{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:54:38Z","timestamp":1730321678197,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":89,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T00:00:00Z","timestamp":1604620800000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 13-30491,CNS 17-50024,CNS 16-57534"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3345662","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1439-1453","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":90,"title":["Charting the Attack Surface of Trigger-Action IoT Platforms"],"prefix":"10.1145","author":[{"given":"Qi","family":"Wang","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Pubali","family":"Datta","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Dallas, TX, USA"}]},{"given":"Si","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Adam","family":"Bates","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2014. Gartner Says the Internet of Things Will Transform the Data Center. http:\/\/www.gartner.com\/newsroom\/id\/2684616. 2014. Gartner Says the Internet of Things Will Transform the Data Center. http:\/\/www.gartner.com\/newsroom\/id\/2684616."},{"key":"e_1_3_2_2_2_1","unstructured":"2015. Critical Flaw identiied In ZigBee Smart Home Devices. https:\/\/goo.gl\/ BFBa1X. 2015. Critical Flaw identiied In ZigBee Smart Home Devices. https:\/\/goo.gl\/ BFBa1X."},{"key":"e_1_3_2_2_3_1","unstructured":"2016. Mirai Attacks. https:\/\/goo.gl\/QVv89r. 2016. Mirai Attacks. https:\/\/goo.gl\/QVv89r."},{"key":"e_1_3_2_2_4_1","unstructured":"2018. Apple HomeKit. http:\/\/www.apple.com\/ios\/home. 2018. Apple HomeKit. http:\/\/www.apple.com\/ios\/home."},{"key":"e_1_3_2_2_5_1","unstructured":"2018. IFTTT. https:\/\/ifttt.com. 2018. IFTTT. https:\/\/ifttt.com."},{"key":"e_1_3_2_2_6_1","unstructured":"2018. IFTTT Home Security Applets. https:\/\/ifttt.com\/search\/query\/home% 20security. 2018. IFTTT Home Security Applets. https:\/\/ifttt.com\/search\/query\/home% 20security."},{"key":"e_1_3_2_2_7_1","unstructured":"2018. Iris by Lowe's. https:\/\/www.irisbylowes.com\/. 2018. Iris by Lowe's. https:\/\/www.irisbylowes.com\/."},{"key":"e_1_3_2_2_8_1","unstructured":"2018. Microsoft Flow. https:\/\/low.microsoft.com. 2018. Microsoft Flow. https:\/\/low.microsoft.com."},{"key":"e_1_3_2_2_9_1","unstructured":"2018. Named Entity Recognition (NER) and Information Extraction (IE). https: \/\/nlp.stanford.edu\/ner\/. 2018. Named Entity Recognition (NER) and Information Extraction (IE). https: \/\/nlp.stanford.edu\/ner\/."},{"key":"e_1_3_2_2_10_1","unstructured":"2018. openHAB. https:\/\/www.openhab.org\/. 2018. openHAB. https:\/\/www.openhab.org\/."},{"key":"e_1_3_2_2_11_1","unstructured":"2018. SmartThings. https:\/\/www.smartthings.com. 2018. SmartThings. https:\/\/www.smartthings.com."},{"key":"e_1_3_2_2_12_1","unstructured":"2018. Stanford CoreNLP. https:\/\/stanfordnlp.github.io\/CoreNLP. 2018. Stanford CoreNLP. https:\/\/stanfordnlp.github.io\/CoreNLP."},{"key":"e_1_3_2_2_13_1","unstructured":"2018. The Maude System. http:\/\/maude.cs.illinois.edu\/w\/index.php?title=The_ Maude_System. 2018. The Maude System. http:\/\/maude.cs.illinois.edu\/w\/index.php?title=The_ Maude_System."},{"key":"e_1_3_2_2_14_1","unstructured":"2018. TypeScript. https:\/\/www.typescriptlang.org\/. 2018. TypeScript. https:\/\/www.typescriptlang.org\/."},{"key":"e_1_3_2_2_15_1","unstructured":"2018. Wink. https:\/\/www.wink.com\/. 2018. Wink. https:\/\/www.wink.com\/."},{"key":"e_1_3_2_2_16_1","unstructured":"2018. Word2Vec. https:\/\/code.google.com\/p\/word2vec. 2018. Word2Vec. https:\/\/code.google.com\/p\/word2vec."},{"key":"e_1_3_2_2_17_1","unstructured":"2018. zapier. https:\/\/zapier.com\/. 2018. zapier. https:\/\/zapier.com\/."},{"key":"e_1_3_2_2_18_1","unstructured":"2019. GloVe: Global Vectors for Word Representation. https:\/\/nlp.stanford.edu\/ projects\/glove. 2019. GloVe: Global Vectors for Word Representation. https:\/\/nlp.stanford.edu\/ projects\/glove."},{"key":"e_1_3_2_2_19_1","unstructured":"2019. Linear temporal logic. https:\/\/en.wikipedia.org\/wiki\/Linear_temporal_ logic. 