{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:45:03Z","timestamp":1730328303394,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2237012 and CNS-2132281"],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1145\/3643833.3656116","type":"proceedings-article","created":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T23:25:07Z","timestamp":1716247507000},"page":"207-218","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Practical Integrity Validation in the Smart Home with HomeEndorser"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-1917-7677","authenticated-orcid":false,"given":"Kaushal","family":"Kafle","sequence":"first","affiliation":[{"name":"William & Mary, Williamsburg, VA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0009-0006-2203-4078","authenticated-orcid":false,"given":"Kirti","family":"Jagtap","sequence":"additional","affiliation":[{"name":"Penn State University, State College, PA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1078-6185","authenticated-orcid":false,"given":"Mansoor","family":"Ahmed-Rengers","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4964-1170","authenticated-orcid":false,"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6866-4565","authenticated-orcid":false,"given":"Adwait","family":"Nadkarni","sequence":"additional","affiliation":[{"name":"William & Mary, Williamsburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alarm Grid. Accessed Feb 2021. Introducing the \"Privacy When Disarmed\" Feature for Total Connect 2.0 HD Cameras - Alarm Grid. https:\/\/www.alarmgrid.com\/blog\/introducing-the-privacy-when-disarmed-feature-for-total-connect- ."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354254"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134054"},{"key":"e_1_3_2_1_5_1","volume-title":"Soteria: Automated IoT Safety and Security Analysis. In 2018 USENIX Annual Technical Conference (USENIX ATC). 147--158","author":"Celik Z. Berkay","year":"2018","unstructured":"Z. Berkay Celik, Patrick McDaniel, and Gang Tan. 2018. Soteria: Automated IoT Safety and Security Analysis. In 2018 USENIX Annual Technical Conference (USENIX ATC). 147--158."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23326"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24464"},{"volume-title":"Proceedings IEEE Symposium on Security and Privacy.","author":"Clark D. D.","key":"e_1_3_2_1_8_1","unstructured":"D. D. Clark and D. Wilson. 1987. A Comparison of Military and Commercial Security Policies. In Proceedings IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_9_1","unstructured":"CNET. Accessed May 2021. Google reverses course on cutting off Works with Nest connections. https:\/\/www.cnet.com\/home\/smart-home\/google-reverses-course-on-cutting-off-works-with-nest-connections\/."},{"key":"e_1_3_2_1_10_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security ($$SOUPS$$","author":"Cobb Camille","year":"2020","unstructured":"Camille Cobb, Milijana Surbatovich, Anna Kawakami, Mahmood Sharif, Lujo Bauer, Anupam Das, and Limin Jia. 2020. How Risky Are Real Users'$$IFTTT$$ Applets?. In Sixteenth Symposium on Usable Privacy and Security ($$SOUPS$$ 2020). 505--529."},{"key":"e_1_3_2_1_11_1","unstructured":"Digital Trends. Accessed May 2021. Google is ending its Works with Nest system. Here's what that means for you. https:\/\/www.digitaltrends.com\/home\/google-is-ending-its-works-with-nest-system\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Digitized House. Accessed May 2021. Fallout Mounts from Impending Works with Nest Sunsetting. https:\/\/digitized.house\/fallout-mounts-works-with-nest-sunsetting\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243865"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24368"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095813"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. 2--16","author":"Fraser Timothy","year":"1999","unstructured":"Timothy Fraser, Lee Badger, and Mark Feldman. 1999. Hardening COTS Software with Generic Software Wrappers. In Proceedings of the IEEE Symposium on Security and Privacy. 2--16."},{"key":"e_1_3_2_1_17_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Fu Chenglong","year":"2021","unstructured":"Chenglong Fu, Qiang Zeng, and Xiaojiang Du. 2021. $$HAWatcher$$:$$Semantics-Aware$$ Anomaly Detection for Appified Smart Homes. In 30th USENIX Security Symposium (USENIX Security 21). 4223--4240."