IoT Security

Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems

3rd-party skills on voice assistant platforms incur new seurity threats to users.

Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems

3rd-party skills on voice assistant platforms incur new seurity threats to users.

An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance

A comprehensive measurement of IFTTT, an IoT workflow platform, to reveal its network and security implications.

An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance

A comprehensive measurement of IFTTT, an IoT workflow platform, to reveal its network and security implications.

Understanding iot security through the data crystal ball: Where we are now and where we are going to be

Inspired by the boom of the consumer IoT market, many device manufacturers, new start-up companies and technology behemoths have jumped into the space. Indeed, in a span of less than 5 years, we have experienced the manifestation of an array of …

Understanding iot security through the data crystal ball: Where we are now and where we are going to be

Inspired by the boom of the consumer IoT market, many device manufacturers, new start-up companies and technology behemoths have jumped into the space. Indeed, in a span of less than 5 years, we have experienced the manifestation of an array of …