[3]
Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman J A, Invernizzi L, Kallitsis M, Kumar D, Lever C, Ma Z E, Mason J, Menscher D, Seaman C, Sullivan N, Thomas K, Zhou Y. Understanding the Mirai botnet. In Proc. the 26th USENIX Conference on Security Symposium, Aug. 2017, pp.1093–1110.
[9]
Yuan X J, Chen Y X, Zhao Y, Long Y H, Liu X K, Chen K, Zhang S Z, Huang H Q, Wang X F, Gunter C A. CommanderSong: A systematic approach for practical adversarial voice recognition. In Proc. the 27th USENIX Conference on Security Symposium, Aug. 2018, pp.49–64.
[15]
Kumar D, Shen K, Case B, Garg D, Alperovich G, Kuznetsov D, Gupta R, Durumeric Z. All things considered: An analysis of IoT devices on home networks. In Proc. the 28th USENIX Conference on Security Symposium, Aug. 2019, pp.1169–1185.
[19]
Trimananda R, Varmarken J, Markopoulou A, Demsky B. Packet-level signatures for smart home devices. In Proc. the 27th Annual Network and Distributed System Security Symposium, Feb. 2020.
[20]
Yu L J, Luo B, Ma J, Zhou Z Y, Liu Q Y. You are what you broadcast: Identification of mobile and IoT devices from (public) WiFi. In Proc. the 29th USENIX Security Symposium, Aug. 2020, pp.55–72.
[24]
Zhu Y Z, Xiao Z J, Chen Y X, Li Z J, Liu M, Zhao B Y, Zheng H. Et Tu Alexa? When commodity WiFi devices turn into adversarial motion sensors. In Proc. the 27th Annual Network and Distributed System Security Symposium, Feb. 2020.
[27]
Antonioli D, Tippenhauer N O, Rasmussen K B. Nearby threats: Reversing, analyzing, and attacking Google's `nearby connections' on Android. In Proc. the 26th Annual Network and Distributed System Security Symposium, Feb. 2019.
[29]
Celik Z B, Tan G, McDaniel P D. IoTGuard: Dynamic enforcement of security and safety policy in commodity IoT. In Proc. the 26th Annual Network and Distributed System Security Symposium, Feb. 2019.
[30]
Ding W B, Hu H X, Cheng L. IoTSafe: Enforcing safety and security policy with real IoT physical interaction discovery. In Proc. the 28th Annual Network and Distributed System Security Symposium, Feb. 2021.
[33]
Yuan B, Jia Y, Xing L Y, Zhao D F, Wang X F, Zou D Q, Jin H, Zhang Y Q. Shattered chain of trust: Understanding security risks in cross-cloud IoT access delegation. In Proc. the 29th USENIX Conference on Security Symposium, Aug. 2020, Article No. 67.
[35]
Tian Y, Zhang N, Lin Y H, Wang X F, Ur B, Guo X Z, Tague P. SmartAuth: User-centered authorization for the Internet of Things. In Proc. the 26th USENIX Conference on Security Symposium, Aug. 2017, pp.361–378.
[36]
Jia Y J, Chen Q A, Wang S Q, Rahmati A, Fernandes E, Mao Z M, Prakash A, Unviersity S J. ContexloT: Towards providing contextual integrity to appified IoT platforms. In Proc. the 24th Annual Network and Distributed System Security Symposium, Feb. 2017.
[38]
Fernandes E, Rahmati A, Jung J, Prakash A. Decentralized action integrity for trigger-action IoT platforms. In Proc. the 25th Annual Network and Distributed System Security Symposium, Feb. 2018.
[39]
He W J, Golla M, Padhi R, Ofek J, Dürmuth M, Fernandes E, Ur B. Rethinking access control and authentication for the home Internet of Things (IoT). In Proc. the 27th USENIX Conference on Security Symposium, Aug. 2018, pp.255–272.
[40]
Yan Q B, Liu K H, Zhou Q, Guo H Q, Zhang N. SurfingAttack: Interactive hidden attack on voice assistants using ultrasonic guided waves. In Proc. the 27th Annual Network and Distributed System Security Symposium, Feb. 2020.
[41]
Zhang Y Y, Xu L, Mendoza A, Yang G L, Chinprutthiwong P, Gu G F. Life after speech recognition: Fuzzing semantic misinterpretation for voice assistant applications. In Proc. the 26th Annual Network and Distributed System Security Symposium, Feb. 2019.
[45]
Fernandes E, Paupore J, Rahmati A, Simionato D, Conti M, Prakash A. FlowFence: Practical data protection for emerging IoT application frameworks. In Proc. the 25th USENIX Security Symposium, Aug. 2016, pp.531–548.
[47]
Shoshitaishvili Y, Wang R Y, Hauser C, Kruegel C, Vigna G. Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware. In Proc. the 22nd Annual Network and Distributed System Security Symposium, Feb. 2015.
[48]
Alrawi O, Lever C, Valakuzhy K, Court R, Snow K Z, Monrose F, Antonakakis M. The circle of life: A large-scale study of the IoT malware lifecycle. In Proc. the 30th USENIX Security Symposium, Aug. 2021, pp.3505–3522.
[49]
Chen D D, Woo M, Brumley D, Egele M. Towards automated dynamic analysis for Linux-based embedded firmware. In Proc. the 23rd Annual Network and Distributed System Security Symposium, Feb. 2016.
[50]
Zheng Y W, Davanian A, Yin H, Song C Y, Zhu H S, Sun L M. FIRM-AFL: High-throughput greybox fuzzing of IoT firmware via augmented process emulation. In Proc. the 28th USENIX Conference on Security Symposium, Aug. 2019, pp.1099–1114.
[51]
Wang X Q, Sun Y Q, Nanda S, Wang X F. Looking from the mirror: Evaluating IoT device security through mobile companion apps. In Proc. the 28th USENIX Conference on Security Symposium, Aug. 2019, pp.1151–1167.
[54]
Sikder A K, Aksu H, Uluagac A S. 6thSense: A context-aware sensor-based attack detector for smart devices. In Proc. the 26th USENIX Security Symposium, Aug. 2017, pp.397–414.
[71]
Zhang Y, Weng J, Dey R, Jin Y E, Lin Z Q, Fu X W. Breaking secure pairing of Bluetooth low energy using downgrade attacks. In Proc. the 29th USENIX Security Symposium, Aug. 2020, pp.37–54.