2019
DOI: 10.1145/3333501
|View full text |Cite
|
Sign up to set email alerts
|

Program Analysis of Commodity IoT Applications for Security and Privacy

Abstract: Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive-new applications are being used in nearly every conceivable environment, which leads to the adoption of device-based interaction and automation. However, IoT has also raised issues about the security and privacy of these digitally augmented spaces. Program analysis is crucial in identifying those issues, yet the application and scope of progr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 104 publications
(47 citation statements)
references
References 65 publications
0
40
0
Order By: Relevance
“…When she leaves, it locks the front door, turns off the lights, and sets the thermostat to another specific value. The code instrumentor searches for entry points of the app and finds two entry points: the not-present event handler that turns off the switch, locks the door, and sets the temperature (lines [10][11][12], and the present event handler that turns on the switch, unlocks the door and sets the temperature (lines 13-18). For each action, the code instrumentor finds the predicate that guards the action and the numerical-valued attributes used in the action call.…”
Section: A Code Instrumentormentioning
confidence: 99%
See 1 more Smart Citation
“…When she leaves, it locks the front door, turns off the lights, and sets the thermostat to another specific value. The code instrumentor searches for entry points of the app and finds two entry points: the not-present event handler that turns off the switch, locks the door, and sets the temperature (lines [10][11][12], and the present event handler that turns on the switch, unlocks the door and sets the temperature (lines 13-18). For each action, the code instrumentor finds the predicate that guards the action and the numerical-valued attributes used in the action call.…”
Section: A Code Instrumentormentioning
confidence: 99%
“…For example, a rule turns on the light when the user receives an email, and similarly, another rule logs the user's presence to a spreadsheet file when the front door is unlocked. This inter-tangled environment expands the interactions among devices to online services [10], [47]; for example, an IoT app that subscribes to the switch "turn-on" event interacts with a trigger-action platform rule that "turns on" the switch when the user is tagged in a photo on Facebook.…”
Section: Introductionmentioning
confidence: 99%
“…Although browser vendors have moved to eliminate fine-grained timers from JavaScript, researchers have uncovered other ways to measure time [53], [54]. Information flow in IoT apps An active area of research is dedicated to securing IoT apps [10], [27]. Surbatovich et al [58] present an empirical study of IFTTT apps and categorize the apps with respect to potential security and integrity violations.…”
Section: Related Workmentioning
confidence: 99%
“…However the trust of the SP is not critical in the application of data security protection methods, if transmission occurs and nicknames for users are used. Accordingly, advanced methods based on the trust of the SP should have an inbuilt system to alert users to grant permission for their data to be accessed [32]. How to avoid dependence on the trust of the SP has been an open problem, which has recently been addressed in the Blind Approach [33] by way of using a pair of keys in addition to the third party, and in the Double Obfuscation Approach (DOA) [34].…”
Section: Literature Reviewmentioning
confidence: 99%