Scott Xianghang Mi
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
3rd-party skills on voice assistant platforms incur new seurity threats to users.
An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance
A comprehensive measurement of IFTTT, an IoT workflow platform, to reveal its network and security implications.
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
Inspired by the boom of the consumer IoT market, many device manufacturers, new start-up companies and technology behemoths have jumped into the space. Indeed, in a span of less than 5 years, we have experienced the manifestation of an array of …