2019. Linear temporal logic. https:\/\/en.wikipedia.org\/wiki\/Linear_temporal_ logic."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"International Journal of Human-Computer Studies 2019 123 Supporting end-user debugging of trigger-action rules for IoT applications","DOI":"10.1016\/j.ijhcs.2018.11.005"},{"key":"e_1_3_2_2_21_1","unstructured":"2019. Universal Grammatical Dependency Relation Deinitions. http:\/\/ universaldependencies.org\/u\/dep\/. 2019. Universal Grammatical Dependency Relation Deinitions. http:\/\/ universaldependencies.org\/u\/dep\/."},{"volume":"00","volume-title":"SoK: Security Evaluation of Home-Based IoT Deployments. In 2019 2019 IEEE Symposium on Security and Privacy (SP)","author":"Alrawi O.","key":"e_1_3_2_2_22_1","unstructured":"O. Alrawi , C. Lever , M. Antonakakis , and F. Monrose . 2019 . SoK: Security Evaluation of Home-Based IoT Deployments. In 2019 2019 IEEE Symposium on Security and Privacy (SP) , Vol. 00 . 208--226. O. Alrawi, C. Lever, M. Antonakakis, and F. Monrose. 2019. SoK: Security Evaluation of Home-Based IoT Deployments. In 2019 2019 IEEE Symposium on Security and Privacy (SP), Vol. 00. 208--226."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243841"},{"volume-title":"Tracking Information Flow via Delayed Output","author":"Bastys Iulia","key":"e_1_3_2_2_24_1","unstructured":"Iulia Bastys , Frank Piessens , and Andrei Sabelfeld . 2018. Tracking Information Flow via Delayed Output . In Secure IT Systems, Nils Gruschka (Ed.). Springer International Publishing , Cham , 19--37. Iulia Bastys, Frank Piessens, and Andrei Sabelfeld. 2018. Tracking Information Flow via Delayed Output. In Secure IT Systems, Nils Gruschka (Ed.). Springer International Publishing, Cham, 19--37."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/646483.691738"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Armin Biere Alessandro Cimatti Edmund M Clarke Ofer Strichman Yunshan Zhu etal 2003. Bounded model checking. Advances in computers 58 11 (2003) 117--148. Armin Biere Alessandro Cimatti Edmund M Clarke Ofer Strichman Yunshan Zhu et al. 2003. Bounded model checking. Advances in computers 58 11 (2003) 117--148.","DOI":"10.1016\/S0065-2458(03)58003-2"},{"volume-title":"Enriching Word Vectors with Subword Information. CoRR","year":"2016","author":"Bojanowski Piotr","key":"e_1_3_2_2_27_1","unstructured":"Piotr Bojanowski , Edouard Grave , Armand Joulin , and Tomas Mikolov . 2016. Enriching Word Vectors with Subword Information. CoRR ( 2016 ). Piotr Bojanowski, Edouard Grave, Armand Joulin, and Tomas Mikolov. 2016. Enriching Word Vectors with Subword Information. CoRR (2016)."},{"volume-title":"Shi Han, Shan Lin, Dongmei Zhang, and Xuandong Li.","year":"2018","author":"Bu Lei","key":"e_1_3_2_2_28_1","unstructured":"Lei Bu , Wen Xiong , Mike Chieh-Jan Liang , Shi Han, Shan Lin, Dongmei Zhang, and Xuandong Li. 2018 . Systematically Ensuring The Conidence of Real Time Home Automation IoT Systems. TCPS (ACM Transactions on Cyber-Physical Systems) (June 2018). Lei Bu, Wen Xiong, Mike Chieh-Jan Liang, Shi Han, Shan Lin, Dongmei Zhang, and Xuandong Li. 2018. Systematically Ensuring The Conidence of Real Time Home Automation IoT Systems. TCPS (ACM Transactions on Cyber-Physical Systems) (June 2018)."},{"volume-title":"Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Celik Z. Berkay","key":"e_1_3_2_2_29_1","unstructured":"Z. Berkay Celik , Leonardo Babun , Amit Kumar Sikder , Hidayet Aksu , Gang Tan , Patrick McDaniel , and A. Selcuk Uluagac . 2018 . Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD, 1687--1704. Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A. Selcuk Uluagac. 2018. Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 1687--1704."},{"volume-title":"Soteria: Automated IoT Safety and Security Analysis. In 2018 USENIX Annual Technical Conference (USENIX ATC 18)","year":"2018","author":"Celik Z. Berkay","key":"e_1_3_2_2_30_1","unstructured":"Z. Berkay Celik , Patrick McDaniel , and Gang Tan . 