[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article
Open access

Aegis+: A Context-aware Platform-independent Security Framework for Smart Home Systems

Published: 11 February 2021 Publication History

Abstract

The introduction of modern Smart Home Systems (SHSs) is redefining the way we perform everyday activities. Today, myriad SHS applications and the devices they control are widely available to users. Specifically, users can easily download and install the apps from vendor-specific app markets, or develop their own, to effectively implement their SHS solutions. However, despite their benefits, app-based SHSs unfold diverse security risks. Several attacks have already been reported to SHSs and current security solutions only consider smart home devices and apps individually to detect malicious actions, rather than the context of the SHS as a whole. Thus, the current security solutions applied to SHSs cannot capture user activities and sensor-device-user interactions in a holistic fashion. To address these limitations, in this article, we introduce Aegis+, a novel context-aware platform-independent security framework to detect malicious behavior in an SHS. Specifically, Aegis+ observes the states of the connected smart home entities (sensors and devices) for different user activities and usage patterns in an SHS and builds a contextual model to differentiate between malicious and benign behavior. We evaluated the efficacy and performance of Aegis+ in multiple smart home settings (i.e., single bedroom, double bedroom, duplex) and platforms (i.e., Samsung SmartThings, Amazon Alexa) where real users perform day-to-day activities using real SHS devices. We also measured the performance of Aegis+ against five different malicious behaviors. Our detailed evaluation shows that Aegis+ can detect malicious behavior in SHS with high accuracy (over 95%) and secure the SHS regardless of the smart home layout and platforms, device configurations, installed apps, controller devices, and enforced user policies. Finally, Aegis+ yields minimum overhead to the SHS, ensuring effective deployability in real-life smart environments.

