Hestia: simple least privilege network policies for smart homes
暂无分享,去创建一个
[1] Seth Goldstein. Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer , 2018 .
[2] Nick Feamster,et al. Web-based Attacks to Discover and Control Local IoT Devices , 2018, IoT S&P@SIGCOMM.
[3] Nan Zhang,et al. HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps , 2017, WISEC.
[4] Indrajit Ray,et al. Behavioral Fingerprinting of IoT Devices , 2018, ASHES@CCS.
[5] Ahmad-Reza Sadeghi,et al. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[6] Vitaly Shmatikov,et al. Situational Access Control in the Internet of Things , 2018, CCS.
[7] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[8] Sasu Tarkoma,et al. IOTURVA: Securing Device-to-Device (D2D) Communication in IoT Networks , 2017, CHANTS@MOBICOM.
[9] Sasu Tarkoma,et al. Off-the-Shelf Software-defined Wi-Fi Networks , 2016, SIGCOMM.
[10] Ian Molloy,et al. Standardizing IoT Network Security Policy Enforcement , 2018 .
[11] Roksana Boreli,et al. Smart-Phones Attacking Smart-Homes , 2016, WISEC.
[12] Omar Alrawi,et al. SoK: Security Evaluation of Home-Based IoT Deployments , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[13] Srinivasan Seshan,et al. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things , 2015, HotNets.
[14] Ralph E. Droms,et al. Manufacturer Usage Description Specification , 2019, RFC.
[15] Qi Alfred Chen,et al. ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms , 2017, NDSS.
[16] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.