2018 . Soteria: Automated IoT Safety and Security Analysis. In 2018 USENIX Annual Technical Conference (USENIX ATC 18) . Boston, MA, 147--158. Z. Berkay Celik, Patrick McDaniel, and Gang Tan. 2018. Soteria: Automated IoT Safety and Security Analysis. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). Boston, MA, 147--158."},{"volume-title":"IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019","year":"2019","author":"Celik Z. Berkay","key":"e_1_3_2_2_31_1","unstructured":"Z. Berkay Celik , Gang Tan , and Patrick D . McDaniel. 2019 . IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019 , San Diego, California, USA, February 24--27 , 2019 . Z. Berkay Celik, Gang Tan, and Patrick D. McDaniel. 2019. IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24--27, 2019."},{"volume-title":"Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling. CoRR abs\/1808.02125","year":"2018","author":"Chi Haotian","key":"e_1_3_2_2_32_1","unstructured":"Haotian Chi , Qiang Zeng , Xiaojiang Du , and Jiaping Yu. 2018. Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling. CoRR abs\/1808.02125 ( 2018 ). Haotian Chi, Qiang Zeng, Xiaojiang Du, and Jiaping Yu. 2018. Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling. CoRR abs\/1808.02125 (2018)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732795"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188641"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23082"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243865"},{"volume-title":"Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI'10)","author":"Enck William","key":"e_1_3_2_2_37_1","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon P. Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol N. Sheth . 2010. TaintDroid: An Information-low Tracking System for Realtime Privacy Monitoring on Smartphones . In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI'10) . William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-low Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI'10)."},{"volume-title":"Security Analysis of Emerging Smart Home Applications","author":"Fernandes Earlence","key":"e_1_3_2_2_38_1","unstructured":"Earlence Fernandes , Jaeyeon Jung , and Atul Prakash . 2016. Security Analysis of Emerging Smart Home Applications . In IEEE S &P. Earlence Fernandes, Jaeyeon Jung, and Atul Prakash. 2016. Security Analysis of Emerging Smart Home Applications. In IEEE S&P."},{"key":"e_1_3_2_2_39_1","unstructured":"Earlence Fernandes Justin Paupore Amir Rahmati Daniel Simionato Mauro Conti and Atul Prakash. 2016. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In USENIX Security. Earlence Fernandes Justin Paupore Amir Rahmati Daniel Simionato Mauro Conti and Atul Prakash. 2016. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In USENIX Security."},{"volume-title":"Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things. arXiv preprint arXiv:1707.00405","year":"2017","author":"Fernandes Earlence","key":"e_1_3_2_2_40_1","unstructured":"Earlence Fernandes , Amir Rahmati , Jaeyeon Jung , and Atul Prakash . 2017. Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things. arXiv preprint arXiv:1707.00405 ( 2017 ). Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, and Atul Prakash. 2017. Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things. arXiv preprint arXiv:1707.00405 (2017)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"Earlence Fernandes Amir Rahmati Jaeyeon Jung and Atul Prakash. 2018. Decentralized Action Integrity for Trigger-Action IoT Platforms. In NDSS. Earlence Fernandes Amir Rahmati Jaeyeon Jung and Atul Prakash. 2018. Decentralized Action Integrity for Trigger-Action IoT Platforms. In NDSS.","DOI":"10.14722\/ndss.2018.23119"},{"volume-title":"I'm home!!-Hacking Z-Wave Home Automation Systems. Black Hat USA","year":"2013","author":"Fouladi Behrang","key":"e_1_3_2_2_42_1","unstructured":"Behrang Fouladi and Sahand Ghanoun . 2013. Honey , I'm home!!-Hacking Z-Wave Home Automation Systems. Black Hat USA ( 2013 ). Behrang Fouladi and Sahand Ghanoun. 2013. Honey, I'm home!!-Hacking Z-Wave Home Automation Systems. Black Hat USA (2013)."