Security Analysis of Smart Home Based on Life Cycle
暂无分享,去创建一个
Yan Jia | Xuejun Li | Yuqing Zhang | Yuhang Mao | Shangru Zhao | Yuqing Zhang | Yan Jia | Xuejun Li | Yuhang Mao | Shangru Zhao
[1] Adi Shamir,et al. IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[2] Aurélien Francillon,et al. A Large-Scale Analysis of the Security of Embedded Firmwares , 2014, USENIX Security Symposium.
[3] Wenyuan Xu,et al. DolphinAttack: Inaudible Voice Commands , 2017, CCS.
[4] Qi Wang,et al. Fear and Logging in the Internet of Things , 2018, NDSS.
[5] Jin-Hee Han,et al. Security considerations for secure and trustworthy smart home system in the IoT environment , 2015, 2015 International Conference on Information and Communication Technology Convergence (ICTC).
[6] Ítalo S. Cunha,et al. AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle , 2016, SenSys.
[7] Ali Saman Tosun,et al. An Experimental Framework for Investigating Security and Privacy of IoT Devices , 2017, ISDDC.
[8] Rohan Doshi,et al. IoT network monitor , 2017, 2017 IEEE MIT Undergraduate Research Technology Conference (URTC).
[9] Earlence Fernandes,et al. Security Analysis of Emerging Smart Home Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[10] Blase Ur,et al. Rethinking Access Control and Authentication for the Home Internet of Things (IoT) , 2018, USENIX Security Symposium.
[11] Yuguang Fang,et al. EPIC: A Differential Privacy Framework to Defend Smart Homes Against Internet Traffic Analysis , 2018, IEEE Internet of Things Journal.