When Smart Devices Are Stupid: Negative Experiences Using Home Smart Devices
暂无分享,去创建一个
Blase Ur | Jesse Martinez | Weijia He | Roshni Padhi | Lefan Zhang | Blase Ur | Weijia He | Lefan Zhang | Roshni Padhi | Jesse Martinez
[1] Lujo Bauer,et al. Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes , 2017, WWW.
[2] João Pedro Hespanha,et al. Observability of linear systems under adversarial attacks , 2015, 2015 American Control Conference (ACC).
[3] Blase Ur,et al. Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance , 2014, UbiComp.
[4] Raymond J. Mooney,et al. Language to Code: Learning Semantic Parsers for If-This-Then-That Recipes , 2015, ACL.
[5] Yuan Tian,et al. Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home , 2018, ArXiv.
[6] A. Strauss,et al. Basics of Qualitative Research , 1992 .
[7] Atul Prakash,et al. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks , 2016, USENIX Security Symposium.
[8] Tadayoshi Kohno,et al. Consumer Smart Homes: Where We Are and Where We Need to Go , 2019, HotMobile.
[9] Blase Ur,et al. Practical trigger-action programming in the smart home , 2014, CHI.
[10] Paulo Tabuada,et al. Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.
[11] Qi Wang,et al. Fear and Logging in the Internet of Things , 2018, NDSS.
[12] Blase Ur,et al. How Users Interpret Bugs in Trigger-Action Programming , 2019, CHI.
[13] Volker Wulf,et al. What Happened in my Home?: An End-User Development Approach for Smart Home Data Visualization , 2017, CHI.
[14] Deepak Kumar,et al. Skill Squatting Attacks on Amazon Alexa , 2018, USENIX Security Symposium.
[15] Fabio Paternò,et al. Personalization of Context-Dependent Applications Through Trigger-Action Rules , 2017, ACM Trans. Comput. Hum. Interact..
[16] Jo Vermeulen,et al. From today's augmented houses to tomorrow's smart homes: new directions for home automation research , 2014, UbiComp.
[17] Volker Wulf,et al. The Catch(es) with Smart Home: Experiences of a Living Lab Field Study , 2017, CHI.
[18] Donatella Sciuto,et al. BuildingRules , 2018, ACM Trans. Cyber Phys. Syst..
[19] Pamela Zave,et al. Locked or Not?: Mental Models of IoT Feature Interaction , 2017, CHI.
[20] Dawn Xiaodong Song,et al. Latent Attention For If-Then Program Synthesis , 2016, NIPS.
[21] Amos Azaria,et al. InstructableCrowd: Creating IF-THEN Rules via Conversations with the Crowd , 2016, CHI Extended Abstracts.
[22] Ali A. Nazari Shirehjini,et al. Towards interacting with smarter systems , 2018, J. Ambient Intell. Humaniz. Comput..
[23] Atul Prakash,et al. Tyche: A Risk-Based Permission Model for Smart Homes , 2018, 2018 IEEE Cybersecurity Development (SecDev).
[24] Atul Prakash,et al. Decentralized Action Integrity for Trigger-Action IoT Platforms , 2018, NDSS.
[25] Michael D. Ernst,et al. Automatic Trigger Generation for Rule-based Smart Homes , 2016, PLAS@CCS.
[26] Shan Lu,et al. AutoTap: Synthesizing and Repairing Trigger-Action Programs Using LTL Properties , 2019, 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE).
[27] Dongmei Zhang,et al. Systematically Ensuring the Confidence of Real-Time Home Automation IoT Systems , 2018, ACM Trans. Cyber Phys. Syst..
[28] Michael Weber,et al. Exploring End User Programming Needs in Home Automation , 2017, ACM Trans. Comput. Hum. Interact..
[29] Zhao Li,et al. Systematically Debugging IoT Control System Correctness for Building Automation , 2016, BuildSys@SenSys.
[30] Sarah C. Darby,et al. “Home is where the smart is”? Evaluating smart home research and approaches against the concept of home , 2018 .
[31] Maya Cakmak,et al. Supporting mental model accuracy in trigger-action programming , 2015, UbiComp.
[32] Blase Ur,et al. Rethinking Access Control and Authentication for the Home Internet of Things (IoT) , 2018, USENIX Security Symposium.
[33] Patrick D. McDaniel,et al. Soteria: Automated IoT Safety and Security Analysis , 2018, USENIX Annual Technical Conference.
[34] David Kim,et al. Integrating the Smart Home into the Digital Calendar , 2016, CHI.
[35] Nicola Dell,et al. “A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology , 2018, CHI.
[36] Mark W. Newman,et al. Learning from a learning thermostat: lessons for intelligent systems for the home , 2013, UbiComp.
[37] Musard Balliu,et al. If This Then What?: Controlling Flows in IoT Apps , 2018, CCS.
[38] Youn-Kyung Lim,et al. User experience in do-it-yourself-style smart homes , 2015, UbiComp.
[39] Patrick D. McDaniel,et al. Sensitive Information Tracking in Commodity IoT , 2018, USENIX Security Symposium.