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14541"},{"volume-title":"27th USENIX Security Symposium (USENIX Security 18)","year":"2018","author":"He Weijia","key":"e_1_3_2_2_44_1","unstructured":"Weijia He , Maximilian Golla , Roshni Padhi , Jordan Ofek , Markus D\u00fcrmuth , Earlence Fernandes , and Blase Ur . 2018 . Rethinking Access Control and Authentication for the Home Internet of Things (IoT) . In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD, 255--272. Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus D\u00fcrmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking Access Control and Authentication for the Home Internet of Things (IoT). In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 255--272."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"Justin Huang and Maya Cakmak. 2015. Supporting mental model accuracy in trigger-action programming. In Ubicomp. 215--225. Justin Huang and Maya Cakmak. 2015. Supporting mental model accuracy in trigger-action programming. In Ubicomp. 215--225.","DOI":"10.1145\/2750858.2805830"},{"volume-title":"Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 1: Long Papers).","year":"2015","author":"Iyyer Mohit","key":"e_1_3_2_2_47_1","unstructured":"Mohit Iyyer , Varun Manjunatha , Jordan Boyd-Graber , and Hal Daum\u00e9 III. 2015 . Deep Unordered Composition Rivals Syntactic Methods for Text Classiication . In Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 1: Long Papers). Mohit Iyyer, Varun Manjunatha, Jordan Boyd-Graber, and Hal Daum\u00e9 III. 2015. Deep Unordered Composition Rivals Syntactic Methods for Text Classiication. In Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 1: Long Papers)."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592434.1592438"},{"volume-title":"Shiqi Wang, Amir Rahmati, Earlence Fernandes, Z. Morley Mao, and Atul Prakash.","year":"2017","author":"Jia Yunhan Jack","key":"e_1_3_2_2_49_1","unstructured":"Yunhan Jack Jia , Qi Alfred Chen , Shiqi Wang, Amir Rahmati, Earlence Fernandes, Z. Morley Mao, and Atul Prakash. 2017 . ContexIoT: Towards Providing Contextual Integrity to Appiied IoT Platforms. In NDSS. Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Z. Morley Mao, and Atul Prakash. 2017. ContexIoT: Towards Providing Contextual Integrity to Appiied IoT Platforms. In NDSS."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078864"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993422.2993426"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737095.2737115"},{"volume-title":"Mingcheng Chen, and Dawn Song.","year":"2016","author":"Liu Chang","key":"e_1_3_2_2_53_1","unstructured":"Chang Liu , Xinyun Chen , Eui Chul Shin , Mingcheng Chen, and Dawn Song. 2016 . Latent attention for if-then program synthesis. In Advances in Neural Information Processing Systems . 4574--4582. Chang Liu, Xinyun Chen, Eui Chul Shin, Mingcheng Chen, and Dawn Song. 2016. Latent attention for if-then program synthesis. In Advances in Neural Information Processing Systems. 4574--4582."},{"volume-title":"ROLA: A New Distributed Transaction Protocol and Its Formal Analysis.. In FASE. 77--93.","year":"2018","author":"Liu Si","key":"e_1_3_2_2_54_1","unstructured":"Si Liu , Peter Csaba \u00d6lveczky , Keshav Santhanam , Qi Wang , Indranil Gupta , and Jos\u00e9 Meseguer . 2018 . ROLA: A New Distributed Transaction Protocol and Its Formal Analysis.. In FASE. 77--93. Si Liu, Peter Csaba \u00d6lveczky, Keshav Santhanam, Qi Wang, Indranil Gupta, and Jos\u00e9 Meseguer. 2018. ROLA: A New Distributed Transaction Protocol and Its Formal Analysis.. In FASE. 77--93."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99840-4_8"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17465-1_3"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267305.3274151"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2013.74"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2016.7501688"},{"volume-title":"Conditional rewriting logic as a uniied model of concurrency. Theoretical computer science 96, 1","year":"1992","author":"Meseguer Jos\u00e9","key":"e_1_3_2_2_61_1","unstructured":"Jos\u00e9 Meseguer . 