{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T07:15:15Z","timestamp":1760426115780,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031192074"},{"type":"electronic","value":"9783031192081"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-19208-1_6","type":"book-chapter","created":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:03:45Z","timestamp":1668643425000},"page":"64-75","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Inferring Device Interactions for\u00a0Attack Path Discovery in\u00a0Smart Home IoT"],"prefix":"10.1007","author":[{"given":"Mengjie","family":"Sun","sequence":"first","affiliation":[]},{"given":"Ke","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yaowen","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Weidong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Limin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,17]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Acar, A., et al.: Peek-a-boo: i see your smart home activities, even encrypted! In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 207\u2013218 (2020)","DOI":"10.1145\/3395351.3399421"},{"key":"6_CR2","unstructured":"Home Assisant. https:\/\/www.home-assistant.io\/"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Chen, J., et al.: IoTFuzzer: discovering memory corruptions in IoT through app-based fuzzing. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23159"},{"key":"6_CR4","unstructured":"Cve-poc (2021). https:\/\/github.com\/chengcheng227\/CVE-POC"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Ding, W., Hu, H.: On the safety of iot device physical interaction control. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 832\u2013846 (2018)","DOI":"10.1145\/3243734.3243865"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Ding, W., Hu, H., Cheng, L.: IOTSAFE: enforcing safety and security policy with real IoT physical interaction discovery. In: The 28th Network and Distributed System Security Symposium (NDSS 2021) (2021)","DOI":"10.14722\/ndss.2021.24368"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Fernandes, F., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 636\u2013654. IEEE (2016)","DOI":"10.1109\/SP.2016.44"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Gu, T., et al.: IoTSpy: uncovering human privacy leakage in IoT networks via mining wireless context. In: 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1\u20137. IEEE (2020)","DOI":"10.1109\/PIMRC48278.2020.9217236"},{"key":"6_CR9","unstructured":"Hagberg, A., Swart, P., Chult, D.S.: Exploring network structure, dynamics, and function using NetworkX. Tech. rep. Los Alamos National Lab. (LANL), Los Alamos, NM (United States) (2008)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Lindley, D.S.: Bayesian statistics: A review. SIAM (1972)","DOI":"10.1137\/1.9781611970654"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Liu, X., et al.: SniffMislead: non-intrusive privacy protection against wireless packet sniffers in smart homes. In: 24th International Symposium on Research in Attacks, Intrusions and Defenses, pp. 33\u201347 (2021)","DOI":"10.1145\/3471621.3471856"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Loper, E., Bird, S.: Nltk: the natural language toolkit. arXiv preprint cs\/0205028 (2002)","DOI":"10.3115\/1118108.1118117"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Luo, Y., et al.: Context-rich privacy leakage analysis through inferring apps in smart Home IoT. IEEE Internet of Things J. 8.4, 2736\u20132750 (2020)","DOI":"10.1109\/JIOT.2020.3019812"},{"key":"6_CR14","unstructured":"Ozmen, M.O., et al.: Discovering physical interaction vulnerabilities in IoT deployments. arXiv preprint arXiv:2102.01812 (2021)"},{"key":"6_CR15","unstructured":"Smartthing. https:\/\/www.smartthings.com\/"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Tarjan, R.: Depth-first search and linear graph algorithms. SIAM J. Computing 1.2, 146\u2013160 (1972)","DOI":"10.1137\/0201010"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Trimananda, R., et al.: Packet-level signatures for smart home devices. In: Network and Distributed Systems Security (NDSS) Symposium, vol. 2020 (2020)","DOI":"10.14722\/ndss.2020.24097"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, W., et al.: Homonit: monitoring smart home apps from encrypted traffic. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1074\u20131088 (2018)","DOI":"10.1145\/3243734.3243820"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19208-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:30:51Z","timestamp":1668645051000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19208-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031192074","9783031192081"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19208-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"17 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dalian","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"265","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"95","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}