Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis 2020
DOI: 10.1145/3395363.3397347
|View full text |Cite
|
Sign up to set email alerts
|

Scalable analysis of interaction threats in IoT systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
44
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 52 publications
(44 citation statements)
references
References 39 publications
0
44
0
Order By: Relevance
“…We evaluated our models with an experimental study performed over models of 222 real-world smart home apps for Samsung Smart-Things. These app models were automatically extracted from the source code of the applications by applying static analysis as described by Alhanahnah, et al [2], to extract an inter-procedural control flow graph (ICFG) from each app and translate the relevant nodes from the ICFG into the triggers, conditions, and actions defining the models for the rules of the app. Our evaluation addresses the following research questions:…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…We evaluated our models with an experimental study performed over models of 222 real-world smart home apps for Samsung Smart-Things. These app models were automatically extracted from the source code of the applications by applying static analysis as described by Alhanahnah, et al [2], to extract an inter-procedural control flow graph (ICFG) from each app and translate the relevant nodes from the ICFG into the triggers, conditions, and actions defining the models for the rules of the app. Our evaluation addresses the following research questions:…”
Section: Discussionmentioning
confidence: 99%
“…To compare the two approaches, we used the Alloy Analyzer [20] to generate counterexamples for safety properties for seven types of possible interactions between co-located apps in a smart home IoT system. The definitions of these safety properties were adapted from prior work [2,11,13,31]. We translated each safety property into a pair of assertions-one for the state-based model and the other for the rule-based model.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…IoTCOM approach is proposed in (Alhanahnah et al, 2020). IoTCOM is based on the static analysis of behavioral models of IoT apps and formal methods to detect the security and safety violations against some predefined IoT safety and security properties.…”
Section: /31mentioning
confidence: 99%
“…The IoTCOM approach is proposed in Alhanahnah, Stevens & Bagheri (2020). IoTCOM is based on the static analysis of behavioral models of IoT apps and formal methods to detect the security and safety violations against some predefined IoT safety and security properties.…”
Section: Literature Analysis Of Conflicts' Classificationmentioning
confidence: 99%