ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1809.06962
  4. Cited By
Program Analysis of Commodity IoT Applications for Security and Privacy:
  Challenges and Opportunities
v1v2v3 (latest)

Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities

18 September 2018
Z. Berkay Celik
Earlence Fernandes
Eric Pauley
Gang Tan
Patrick McDaniel
ArXiv (abs)PDFHTML

Papers citing "Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities"

15 / 15 papers shown
Title
RESTRAIN: Reinforcement Learning-Based Secure Framework for Trigger-Action IoT Environment
Md Morshed Alam
Lokesh Chandra Das
Sandip Roy
Sachin Shetty
Weichao Wang
AAMLOffRL
163
0
0
12 Mar 2025
IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System
  to Mitigate Trigger-action IoT Attacks
IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System to Mitigate Trigger-action IoT Attacks
Md Morshed Alam
Israt Jahan
Charlotte
AAML
108
2
0
16 Jan 2024
A Survey of Analysis Methods for Security and Safety verification in IoT
  Systems
A Survey of Analysis Methods for Security and Safety verification in IoT Systems
Lobna Abuserrieh
Manar H. Alalfi
37
2
0
03 Mar 2022
An Automated Approach for Privacy Leakage Identification in IoT Apps
An Automated Approach for Privacy Leakage Identification in IoT Apps
Bara' Nazzal
Manar H. Alalfi
15
1
0
07 Feb 2022
A Mutation Framework for Evaluating Security Analysis tools in IoT
  Applications
A Mutation Framework for Evaluating Security Analysis tools in IoT Applications
Manar H. Alalfi
Sajeda Parveen
Bara' Nazzal
16
5
0
11 Oct 2021
A Comprehensive Survey on the State-of-the-art Data Provenance
  Approaches for Security Enforcement
A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement
Md Morshed Alam
Weichao Wang
20
11
0
04 Jul 2021
Information flow based defensive chain for data leakage detection and
  prevention: a survey
Information flow based defensive chain for data leakage detection and prevention: a survey
Ning Xi
Chao Chen
Jun Zhang
Cong Sun
Shigang Liu
Pengbin Feng
Jianfeng Ma
81
0
0
09 Jun 2021
Discovering IoT Physical Channel Vulnerabilities
Discovering IoT Physical Channel Vulnerabilities
Muslum Ozgur Ozmen
Xuansong Li
A. Chu
Z. Berkay Celik
Bardh Hoxha
Xinming Zhang
24
21
0
03 Feb 2021
TAPInspector: Safety and Liveness Verification of Concurrent
  Trigger-Action IoT Systems
TAPInspector: Safety and Liveness Verification of Concurrent Trigger-Action IoT Systems
Yinbo Yu
Jiajia Liu
25
27
0
02 Feb 2021
New Frontiers in IoT: Networking, Systems, Reliability, and Security
  Challenges
New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges
S. Bagchi
Tarek Abdelzaher
R. Govindan
Prashant J. Shenoy
Akanksha Atrey
Pradipta Ghosh
Ran Xu
62
45
0
15 May 2020
Deep Learning-Based Anomaly Detection in Cyber-Physical Systems:
  Progress and Opportunities
Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities
Yuan Luo
Ya Xiao
Long Cheng
Guojun Peng
D. Yao
82
163
0
30 Mar 2020
Real-time Analysis of Privacy-(un)aware IoT Applications
Real-time Analysis of Privacy-(un)aware IoT Applications
Leonardo Babun
Z. Berkay Celik
Patrick McDaniel
A. S. Uluagac
76
48
0
24 Nov 2019
Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT):
  A Survey
Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey
Vishal Sharma
I. You
K. Andersson
F. Palmieri
M. H. Rehmani
Jae-Deok Lim
57
88
0
13 Mar 2019
Beware of the App! On the Vulnerability Surface of Smart Devices through
  their Companion Apps
Beware of the App! On the Vulnerability Surface of Smart Devices through their Companion Apps
Davino Mauro Junior
L. Melo
Harvey Lu
Marcelo d’Amorim
A. Prakash
13
7
0
29 Jan 2019
IoTSan: Fortifying the Safety of IoT Systems
IoTSan: Fortifying the Safety of IoT Systems
D. Nguyen
Chengyu Song
Zhiyun Qian
S. Krishnamurthy
E. Colbert
Patrick McDaniel
51
129
0
22 Oct 2018
1