ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1808.02125
  4. Cited By
Cross-App Interference Threats in Smart Homes: Categorization, Detection
  and Handling
v1v2v3v4v5 (latest)

Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling

6 August 2018
Haotian Chi
Qiang Zeng
Xiaojiang Du
Jiaping Yu
ArXiv (abs)PDFHTML

Papers citing "Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling"

20 / 20 papers shown
Title
TAPFixer: Automatic Detection and Repair of Home Automation
  Vulnerabilities based on Negated-property Reasoning
TAPFixer: Automatic Detection and Repair of Home Automation Vulnerabilities based on Negated-property Reasoning
Yinbo Yu
Yuanqi Xu
Kepu Huang
Jiajia Liu
38
4
0
12 Jul 2024
Proactive Detection of Physical Inter-rule Vulnerabilities in IoT
  Services Using a Deep Learning Approach
Proactive Detection of Physical Inter-rule Vulnerabilities in IoT Services Using a Deep Learning Approach
Bing Huang
Chen Chen
K. Lam
Fuqun Huang
AAML
41
1
0
06 Jun 2024
Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms
Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms
Jingwen Fan
Yi He
Bo Tang
Qi Li
Ravi Sandhu
39
16
0
29 Feb 2024
A Survey on Conflict Detection in IoT-based Smart Homes
A Survey on Conflict Detection in IoT-based Smart Homes
Bing Huang
Dipankar Chaki
A. Bouguettaya
Kwok-Yan Lam
48
17
0
03 Oct 2023
A Large-Scale Study of IoT Security Weaknesses and Vulnerabilities in
  the Wild
A Large-Scale Study of IoT Security Weaknesses and Vulnerabilities in the Wild
Madhu Selvaraj
Gias Uddin
13
1
0
25 Aug 2023
VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime
VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime
Akib Jawad Nafis
Omar Chowdhury
Md. Endadul Hoque
36
1
0
23 Aug 2023
IoT-AD: A Framework To Detect Anomalies Among Interconnected IoT Devices
IoT-AD: A Framework To Detect Anomalies Among Interconnected IoT Devices
Hasniuj Zahan
Md Washik Al Azad
Ihsan Ali
Spyridon Mastorakis
23
5
0
11 Jun 2023
MAVERICK: An App-independent and Platform-agnostic Approach to Enforce
  Policies in IoT Systems at Runtime
MAVERICK: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime
M. Mazhar
Li Li
Endadul Hoque
Omar Chowdhury
54
3
0
02 Feb 2023
An Empirical Study of IoT Security Aspects at Sentence-Level in
  Developer Textual Discussions
An Empirical Study of IoT Security Aspects at Sentence-Level in Developer Textual Discussions
Nibir Mandal
Gias Uddin
31
10
0
07 Jun 2022
A Survey of Analysis Methods for Security and Safety verification in IoT
  Systems
A Survey of Analysis Methods for Security and Safety verification in IoT Systems
Lobna Abuserrieh
Manar H. Alalfi
34
2
0
03 Mar 2022
Effective Anomaly Detection in Smart Home by Integrating Event Time
  Intervals
Effective Anomaly Detection in Smart Home by Integrating Event Time Intervals
Chenxu Jiang
Chenglong Fu
Zhenyu Zhao
Xiaojiang Du
Yuede Ji
21
5
0
20 Jan 2022
Security and Machine Learning Adoption in IoT: A Preliminary Study of
  IoT Developer Discussions
Security and Machine Learning Adoption in IoT: A Preliminary Study of IoT Developer Discussions
Gias Uddin
17
9
0
01 Apr 2021
Risk Analysis and Policy Enforcement of Function Interactions in Robot
  Apps
Risk Analysis and Policy Enforcement of Function Interactions in Robot Apps
Yuan Xu
Tianwei Zhang
Yungang Bao
15
0
0
23 Mar 2021
Discovering IoT Physical Channel Vulnerabilities
Discovering IoT Physical Channel Vulnerabilities
Muslum Ozgur Ozmen
Xuansong Li
A. Chu
Z. Berkay Celik
Bardh Hoxha
Xinming Zhang
19
21
0
03 Feb 2021
TAPInspector: Safety and Liveness Verification of Concurrent
  Trigger-Action IoT Systems
TAPInspector: Safety and Liveness Verification of Concurrent Trigger-Action IoT Systems
Yinbo Yu
Jiajia Liu
23
27
0
02 Feb 2021
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home
  Privacy Protection
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection
Haotian Chi
Qiang Zeng
Xiaojiang Du
Lannan Luo
62
26
0
26 Jan 2021
Sovereign: User-Controlled Smart Homes
Sovereign: User-Controlled Smart Homes
Zhiyi Zhang
Tianyuan Yu
Xinyu Ma
Yuanfeng Guan
Philipp Moll
Lixia Zhang
13
16
0
11 Jun 2020
PFirewall: Semantics-Aware Customizable Data Flow Control for Home
  Automation Systems
PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation Systems
Haotian Chi
Qiang Zeng
Xiaojiang Du
Lannan Luo
62
20
0
17 Oct 2019
Aegis: A Context-aware Security Framework for Smart Home Systems
Aegis: A Context-aware Security Framework for Smart Home Systems
A. Sikder
Leonardo Babun
Hidayet Aksu
Selcuk Uluagac
36
77
0
09 Oct 2019
Program Analysis of Commodity IoT Applications for Security and Privacy:
  Challenges and Opportunities
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities
Z. Berkay Celik
Earlence Fernandes
Eric Pauley
Gang Tan
Patrick McDaniel
59
125
0
18 Sep 2018
1