References

[1]
Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and Selcuk Uluagac. 2020. Peek-a-Boo: I see your smart home activities, even encrypted! In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 207--218.
[2]
Devdatta Akhawe and Adrienne Porter Felt. 2013. Alice in Warningland: A large-scale field study of browser security warning effectiveness. In Proceedings of the 22nd USENIX Security Symposium. 257--272.
[3]
H. Aksu, L. Babun, M. Conti, G. Tolomei, and A. S. Uluagac. 2018. Advertising in the IoT era: Vision and challenges. IEEE Commun. Mag. 56, 11 (2018), 138--144.
[4]
Federico Alegre, Ravichander Vipperla, Nicholas Evans, and Benoït Fauve. 2012. On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals. In Proceedings of the 20th European Signal Processing Conference (EUSIPCO’12). IEEE, 36--40.
[5]
Amazon Alexa. 2018. Understand the Smart Home Skill API. Retrieved from https://developer.amazon.com/en-US/docs/alexa/smarthome/understand-the-smart-home-skill-api.html.
[6]
Eirini Anthi, Lowri Williams, Małgorzata Słowińska, George Theodorakopoulos, and Pete Burnap. 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J. 6, 5 (2019), 9042--9053.
[7]
Noah Apthorpe, Danny Yuxing Huang, Dillon Reisman, Arvind Narayanan, and Nick Feamster. 2019. Keeping the smart home private with smart (er) IoT traffic shaping. Proc. Priv. Enhanc. Technol. 2019, 3 (2019), 128--148.
[8]
Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, and Nick Feamster. 2017. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. arXiv preprint arXiv:1708.05044 (2017).
[9]
Amazon AWS. 2019. Splitting the Data into Training and Evaluation Data. Retrieved from https://docs.aws.amazon.com/machine-learning/latest/dg/splitting-the-data-into-training-and-evaluation-data.html.
[10]
Leonardo Babun, Hidayet Aksu, Lucas Ryan, Kemal Akkaya, Elizabeth S. Bentley, and A. Selcuk Uluagac. 2020. Z-IoT: Passive device-class fingerprinting of ZigBee and Z-wave IoT devices. In Proceedings of the IEEE International Conference on Communications (ICC’20). IEEE, 1--7.
[11]
Leonardo Babun, Hidayet Aksu, and A. Selcuk Uluagac. 2019. A system-level behavioral detection framework for compromised CPS devices: Smart-grid case. ACM Trans. Cyber-phys. Syst. 4, 2 (Nov. 2019).
[12]
Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, and A. Selcuk Uluagac. 2019. Real-time analysis of privacy-(un) aware IoT applications. arXiv preprint arXiv:1911.10461 (2019).
[13]
Leonardo Babun, Amit Kumar Sikder, Abbas Acar, and A. Selcuk Uluagac. 2018. IoTDots: A digital forensics framework for smart environments. arXiv preprint arXiv:1809.00745 (2018).
[14]
Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. 2016. On privacy and security challenges in smart connected homes. In Proceedings of the European Intelligence and Security Informatics Conference (EISIC’16). IEEE, 172--175.
[15]
Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden voice commands. In Proceedings of the 25th USENIX Security Symposium. 513--530.
[16]
Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A. Selcuk Uluagac. 2018. Sensitive information tracking in commodity IoT. In Proceedings of the 27th USENIX Security Symposium. 1687--1704.
[17]
Z. B. Celik, P. McDaniel, G. Tan, L. Babun, and A. S. Uluagac. 2019. Verifying Internet of Things safety and security in physical spaces. IEEE Secur. Priv. 17, 5 (2019), 30--37.
[18]
Antorweep Chakravorty, Tomasz Wlodarczyk, and Chunming Rong. 2013. Privacy preserving data analytics for smart homes. In Proceedings of the IEEE Security and Privacy Workshops (SPW’13). IEEE, 23--27.
[19]
Haotian Chi, Qiang Zeng, Xiaojiang Du, and Jiaping Yu. 2018. Cross-app threats in smart homes: Categorization, detection and handling. arXiv preprint arXiv:1808.02125 (2018).
[20]
OpenHAB Community. 2017. Openhab documentation. Retrieved from http://docs.openhab.org/index.html.
[21]
Tamara Denning, Tadayoshi Kohno, and Henry M. Levy. 2013. Computer security and the modern home. Commun. ACM (Jan. 2013), 94--103.
[22]
Ali Dorri, Salil S. Kanhere, Raja Jurdak, and Praveen Gauravaram. 2017. Blockchain for IoT security and privacy: The case study of a smart home. In IEEE International Conference on Pervasive Computing and communications Workshops (PerCom workshops). IEEE, 618--623.
[23]
Earlence Fernandes, Jaeyeon Jung, and Atul Prakash. 2016. Security analysis of emerging smart home applications. In Proceedings of the IEEE Symposium on Security and Privacy (SP’16). IEEE, 636--654.
[24]
Joint Center for Housing Studies of Harvard University. 2020. America’s rental housing, 2020. Retrieved from https://www.jchs.harvard.edu/americas-rental-housing-2020.
[25]
Behrang Fouladi and Sahand Ghanoun. 2013. Honey, I’m home!!, Hacking ZWave home automation systems. Black Hat USA.
[26]
Google. 2019. Cloud AutoML. Retrieved from https://cloud.google.com/automl/.
[27]
Groovy. 2020. Groovy Metaprogramming. Retrieved from http://docs.groovy-lang.org/docs/next/html/documentation/core-metaprogramming.html.
[28]
Rachel Gunter. 2017. Making Sense of Samsung’s SmartThings Initiative. Retrieved from https://marketrealist.com/2017/12/making-sense-samsungs-smartthings-initiative.
[29]
Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, and David Wagner. 2016. Smart locks: Lessons for securing commodity internet of things devices. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, 461--472.
[30]
Philips Hue. 2018. How to develop for Hue: Hue API. Retrieved from https://developers.meethue.com/develop/hue-api/.
[31]
IoTBench. 2017. Retrieved from https://github.com/IoTBench.
[32]
Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Z. Morley Mao, Atul Prakash, and Shanghai JiaoTong University. 2017. ContexIoT: Towards providing contextual integrity to appified IoT platforms. In Proceedings of the Network and Distributed System Security Symposium.
[33]
Ah-Lian Kor, Colin Pattinson, Max Yanovsky, and Vyacheslav Kharchenko. 2018. IoT-enabled smart living. In Technology for Smart Futures. Springer, 3--28.
[34]
Changmin Lee, Luca Zappaterra, Kwanghee Choi, and Hyeong-Ah Choi. 2014. Securing smart home: Technologies, security challenges, and security requirements. In Proceedings of the IEEE Conference on Communications and Network Security (CNS’14). IEEE, 67--72.
[35]
LIFX. 2018. LIFX http API. Retrieved from https://api.developer.lifx.com/.
[36]
Teddy Mantoro, Media A. Ayu, and Siti Munawwarah binti Mahmod. 2014. Securing the authentication and message integrity for Smart Home using smart phone. In Proceedings of the International Conference on Multimedia Computing and Systems (ICMCS’14). IEEE, 985--989.
[37]
Microsoft. 2020. Windows IoT core documentation. Retrieved from https://developer.microsoft.com/en-us/windows/IoT/explore/IoTcore.
[38]
Byungho Min and Vijay Varadharajan. 2015. Design and evaluation of feature distributed malware attacks against the Internet of Things (IoT). In Proceedings of the 20th International Conference on Engineering of Complex Computer Systems (ICECCS’15). IEEE, 80--89.
[39]
Mujahid Mohsin, Zahid Anwar, Ghaith Husari, Ehab Al-Shaer, and Mohammad Ashiqur Rahman. 2016. IoTSAT: A formal framework for security analysis of the internet of things (IoT). In Proceedings of the IEEE Conference on Communications and Network Security (CNS’16). IEEE, 180--188.
[40]
Mozilla-IoT. 2020. Mozilla WebThings Documentation. Retrieved from https://iot.mozilla.org/docs/gateway-user-guide.html.
[41]
Dibya Mukhopadhyay, Maliheh Shirvanian, and Nitesh Saxena. 2015. All your voices are belong to us: Stealing voices to fool humans and machines. In Proceedings of the European Symposium on Research in Computer Security. Springer, 599--621.
[42]
J. Myers, L. Babun, E. Yao, S. Helble, and P. Allen. 2019. MAD-IoT: Memory anomaly detection for the Internet of Things. In Proceedings of the IEEE Globecom Workshops (GC Wkshps’19). 1--6.
[43]
A. K. M. Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman, and A. Selcuk Uluagac. 2020. Adversarial attacks to machine learning-based smart healthcare systems. arXiv preprint arXiv:2010.03671 (2020).
[44]
A. K. M. Iqtidar Newaz, Amit Kumar Sikder, Leonardo Babun, and A. Selcuk Uluagac. 2020. HEKA: A novel intrusion detection system for attacks to personal medical devices. In Proceedings of the IEEE Conference on Communications and Network Security (CNS’20). IEEE, 1--9.
[45]
A. K. M. Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, and A. Selcuk Uluagac. 2019. Healthguard: A machine learning-based security framework for smart healthcare systems. In Proceedings of the 6th International Conference on Social Networks Analysis, Management and Security (SNAMS’19). IEEE, 389--396.
[46]
A. K. M. Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, and A. Selcuk Uluagac. 2020. A survey on security and privacy issues in modern healthcare systems: Attacks and defenses. arXiv preprint arXiv:2005.07359 (2020).
[47]
Sukhvir Notra, Muhammad Siddiqi, Hassan Habibi Gharakheili, Vijay Sivaraman, and Roksana Boreli. 2014. An experimental study of security and privacy risks with emerging household appliances. In Proceedings of the IEEE Conference on Communications and Network Security (CNS’14). IEEE, 79--84.
[48]
Charith Perera, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. 2014. Context aware computing for the internet of things: A survey. IEEE Commun. Surv. Tutor. 16, 1 (2014), 414--454.
[49]
Mohammad Ashiqur Rahman, Md Hasan Shahriar, Mohamadsaleh Jafari, and Rahat Masum. 2019. Novel attacks against contingency analysis in power grids. arXiv preprint arXiv:1911.00928 (2019).
[50]
Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, and A. Selcuk Uluagac. 2019. HDMI-walk: Attacking HDMI distribution networks via consumer electronic control protocol. In Proceedings of the 35th Computer Security Applications Conference. 650--659.
[51]
Shammya Shananda Saha, Christopher Gorog, Adam Moser, Anna Scaglione, and Nathan G. Johnson. 2020. Integrating hardware security into a blockchain-based transactive energy platform. arXiv preprint arXiv:2008.10705 (2020).
[52]
Samsung. 2018. Marketplace in the SmartThings Classic app. Retrieved from https://support.smartthings.com/hc/en-us/articles/205379924-Marketplace-in-the-SmartThings-Classic-app.
[53]
Samsung. 2018. Samsung SmartThings Development Guide. Retrieved from https://developers.smartthings.com/.
[54]
