IoT Reading List
- Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be
- Closing the Blinds: Four Strategies for Protecting Smart Home Privacy from Network Observers
- Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?
- Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic
- Tyche: A Risk-Based Permission Model for Smart Homes
- CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
- A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications
- Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home
- IoT Security: An End-to-End View and Case Study
- A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
- Nonsense Attacks on Google Assistant
- Peek-a-Boo: I see your smart home activities, even encrypted!
- Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
- A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation
- Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities
- IotSan: Fortifying the Safety of IoT Systems
- Understanding Linux Malware
- Trigger-Action Programming in the Wild: An Analysis of 200,000 IFTTT Recipes
- Soteria: Automated IoT Safety and Security Analysis
- On the Safety of IoT Device Physical Interaction Control
- ContexIoT: Towards Providing Contextual Integrity to Appified IoT Platforms
- Decentralized Action Integrity for Trigger-Action IoT Platforms
- Security Analysis of Emerging Smart Home Applications
- Detecting Spies in IoT Systems using Cyber-Physical Correlation
- Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes
- An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance
- IOTFUZZER: Discovering Memory Corruptions in IoT Through App-based Fuzzing
- FACT: Functionality-centric Access Control System for IoT Programming Frameworks
- FlowFence: Practical Data Protection for Emerging IoT Application Frameworks
- SmartAuth: User-Centered Authorization for the Internet of Things
- Sensitive Information Tracking in Commodity IoT
- Rethinking Access Control and Authentication for the Home Internet of Things (IoT)
- IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
- Fear and Logging in the Internet of Things