Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security 2019
DOI: 10.1145/3319535.3345662
|View full text |Cite
|
Sign up to set email alerts
|

Charting the Attack Surface of Trigger-Action IoT Platforms

Abstract: Internet of Things (IoT) deployments are becoming increasingly automated and vastly more complex. Facilitated by programming abstractions such as trigger-action rules, end-users can now easily create new functionalities by interconnecting their devices and other online services. However, when multiple rules are simultaneously enabled, complex system behaviors arise that are diicult to understand or diagnose. While history tells us that such conditions are ripe for exploitation, at present the security states o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
110
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 115 publications
(110 citation statements)
references
References 55 publications
(49 reference statements)
0
110
0
Order By: Relevance
“…To compare the two approaches, we used the Alloy Analyzer [20] to generate counterexamples for safety properties for seven types of possible interactions between co-located apps in a smart home IoT system. The definitions of these safety properties were adapted from prior work [2,11,13,31]. We translated each safety property into a pair of assertions-one for the state-based model and the other for the rule-based model.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…To compare the two approaches, we used the Alloy Analyzer [20] to generate counterexamples for safety properties for seven types of possible interactions between co-located apps in a smart home IoT system. The definitions of these safety properties were adapted from prior work [2,11,13,31]. We translated each safety property into a pair of assertions-one for the state-based model and the other for the rule-based model.…”
Section: Methodsmentioning
confidence: 99%
“…The safety properties can then be defined to describe paths between those rules that violate properties describing the coordination between apps (cf. Wang, et al [31]).…”
Section: Formal Model Of App Coordinationmentioning
confidence: 99%
See 2 more Smart Citations
“…In recent years, many security mechanisms (e.g. [16,27,35,39]) adopt machine learning methods to achieve anomaly detection. Aegis [35] observes different user activities and usage patterns and builds a contextual model to differentiate malicious and benign behavior.…”
Section: Existing Security Mechanisms In Iotmentioning
confidence: 99%