Michael Schiefer. 2015. Smart home definition and security threats. In Proceedings of the 9th International Conference on IT Security Incident Management 8 IT Forensics (IMF’15). IEEE, 114--118.
[55]
Tara Seals. 2015. BlackHat: Critical ZigBee Flaw Compromises Smart Homes. Retrieved from https://www.infosecurity-magazine.com/news/blackhatcritical-zigbee-flaw-smart/.
[56]
Md Hasan Shahriar, Nur Imtiazul Haque, Mohammad Ashiqur Rahman, and Miguel Alonso Jr. 2020. G-IDS: Generative adversarial networks assisted intrusion detection system. arXiv preprint arXiv:2006.00676 (2020).
[57]
Masudur R. Siddiquee, Tao Xue, J. Sebastian Marquez, Roozbeh Atri, Rodrigo Ramon, Robin Perry Mayrand, Connie Leung, and Ou Bai. 2019. Sensor fusion in human cyber sensor system for motion artifact removal from NIRS signal. In Proceedings of the 12th International Conference on Human System Interaction (HSI’19). IEEE, 192--196.
[58]
Amit Kumar Sikder, Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya, and Mauro Conti. 2018. IoT-enabled smart lighting systems for smart cities. In Proceedings of the IEEE 8th Computing and Communication Workshop and Conference (CCWC’18). IEEE, 639--645.
[59]
Amit Kumar Sikder, Hidayet Aksu, and A. Selcuk Uluagac. 2017. 6thSense: A context-aware sensor-based attack detector for smart devices. In Proceedings of the 26th USENIX Security Symposium (USENIX Security’17). 397--414.
[60]
Amit Kumar Sikder, Hidayet Aksu, and A. Selcuk Uluagac. 2019. A context-aware framework for detecting sensor-based threats on smart devices. IEEE Trans. Mob. Comput. 19, 2 (2019), 245--261.
[61]
Amit Kumar Sikder, Hidayet Aksu, and A. Selcuk Uluagac. 2019. Context-aware intrusion detection method for smart devices with sensors. US Patent 10,417,413.
[62]
Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, and A. Selcuk Uluagac. 2019. Aegis: A context-aware security framework for smart home systems. In Proceedings of the 35th Computer Security Applications Conference. 28--41.
[63]
Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, and A. Selcuk Uluagac. 2020. Kratos: Multi-user multi-device-aware access control system for the smart home. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 1--12.
[64]
Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, and A. Selcuk Uluagac. 2018. A survey on sensor-based threats to internet-of-things (IoT) devices and applications. arXiv preprint arXiv:1802.02041 (2018).
[65]
Vijay Sivaraman, Dominic Chan, Dylan Earl, and Roksana Boreli. 2016. Smart-phones attacking smart-homes. In Proceedings of the 9th ACM Conference on Security 8 Privacy in Wireless and Mobile Networks. ACM, 195--200.
[66]
Vijay Sivaraman, Hassan Habibi Gharakheili, Arun Vishwanath, Roksana Boreli, and Olivier Mehani. 2015. Network-level security and privacy control for smart-home IoT devices. In Proceedings of the IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob’15). IEEE, 163--167.
[67]
Statista. 2018. Installed base of home automation/smart home systems in the United States from 2012 to 2017 (in millions). Retrieved from https://www.statista.com/statistics/286813/installed-base-of-smart-home-systems-us/.
[68]
Biljana L. Risteska Stojkoska and Kire V. Trivodaliev. 2017. A review of Internet of Things for smart home: Challenges and solutions. J. Clean. Prod. 140 (2017), 1454--1464.
[69]
Darlene Storm. 2016. Hackers demonstrated first ransomware for IoT thermostats at DEF CON. Retrieved from https://www.computerworld.com/article/3105001/security/hackers-demonstrated-first-ransomware-for-iot-thermostats-at-def-con.html.
[70]
Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, and Kevin Fu. 2020. Light commands: Laser-based audio injection attacks on voice-controllable systems. In Proceedings of the 29th USENIX Security Symposium. 2631--2648.
[71]
Yuan Tian, Nan Zhang, Yueh-Hsun Lin, XiaoFeng Wang, Blase Ur, Xianzheng Guo, and Patrick Tague. 2017. Smartauth: User-centered authorization for the internet of things. In Proceedings of the 26th USENIX Security Symposium. 361--378.
[72]
Qi Wang, Pubali Datta, Wei Yang, Si Liu, Adam Bates, and Carl A. Gunter. 2019. Charting the attack surface of trigger-action IoT platforms. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 1439--1453.
[73]
Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl Gunter. 2018. Fear and logging in the internet of things. In Proceedings of the Network and Distributed Systems Symposium.
[74]
Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata, Kensuke Ueda, and Yoshiaki Kato. 2019. Anomaly detection for smart home based on user behavior. In Proceedings of the IEEE International Conference on Consumer Electronics (ICCE’19). IEEE, 1--6.
[75]
Nong Ye et al. 2000. A Markov chain model of temporal behavior for anomaly detection. In Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, Vol. 166. 169.
[76]
Amit Kumar Sikder, Z. Berkay Celik, and Leonardo Babun. 2018. A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps. Retrieved from https://github.com/IoTBench/.
[77]
Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu. 2017. Dolphinattack: Inaudible voice commands. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 103--117.