1992. Conditional rewriting logic as a uniied model of concurrency. Theoretical computer science 96, 1 ( 1992 ), 73--155. Jos\u00e9 Meseguer. 1992. Conditional rewriting logic as a uniied model of concurrency. Theoretical computer science 96, 1 (1992), 73--155."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/10721975_1"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131369"},{"key":"e_1_3_2_2_64_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jef Dean. 2013. Distributed Representations of Words and Phrases and their Compositionality. In Advances in Neural Information Processing Systems 26. Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jef Dean. 2013. Distributed Representations of Words and Phrases and their Compositionality. In Advances in Neural Information Processing Systems 26."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843717"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2800835.2800916"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23092"},{"key":"e_1_3_2_2_68_1","unstructured":"Chandrakana Nandi and Michael D Ernst. 2016. Automatic Trigger Generation for Rule-based Smart Homes. In PLAS. 97--102. Chandrakana Nandi and Michael D Ernst. 2016. Automatic Trigger Generation for Rule-based Smart Homes. In PLAS. 97--102."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2012.07.001"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281440"},{"volume-title":"FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps. In 27th USENIX Security Symposium (USENIX Security 18)","year":"2018","author":"Pan Xiang","key":"e_1_3_2_2_71_1","unstructured":"Xiang Pan , Yinzhi Cao , Xuechao Du , Boyuan He , Gan Fang , Rui Shao , and Yan Chen . 2018 . FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps. In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD, 1669--1685. Xiang Pan, Yinzhi Cao, Xuechao Du, Boyuan He, Gan Fang, Rui Shao, and Yan Chen. 2018. FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 1669--1685."},{"volume-title":"WHYPER: Towards Automating Risk Assessment of Mobile Applications. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX, Washington, D.C., 527--542.","year":"2013","author":"Pandita Rahul","key":"e_1_3_2_2_72_1","unstructured":"Rahul Pandita , Xusheng Xiao , Wei Yang , William Enck , and Tao Xie . 2013 . WHYPER: Towards Automating Risk Assessment of Mobile Applications. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX, Washington, D.C., 527--542. Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX, Washington, D.C., 527--542."},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"crossref","unstructured":"Chris Quirk Raymond J Mooney and Michel Galley. 2015. Language to Code: Learning Semantic Parsers for If-This-Then-That Recipes.. In ACL (1). 878--888. Chris Quirk Raymond J Mooney and Michel Galley. 2015. Language to Code: Learning Semantic Parsers for If-This-Then-That Recipes.. In ACL (1). 878--888.","DOI":"10.3115\/v1\/P15-1085"},{"volume-title":"Tyche: A Risk-Based Permission Model for Smart Homes. In 2018 IEEE Cybersecurity Development (SecDev)","year":"2018","author":"Rahmati A.","key":"e_1_3_2_2_74_1","unstructured":"A. Rahmati , E. Fernandes , K. Eykholt , and A. Prakash . 2018 . Tyche: A Risk-Based Permission Model for Smart Homes. In 2018 IEEE Cybersecurity Development (SecDev) , Vol. 00 . 29--36. A. Rahmati, E. Fernandes, K. Eykholt, and A. Prakash. 2018. Tyche: A Risk-Based Permission Model for Smart Homes. In 2018 IEEE Cybersecurity Development (SecDev), Vol. 00. 29--36."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlamp.2016.10.001"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"crossref","unstructured":"Eyal Ronen and Adi Shamir. 2016. Extended functionality attacks on IoT devices: The case of smart lights. In EuroS&P. 3--12. Eyal Ronen and Adi Shamir. 2016. Extended functionality attacks on IoT devices: The case of smart lights. In EuroS&P. 3--12.","DOI":"10.1109\/EuroSP.2016.13"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243817"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"crossref","unstructured":"Vijay Sivaraman Dominic Chan Dylan Earl and Roksana Boreli. 