-
1
-
-
84987663445
-
-
Accessed: Oct
-
"Vera Smart Home Controller," http://getvera.com/controllers/vera3/, Accessed: Oct 2015
-
(2015)
Vera Smart Home Controller
-
-
-
2
-
-
84987625784
-
-
Accessed: Nov
-
Allseen Alliance, "AllJoyn Data Exchange," https://allseenalliance.org/ framework/documentation/learn/core/system-description/data-exchange, Accessed: Nov 2015
-
(2015)
AllJoyn Data Exchange
-
-
-
3
-
-
84964823809
-
-
Accessed: Oct
-
Allseen Alliance, "AllJoyn Framework," https://allseenalliance.org/ framework, Accessed: Oct 2015
-
(2015)
AllJoyn Framework
-
-
-
4
-
-
84987662674
-
-
Accessed: Nov
-
AllSeen Alliance, "AllJoyn Security 2.0 Feature: High-level Design," https://allseenalliance.org/framework/documentation/learn/ core/security2 0/hld, Accessed: Nov 2015
-
(2015)
AllJoyn Security 2.0 Feature: High-level Design
-
-
-
5
-
-
84987669222
-
-
Accessed: Nov
-
Apple, "App Security, iOS Security Guide," http://www.apple.com/ business/docs/iOS Security Guide.pdf, Accessed: Nov 2015
-
(2015)
App Security, IOS Security Guide
-
-
-
6
-
-
84987618059
-
-
Accessed: Oct
-
Apple, "HMAccessoryDelegate Protocol Reference," https: //developer.apple.com/library/ios/documentation/HomeKit/ Reference/HMAccessoryDelegate Protocol/index.html#// apple ref/occ/intfm/HMAccessoryDelegate/accessory:service: didUpdateValueForCharacteristic:, Accessed: Oct 2015
-
(2015)
HMAccessoryDelegate Protocol Reference
-
-
-
7
-
-
84987682966
-
-
Accessed: Oct
-
Apple, "HomeKit," http://www.apple.com/ios/homekit/, Accessed: Oct 2015
-
(2015)
HomeKit
-
-
-
8
-
-
84869388345
-
Pscout: Analyzing the android permission specification
-
ser. CCS '12. New York, NY, USA: ACM
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie, "Pscout: Analyzing the android permission specification," in Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS '12. New York, NY, USA: ACM, 2012, pp. 217-228. [Online]. Available: http://doi.acm.org/10.1145/2382196.2382222
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 217-228
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
10
-
-
84910671293
-
Oauth demystified for mobile application developers
-
ser. CCS '14. New York, NY, USA: ACM
-
E. Y. Chen, Y. Pei, S. Chen, Y. Tian, R. Kotcher, and P. Tague, "Oauth demystified for mobile application developers," in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS '14. New York, NY, USA: ACM, 2014, pp. 892-903. [Online]. Available: http://doi.acm.org/10.1145/2660267.2660323
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
, pp. 892-903
-
-
Chen, E.Y.1
Pei, Y.2
Chen, S.3
Tian, Y.4
Kotcher, R.5
Tague, P.6
-
11
-
-
79961035117
-
Analyzing inter-application communication in android
-
ser. MobiSys '11. New York, NY, USA: ACM
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, "Analyzing Inter-application Communication in Android," in Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, ser. MobiSys '11. New York, NY, USA: ACM, 2011, pp. 239-252. [Online]. Available: http://doi.acm.org/10.1145/1999995.2000018
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
12
-
-
84872036052
-
Computer security and the modern home
-
Jan
-
T. Denning, T. Kohno, and H. M. Levy, "Computer security and the modern home," Commun. ACM, vol. 56, no. 1, pp. 94-103, Jan. 2013. [Online]. Available: http://doi.acm.org/10.1145/2398356.2398377
-
(2013)
Commun. ACM
, vol.56
, Issue.1
, pp. 94-103
-
-
Denning, T.1
Kohno, T.2
Levy, H.M.3
-
13
-
-
80755187788
-
Android permissions demystified
-
ser. CCS '11. New York, NY, USA: ACM
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android permissions demystified," in Proceedings of the 18th ACM Conference on Computer and Communications Security, ser. CCS '11. New York, NY, USA: ACM, 2011, pp. 627-638. [Online]. Available: http://doi.acm.org/10.1145/2046707.2046779
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
14
-
-
85044855162
-
How to ask for permission
-
ser. HotSec'12. Berkeley, CA, USA: USENIX Association
-
A. P. Felt, S. Egelman, M. Finifter, D. Akhawe, and D. Wagner, "How to ask for permission," in Proceedings of the 7th USENIX Conference on Hot Topics in Security, ser. HotSec'12. Berkeley, CA, USA: USENIX Association, 2012, pp. 7-7. [Online]. Available: http://dl.acm.org/citation.cfm?id=2372387.2372394
-
(2012)
Proceedings of the 7th USENIX Conference on Hot Topics in Security
, pp. 7
-
-
Felt, A.P.1
Egelman, S.2
Finifter, M.3
Akhawe, D.4
Wagner, D.5
-
15
-
-
84869821127
-
I've got 99 problems, but vibration ain't one: A survey of smartphone users' concerns
-
ser. SPSM '12. New York, NY, USA: ACM
-
A. P. Felt, S. Egelman, and D. Wagner, "I've got 99 problems, but vibration ain't one: A survey of smartphone users' concerns," in Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, ser. SPSM '12. New York, NY, USA: ACM, 2012, pp. 33-44. [Online]. Available: http://doi.acm.org/10.1145/2381934.2381943
-
(2012)
Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 33-44
-
-
Felt, A.P.1
Egelman, S.2