},{"key":"e_1_3_2_1_18_1","unstructured":"Google. Accessed June 2019. Local Home SDK. https:\/\/developers.google.com\/actions\/smarthome\/local-home-sdk."},{"key":"e_1_3_2_1_19_1","unstructured":"Google. Accessed May 2021. We hear you: updates to Works with Nest. https:\/\/blog.google\/products\/google-nest\/updates-works-with-nest\/."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Heuser Stephan","year":"2014","unstructured":"Stephan Heuser, Adwait Nadkarni, William Enck, and Ahmad-Reza Sadeghi. 2014. ASM: A Programmable Interface for Extending Android Security. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_21_1","unstructured":"HomeEndorser. 2020. tool Online Appendix. https:\/\/sites.google.com\/view\/homeendorser."},{"key":"e_1_3_2_1_22_1","unstructured":"How-to Geek. 2021. How to Use Your Nest Thermostat as a Motion Detector. https:\/\/www.howtogeek.com\/249093\/how-to-use-your-nest-thermostat-as-a-motion-detector\/."},{"key":"e_1_3_2_1_23_1","unstructured":"IFTTT. Accessed Feb 2023. Google Nest is Back on IFTTT. https:\/\/ifttt.com\/explore\/new-google-nest-thermostat-phase1."},{"key":"e_1_3_2_1_24_1","unstructured":"IFTTT. Accessed June 2018. IFTTT helps your apps and devices work together. https:\/\/ifttt.com\/."},{"key":"e_1_3_2_1_25_1","unstructured":"IFTTT. Accessed May 2021. Important update about Nest services. https:\/\/help.ifttt.com\/hc\/en-us\/articles\/360022524734-Important-update-about-the-Nest-services."},{"key":"e_1_3_2_1_26_1","unstructured":"IoTivity. Accessed June 2019. IoTivity Wiki: IoTivity Initialization and Setting. https:\/\/wiki.iotivity.org\/initialize_setting."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23051"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2705045"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300031"},{"key":"e_1_3_2_1_30_1","first-page":"1","article-title":"Security in Centralized Data Store-based Home Automation Platforms: A Systematic Analysis of Nest and Hue","volume":"5","author":"Kafle Kaushal","year":"2020","unstructured":"Kaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, and Denys Poshyvanyk. 2020. Security in Centralized Data Store-based Home Automation Platforms: A Systematic Analysis of Nest and Hue. ACM Transactions on Cyber-Physical Systems (TCPS), Vol. 5, 1 (Dec. 2020).","journal-title":"ACM Transactions on Cyber-Physical Systems (TCPS)"},{"key":"e_1_3_2_1_31_1","unstructured":"Kami. Accessed May 2021. How to use Home and Away mode in YI Home app. https:\/\/help.yitechnology.com\/hc\/en-us\/articles\/360041767214-How-to-use-Home-and-Away-mode-in-YI-Home-app."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11957-6_18"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078864"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00062"},{"key":"e_1_3_2_1_36_1","volume-title":"MAVERICK: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime. arXiv preprint arXiv:2302.01452","author":"Mazhar M Hammad","year":"2023","unstructured":"M Hammad Mazhar, Li Li, Endadul Hoque, and Omar Chowdhury. 2023. MAVERICK: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime. arXiv preprint arXiv:2302.01452 (2023)."},{"key":"e_1_3_2_1_37_1","volume-title":"Reeds","author":"McIlroy M. Douglas","year":"1992","unstructured":"M. Douglas McIlroy and James A. Reeds. 1992. Multilevel security in the UNIX tradition. Software: Practice and Experience (1992)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241181"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516677"},{"key":"e_1_3_2_1_40_1","unstructured":"Nest Labs. Accessed Feb 2021. Turn your Nest camera on or off - Google Nest Help. https:\/\/bit.ly\/33lkfPE."},{"key":"e_1_3_2_1_41_1","unstructured":"Nest Labs. Accessed June 2018. Nest Developers. https:\/\/developers.nest.com\/\/\/."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281440"},{"key":"e_1_3_2_1_43_1","unstructured":"OCF. 2020. Open Connectivity Foundation - OCF. https:\/\/openconnectivityfoundation.github.io\/devicemodels\/docs\/index.html."},{"key":"e_1_3_2_1_44_1","volume-title":"Tyche: A Risk-Based Permission Model for Smart Homes. In 2018 IEEE Cybersecurity Development (SecDev). 29--36.","author":"Rahmati Amir","year":"2018","unstructured":"Amir Rahmati, Earlence Fernandes, Kevin Eykholt, and Atul Prakash. 2018. Tyche: A Risk-Based Permission Model for Smart Homes. In 2018 IEEE Cybersecurity Development (SecDev). 29--36."