2016. SmartPhones Attacking Smart-Homes. In WiSec. 195--200. Vijay Sivaraman Dominic Chan Dylan Earl and Roksana Boreli. 2016. SmartPhones Attacking Smart-Homes. In WiSec. 195--200.","DOI":"10.1145\/2939918.2939925"},{"volume-title":"Arun Vishwanath, Roksana Boreli, and Olivier Mehani.","year":"2015","author":"Sivaraman Vijay","key":"e_1_3_2_2_79_1","unstructured":"Vijay Sivaraman , Hassan Habibi Gharakheili , Arun Vishwanath, Roksana Boreli, and Olivier Mehani. 2015 . Network-level security and privacy control for smarthome IoT devices. In WiMob . 163--167. Vijay Sivaraman, Hassan Habibi Gharakheili, Arun Vishwanath, Roksana Boreli, and Olivier Mehani. 2015. Network-level security and privacy control for smarthome IoT devices. In WiMob. 163--167."},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2014.2364613"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052709"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1177\/2167696815587648"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968219.2971367"},{"key":"e_1_3_2_2_84_1","unstructured":"Yuan Tian Nan Zhang Yueh-Hsun Lin Xiaofeng Wang Blase Ur Xianzheng Guo and Patrick Tague. 2017. SmartAuth: User-Centered Authorization for the Internet of Things. (2017). Yuan Tian Nan Zhang Yueh-Hsun Lin Xiaofeng Wang Blase Ur Xianzheng Guo and Patrick Tague. 2017. SmartAuth: User-Centered Authorization for the Internet of Things. (2017)."},{"volume-title":"Melwyn Pak Yong Ho, and Michael L. Littman","year":"2014","author":"Ur Blase","key":"e_1_3_2_2_85_1","unstructured":"Blase Ur , Elyse McManus , Melwyn Pak Yong Ho, and Michael L. Littman . 2014 . Practical Trigger-action Programming in the Smart Home. In CHI. Blase Ur, Elyse McManus, Melwyn Pak Yong Ho, and Michael L. Littman. 2014. Practical Trigger-action Programming in the Smart Home. In CHI."},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858556"},{"volume-title":"Fear and Logging in the Internet of Things. In Network and Distributed Systems Symposium.","year":"2018","author":"Wang Qi","key":"e_1_3_2_2_87_1","unstructured":"Qi Wang , Wajih Ul Hassan , Adam Bates , and Carl Gunter . 2018 . Fear and Logging in the Internet of Things. In Network and Distributed Systems Symposium. Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl Gunter. 2018. Fear and Logging in the Internet of Things. In Network and Distributed Systems Symposium."},{"volume-title":"Proceedings of the 2015 ACM international joint conference on pervasive and ubiquitous computing. ACM, 779--790","year":"2015","author":"Lim Woo","key":"e_1_3_2_2_88_1","unstructured":"Jong-bum Woo and Youn-kyung Lim . 2015 . User experience in do-it-yourselfstyle smart homes . In Proceedings of the 2015 ACM international joint conference on pervasive and ubiquitous computing. ACM, 779--790 . Jong-bum Woo and Youn-kyung Lim. 2015. User experience in do-it-yourselfstyle smart homes. In Proceedings of the 2015 ACM international joint conference on pervasive and ubiquitous computing. ACM, 779--790."},{"key":"e_1_3_2_2_89_1","unstructured":"Tianlong Yu Vyas Sekar Srinivasan Seshan Yuvraj Agarwal and Chenren Xu. 2015. Handling a trillion (unixable) laws on a billion devices: Rethinking network security for the Internet-of-Things. In HotNets. Tianlong Yu Vyas Sekar Srinivasan Seshan Yuvraj Agarwal and Chenren Xu. 2015. Handling a trillion (unixable) laws on a billion devices: Rethinking network security for the Internet-of-Things. In HotNets."},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00043"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3345662","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3345662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T18:17:12Z","timestamp":1673288232000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3345662"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":89,"alternative-id":["10.1145\/3319535.3345662","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3345662","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}