

R Song, MO Ozmen, H Kim, R Muller, ZB Celik… - 32nd USENIX Security …, 2023 - usenix.org
Over 33% of vehicles sold in 2021 had integrated autonomous driving (AD) systems. While
many adversarial machine learning attacks have been studied against these systems, they …

Maverick: An app-independent and platform-agnostic approach to enforce policies in iot systems at runtime

MH Mazhar, L Li, E Hoque, O Chowdhury - Proceedings of the 16th ACM …, 2023 - dl.acm.org
Many solutions have been proposed to curb unexpected behavior of automation apps
installed on programmable IoT platforms by enforcing safety policies at runtime. However, all …

A Survey on Physical Event Verification in User-centric Smart Home Systems

B Huang, KY Lam - 2024 IEEE 35th International Symposium …, 2024 - ieeexplore.ieee.org
Recent advances in IoT technologies have led to the rise of home automation (HA) systems,
greatly improving users' daily life quality. With the growing use of smart devices in homes …

Physical Side-Channel Attacks against Intermittent Devices

MO Ozmen, H Farrukh, ZB Celik - Proceedings on Privacy …, 2024 - petsymposium.org
Intermittent (batteryless) devices operate solely using energy harvested from their
environment. These devices turn on when they have energy and turn off during energy …

Update If You Dare: Demystifying Bare-Metal Device Firmware Update Security of Appified IoT Systems

L Xue, Y Yan, Q Tang, L Yu, X Luo, Z Cai… - … on Dependable and …, 2024 - ieeexplore.ieee.org
Due to the economy and low power consumption features, bare-metal IoT devices have
been widely used in various areas of our life, and they are usually paired with companion …

HySense: Hybrid Event Occurrence Detection Method for IoT Devices

J Ge, J Rui, H Ma, B Li, Y He - ICASSP 2024-2024 IEEE …, 2024 - ieeexplore.ieee.org
Integrating IoT devices into physical environments through automation can result in device
state inconsistency (DSI) anomalies. These anomalies can be caused by malicious attacks …

Sales Whisperer: A Human-Inconspicuous Attack on LLM Brand Recommendations

W Lin, A Gerchanovsky, O Akgul, L Bauer… - arXiv preprint arXiv …, 2024 - arxiv.org
Large language model (LLM) users might rely on others (eg, prompting services), to write
prompts. However, the risks of trusting prompts written by others remain unstudied. In this …

On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices

S Sunar, P Shirani, S Majumdar, JD Brown - Proceedings of the 17th …, 2024 - dl.acm.org
The correct functionality (can also be called as functional integrity) from a smart device is
essential towards ensuring their safe and secure operations. The functional integrity of a …