Xianghang (Scott) Mi
Xianghang (Scott) Mi
About
Publications
Courses
Data & Tools
Students
Experience
CV
Light
Dark
Automatic
IoT Security
Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
3rd-party skills on voice assistant platforms incur new seurity threats to users.
An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance
A comprehensive measurement of IFTTT, an IoT workflow platform, to reveal its network and security implications.
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
Inspired by the boom of the consumer IoT market, many device manufacturers, new start-up companies and technology behemoths have jumped into the space. Indeed, in a span of less than 5 years, we have experienced the manifestation of an array of …
Cite
×