Cited By

View all
  • (2024)Knowledge-based Cyber Physical Security at Smart Home: A ReviewACM Computing Surveys10.1145/369876857:3(1-36)Online publication date: 11-Nov-2024
  • (2024)On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home DevicesProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656132(219-230)Online publication date: 27-May-2024
  • (2024)The Rocky Road to Sustainable SecurityIEEE Security & Privacy10.1109/MSEC.2024.342988822:5(82-86)Online publication date: Sep-2024
  • Show More Cited By

Index Terms

  1. Aegis+: A Context-aware Platform-independent Security Framework for Smart Home Systems

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Digital Threats: Research and Practice
    Digital Threats: Research and Practice  Volume 2, Issue 1
    Special Issue on ACSAC'19: Part 2
    March 2021
    160 pages
    EISSN:2576-5337
    DOI:10.1145/3447873
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 February 2021
    Accepted: 01 October 2020
    Revised: 01 September 2020
    Received: 01 May 2020
    Published in DTRAP Volume 2, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Smart home system
    2. context-awareness
    3. malicious apps
    4. security framework
    5. threat detection

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • Florida Center for Cybersecurity's Capacity Building Program
    • US National Science Foundation

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)309
    • Downloads (Last 6 weeks)33
    Reflects downloads up to 19 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Knowledge-based Cyber Physical Security at Smart Home: A ReviewACM Computing Surveys10.1145/369876857:3(1-36)Online publication date: 11-Nov-2024
    • (2024)On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home DevicesProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656132(219-230)Online publication date: 27-May-2024
    • (2024)The Rocky Road to Sustainable SecurityIEEE Security & Privacy10.1109/MSEC.2024.342988822:5(82-86)Online publication date: Sep-2024
    • (2024)A Survey on Physical Event Verification in User-centric Smart Home Systems2024 IEEE 35th International Symposium on Software Reliability Engineering Workshops (ISSREW)10.1109/ISSREW63542.2024.00089(263-270)Online publication date: 28-Oct-2024
    • (2023)A Two-Mode, Adaptive Security Framework for Smart Home Security ApplicationsACM Transactions on Internet of Things10.1145/36175045:2(1-31)Online publication date: 17-Nov-2023
    • (2023)The Indoor Predictability of Human Mobility: Estimating Mobility With Smart Home SensorsIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2022.318893911:1(182-193)Online publication date: 1-Jan-2023
    • (2023)Anomaly-based cyberattacks detection for smart homes: A systematic literature reviewInternet of Things10.1016/j.iot.2023.10079222(100792)Online publication date: Jul-2023
    • (2023)Smart home anomaly-based IDS: Architecture proposal and case studyInternet of Things10.1016/j.iot.2023.10077322(100773)Online publication date: Jul-2023
    • (2022)Who’s Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home EnvironmentACM Transactions on Internet of Things10.1145/35435133:4(1-39)Online publication date: 6-Sep-2022
    • (2022)TAPInspector: Safety and Liveness Verification of Concurrent Trigger-Action IoT SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.321408417(3773-3788)Online publication date: 1-Jan-2022
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media