Proceedings of the 35th Annual ACM Symposium on Applied Computing 2020
DOI: 10.1145/3341105.3374108
|View full text |Cite
|
Sign up to set email alerts
|

Towards a heterogeneous IoT privacy architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…There are approaches for testing IoT applications, 45 handle privacy violations in IoT clouds, 46 mutation testing of IoT applications, 47 and cost‐effective deployment and testing of IoT clouds 48 . Some approaches utilize DTs for anomaly detection in healthcare IoT systems, 3 industrial IoT systems, 49 and CPSs 4,50 .…”
Section: Related Workmentioning
confidence: 99%
“…There are approaches for testing IoT applications, 45 handle privacy violations in IoT clouds, 46 mutation testing of IoT applications, 47 and cost‐effective deployment and testing of IoT clouds 48 . Some approaches utilize DTs for anomaly detection in healthcare IoT systems, 3 industrial IoT systems, 49 and CPSs 4,50 .…”
Section: Related Workmentioning
confidence: 99%
“…Gupta et al [81], [82] analyze inconsistency between mobile-based IoT applications' source code and their privacy policies. First, they conduct static analysis to identify the sensitive APIs usage in an application's source code.…”
Section: Source Code Analysis-based Approachesmentioning
confidence: 99%
“…•Do not analyze data leakage during the application's run-time. Identifying Over-privileged Permission and Privacy Risks [78], [79], [81], [82].…”
Section: User Studies and Survey-based Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…There is now a considerable body of research that has recognised that IoT's heterogeneous mesh of network devices and protocols have created a unique set of risks and problems that will affect most households [6] [7]. From breaches in confidentiality, which could allow users to be snooped on.…”
Section: Introductionmentioning
confidence: 99%