Wagner, D.3
-
16
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
ser. SOUPS '12. New York, NY, USA: ACM
-
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, "Android permissions: User attention, comprehension, and behavior," in Proceedings of the Eighth Symposium on Usable Privacy and Security, ser. SOUPS '12. New York, NY, USA: ACM, 2012, pp. 3:1-3:14. [Online]. Available: http://doi.acm.org/10.1145/2335356.2335360
-
(2012)
Proceedings of the Eighth Symposium on Usable Privacy and Security
, pp. 31-314
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
18
-
-
84987682981
-
-
Accessed: Oct
-
Google, "Project Weave," https://developers.google.com/weave/, Accessed: Oct 2015
-
(2015)
Project Weave
-
-
-
20
-
-
84987625790
-
-
Accessed: Oct
-
Kohsuke Kawaguchi, "Groovy Sandbox," http://groovy-sandbox. kohsuke.org/, Accessed: Oct 2015
-
(2015)
-
-
Kawaguchi, K.1
-
22
-
-
84869416020
-
CHEX: Statically vetting Android apps for component hijacking vulnerabilities
-
ser. CCS '12. New York, NY, USA: ACM
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang, "CHEX: Statically vetting Android apps for component hijacking vulnerabilities," in Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS '12. New York, NY, USA: ACM, 2012, pp. 229-240. [Online]. Available: http://doi.acm.org/10.1145/2382196.2382223
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 229-240
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
23
-
-
85095121198
-
Experimental security analyses of non-networked compact fluorescent lamps: A case study of home automation security
-
Arlington, VA: USENIX
-
T. Oluwafemi, T. Kohno, S. Gupta, and S. Patel, "Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: A Case Study of Home Automation Security," in Proceedings of the LASER 2013 (LASER 2013). Arlington, VA: USENIX, 2013, pp. 13-24. [Online]. Available: https://www.usenix.org/laser2013/program/oluwafemi
-
(2013)
Proceedings of the LASER 2013 (LASER 2013)
, pp. 13-24
-
-
Oluwafemi, T.1
Kohno, T.2
Gupta, S.3
Patel, S.4
-
24
-
-
85076323421
-
Securing embedded user interfaces: Android and beyond
-
F. Roesner and T. Kohno, "Securing embedded user interfaces: Android and beyond." in USENIX Security, 2013
-
(2013)
USENIX Security
-
-
Roesner, F.1
Kohno, T.2
-
25
-
-
84874840847
-
User-driven access control: Rethinking permission granting in modern operating systems
-
ser. SP '12. Washington, DC, USA: IEEE Computer Society
-
F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. J. Wang, and C. Cowan, "User-driven access control: Rethinking permission granting in modern operating systems," in Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP '12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 224-238. [Online]. Available: http://dx.doi.org/10.1109/SP.2012.24
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy
, pp. 224-238
-
-
Roesner, F.1
Kohno, T.2
Moshchuk, A.3
Parno, B.4
Wang, H.J.5
Cowan, C.6
-
26
-
-
84987683002
-
-
Accessed: Oct
-
Samsung, "SmartApp Location object," http://docs.smartthings.com/en/ latest/ref-docs/location-ref.html#location-ref, Accessed: Oct 2015
-
(2015)
Samsung
-
-
-
27
-
-
84987683001
-
-
Accessed: Nov
-
Samsung, "SmartThings," http://www.smartthings.com/, Accessed: Nov 2015
-
(2015)
Samsung
-
-
-
28
-
-
84987669247
-
-
Accessed: Oct
-
Samsung, "SmartThings OAuth Protocol Flow-Smart-Things Documentation," http://docs.smartthings.com/en/latest/ smartapp-web-services-developers-guide/tutorial-part2.html# appendix-just-The-urls-please, Accessed: Oct 2015
-
(2015)
Samsung
-
-
-
30
-
-
84900415013
-
Practical trigger-action programming in the smart home
-
ser. CHI '14. New York, NY, USA: ACM
-
B. Ur, E. McManus, M. Pak Yong Ho, and M. L. Littman, "Practical trigger-action programming in the smart home," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ser. CHI '14. New York, NY, USA: ACM, 2014, pp. 803-812. [Online]. Available: http://doi.acm.org/10.1145/2556288.2557420
-
(2014)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 803-812
-
-
Ur, B.1
McManus, E.2
Pak Yong Ho, M.3
Littman, M.L.4
-
31
-
-
0001956132
-
Soot-A Java bytecode optimization framework
-
ser. CASCON '99. IBM Press
-
R. Vallee-Rai, P. Co, E. Gagnon, L. Hendren, P. Lam, and V. Sundaresan, "Soot-A java bytecode optimization framework," in Proceedings of the 1999 Conference of the Centre for Advanced Studies on Collaborative Research, ser. CASCON '99. IBM Press, 1999, pp. 13-. [Online]. Available: http://dl.acm.org/citation.cfm?id=781995.782008
-
(1999)
Proceedings of the 1999 Conference of the Centre for Advanced Studies on Collaborative Research
, pp. 13
-
-
Vallee-Rai, R.1
Co, P.2
Gagnon, E.3
Hendren, L.4
Lam, P.5
Sundaresan, V.6
-
32
-
-
84964577386
-
-
Accessed: Oct
-
Veracode, "The Internet of Things: Security Research Study," https://www.veracode.com/sites/default/files/Resources/Whitepapers/ internet-of-things-whitepaper.pdf, Accessed: Oct 2015
-
(2015)
The Internet of Things: Security Research Study
-
-
|