},{"key":"e_1_3_2_1_45_1","unstructured":"Ring. Accessed Feb 2021. Control All your Ring Cameras with Modes - Ring Help. https:\/\/support.ring.com\/hc\/en-us\/articles\/360036107792-Control-All-your-Ring-Cameras-with-Modes."},{"key":"e_1_3_2_1_46_1","unstructured":"Samsung. 2018. Samsung SmartThings SmartApp Public Repository. https:\/\/github.com\/SmartThingsCommunity\/SmartThingsPublic."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243817"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the ISOC Network and Distributed Systems Security Symposium (NDSS).","author":"Shankar Umesh","year":"2006","unstructured":"Umesh Shankar, Trent Jaeger, and Reiner Sailer. 2006. Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. In Proceedings of the ISOC Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399358"},{"key":"e_1_3_2_1_50_1","unstructured":"Simplisafe. Accessed Feb 2021. What is the privacy shutter? https:\/\/support.simplisafe.com\/hc\/en-us\/articles\/360029760591."},{"key":"e_1_3_2_1_51_1","unstructured":"SimpliSafe. Accessed May 2021. Everything You Need to Know About Home Mode. https:\/\/simplisafe.com\/blog\/home-mode."},{"key":"e_1_3_2_1_52_1","unstructured":"SmartThings. Accessed Aug 2022. The End of Groovy Has Arrived. https:\/\/community.smartthings.com\/t\/the-end-of-groovy-has-arrived\/246280."},{"key":"e_1_3_2_1_53_1","unstructured":"SmartThings. Accessed Dec 2018. Capabilities Reference. https:\/\/docs.smartthings.com\/en\/latest\/capabilities-reference.html."},{"key":"e_1_3_2_1_54_1","unstructured":"SmartThings. Accessed June 2019. The SmartThings Ecosystem. https:\/\/smartthings.developer.samsung.com\/docs\/index.html."},{"key":"e_1_3_2_1_55_1","unstructured":"Statista. 2020. Smart Home - Worldwide. https:\/\/www.statista.com\/outlook\/279\/100\/smart-home\/worldwide."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052709"},{"key":"e_1_3_2_1_57_1","unstructured":"The Ambient. Accessed May 2021. Life360 guide: How to smarten up your home with the geolocation app. https:\/\/www.the-ambient.com\/guides\/life360-complete-guide-804."},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the 26th USENIX Security Symposium.","author":"Tian Yuan","year":"2017","unstructured":"Yuan Tian, Nan Zhang, Yueh-Hsun Lin, XiaoFeng Wang, Blase Ur, XianZheng Guo, and Patrick Tague. 2017. SmartAuth: User-Centered Authorization for the Internet of Things. In Proceedings of the 26th USENIX Security Symposium."},{"key":"e_1_3_2_1_59_1","volume-title":"Fear and Logging in the Internet of Things. In Network and Distributed Systems Symposium.","author":"Wang Qi","year":"2018","unstructured":"Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl Gunter. 2018. Fear and Logging in the Internet of Things. In Network and Distributed Systems Symposium."},{"key":"e_1_3_2_1_60_1","volume-title":"Proceedings of the 11th USENIX Security Symposium.","author":"Wright Chris","year":"2002","unstructured":"Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, and Greg Kroah-Hartman. 2002. Linux Security Modules: General Security Support for the Linux Kernel. In Proceedings of the 11th USENIX Security Symposium."},{"key":"e_1_3_2_1_61_1","volume-title":"Runtime Verification: 20th International Conference, RV 2020, Los Angeles, CA, USA, October 6--9, 2020, Proceedings 20","author":"Yahyazadeh Moosa","year":"2020","unstructured":"Moosa Yahyazadeh, Syed Rafiul Hussain, Endadul Hoque, and Omar Chowdhury. 2020. PATRIOT: Policy assisted resilient programmable IoT system. In Runtime Verification: 20th International Conference, RV 2020, Los Angeles, CA, USA, October 6--9, 2020, Proceedings 20. Springer, 151--171."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322431.3325107"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/566340.566343"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298481"}],"event":{"name":"WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Seoul Republic of Korea","acronym":"WiSec '24"},"container-title":["Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643833.3656116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T10:26:24Z","timestamp":1719483984000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643833.3656116"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":63,"alternative-id":["10.1145\/3643833.3656116","10.1145\/3643833"],"URL":"https:\/\/doi.org\/10.1145\/3643833.3656116","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"2024-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}