“…Additionally, there have been efforts on forensics analysis [67,68] and risk-based analysis [2, 18,56], designing access control [29,33,42], repairing or synthesizing automation rules [75], addressing information leakage and privacy [11,24,62], inferring device behaviors for anomaly detection using machine learning-based network traffic/flow analysis [1,9,27,31,46,50,52,54,63,76] and fuzzing smartphone companion apps for IoT [14,59]. These efforts are orthogonal to the safety problem that MAVERICK addresses.…”