{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T06:09:28Z","timestamp":1778220568522,"version":"3.51.4"},"publisher-location":"Cham","reference-count":86,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031547751","type":"print"},{"value":"9783031547768","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54776-8_10","type":"book-chapter","created":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T07:02:36Z","timestamp":1709103756000},"page":"241-268","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["ProvIoT : Detecting Stealthy Attacks in\u00a0IoT through Federated Edge-Cloud Security"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9693-6520","authenticated-orcid":false,"given":"Kunal","family":"Mukherjee","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2513-2896","authenticated-orcid":false,"given":"Joshua","family":"Wiedemeier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qi","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Junpei","family":"Kamimura","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John Junghwan","family":"Rhee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"James","family":"Wei","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhichun","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiao","family":"Yu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lu-An","family":"Tang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiaping","family":"Gui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3797-4637","authenticated-orcid":false,"given":"Kangkook","family":"Jee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"10_CR1","unstructured":"Insteon hub 2242\u2013222 - lack of web and API authentication (2013). https:\/\/www.exploit-db.com\/exploits\/27284. Accessed 26 May 2023"},{"key":"10_CR2","unstructured":"Apple watch ram size comparison chart: how much ram does apple watch have? (2015). https:\/\/www.knowyourmobile.com\/wearable-technology\/apple-watch-ram-size\/. Accessed 26 May 2023"},{"key":"10_CR3","unstructured":"Google nest - support (2015). https:\/\/support.google.com\/googlenest\/answer\/9230098. Accessed 26 May 2023"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Auditing security events (2017). https:\/\/goo.gl\/FkaDCa","DOI":"10.1016\/S1361-3723(17)30111-2"},{"key":"10_CR5","unstructured":"Google home mini teardown, comparison to echo dot, and giving technology a voice (2017). https:\/\/tinyurl.com\/ykbay2fu. Accessed 26 May 2023"},{"key":"10_CR6","unstructured":"Google Assistant, your own personal Google (2018). https:\/\/assistant.google.com\/"},{"key":"10_CR7","unstructured":"Motion (2018). https:\/\/motion-project.github.io\/"},{"key":"10_CR8","unstructured":"Raspberry Pi - Teach, Learn, and Make with Raspberry Pi (2018). https:\/\/www.raspberrypi.org"},{"key":"10_CR9","unstructured":"Gensim: Topic modelling for humans (2019). https:\/\/radimrehurek.com\/gensim\/index.html"},{"key":"10_CR10","unstructured":"Tinyml foundation (2019). https:\/\/www.tinyml.org\/. Accessed 25 May 2023"},{"key":"10_CR11","unstructured":"Inside amazon\u2019s ring alarm system (2020). https:\/\/tinyurl.com\/yck5jm4m. Accessed 26 May 2023"},{"key":"10_CR12","unstructured":"Cyber kill chain\u00ae | lockheed martin (2021). https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html. Accessed 24 Jul 2021"},{"key":"10_CR13","unstructured":"Process injection: Ptrace system calls, sub-technique t1055.008 - enterprise | mitre att &ck\u00ae (2021). https:\/\/attack.mitre.org\/techniques\/T1055\/008\/. Accessed 23 Jul 2021"},{"key":"10_CR14","unstructured":"Cloud-based data platform for cybersecurity, it operations and devops | splunk (2022). https:\/\/www.splunk.com\/. Accessed 23 Jul 2021"},{"key":"10_CR15","unstructured":"Iot is a gold mine for hackers using fileless malware for cyberattacks - techrepublic (2022). https:\/\/tek.io\/30dBnIU. Accessed 23 Jul 2021"},{"key":"10_CR16","unstructured":"Smart refrigerator with family hub (2022). https:\/\/tinyurl.com\/4kz6z6z5. Accessed 26 May 2023"},{"issue":"4","key":"10_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3214303","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar, A., Aksu, H., Uluagac, A.S., Conti, M.: A survey on homomorphic encryption schemes: Theory and implementation. ACM Comput. Surv. 51(4), 1\u201335 (2018). https:\/\/doi.org\/10.1145\/3214303","journal-title":"ACM Comput. Surv."},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Acar, A., et al.: Peek-a-boo: I see your smart home activities, even encrypted! In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 207\u2013218. WiSec 2020, Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3395351.3399421","DOI":"10.1145\/3395351.3399421"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Ahmad, A., Lee, S., Peinado, M.: HARDLOG: practical tamper-proof system auditing using a novel audit device. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 1791\u20131807 (2022)","DOI":"10.1109\/SP46214.2022.9833745"},{"key":"10_CR20","unstructured":"Alrawi, O., et al.: The circle of life: a large-scale study of the IoT malware lifecycle. In: USENIX Security Symposium, pp. 3505\u20133522 (2021)"},{"key":"10_CR21","unstructured":"Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 1093\u20131110. USENIX Association, Vancouver, BC (2017). https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/antonakakis"},{"key":"10_CR22","unstructured":"Armis Security: Blueborne: Bluetooth exposes android, linux, windows and iOS devices to airborne attacks (2017). https:\/\/www.armis.com\/research\/blueborne\/"},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"145","DOI":"10.2478\/popets-2021-0009","volume":"2021","author":"L Babun","year":"2021","unstructured":"Babun, L., Celik, Z.B., McDaniel, P., Uluagac, S.: Real-time analysis of privacy-(un)aware IoT applications. Proc. Priv. Enhancing Technol. 2021, 145\u2013166 (2021). https:\/\/doi.org\/10.2478\/popets-2021-0009","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Bah\u015fi, H., N\u00f5mm, S., La Torre, F.B.: Dimensionality reduction for machine learning based IoT botnet detection. In: 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV), pp. 1857\u20131862. IEEE (2018)","DOI":"10.1109\/ICARCV.2018.8581205"},{"key":"10_CR25","doi-asserted-by":"publisher","unstructured":"Bansal, A., Kandikuppa, A., Chen, C.Y., Hasan, M., Bates, A., Mohan, S.: Towards efficient auditing for real-time systems. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds.) Computer Security \u2013 ESORICS 2022. ESORICS 2022. Lecture Notes in Computer Science, vol. 13556, pp. 614\u2013634. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17143-7_30","DOI":"10.1007\/978-3-031-17143-7_30"},{"key":"10_CR26","doi-asserted-by":"publisher","unstructured":"Barr-Smith, F., Ugarte-Pedrero, X., Graziano, M., Spolaor, R., Martinovic, I.: Survivalism: systematic analysis of windows malware living-off-the-land. In: IEEE symposium on security and privacy (SP). In: IEEE Symposium on Security and Privacy (SP), pp. 1557\u20131574 (2021). https:\/\/doi.org\/10.1109\/sp40001.2021.00047","DOI":"10.1109\/sp40001.2021.00047"},{"key":"10_CR27","unstructured":"Bonawitz, K., et al.: Towards federated learning at scale: system design. arXiv.org (2019)"},{"key":"10_CR28","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comcom.2016.12.001","volume":"98","author":"H Bostani","year":"2017","unstructured":"Bostani, H., Sheikhan, M.: Hybrid of anomaly-based and specification-based IDS for internet of things using unsupervised OPF based on MapReduce approach. Comput. Commun. 98, 52\u201371 (2017)","journal-title":"Comput. Commun."},{"key":"10_CR29","doi-asserted-by":"publisher","unstructured":"Chaudhary, A., Mittal, H., Arora, A.: Anomaly detection using graph neural networks. In: 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), pp. 346\u2013350 (2019). https:\/\/doi.org\/10.1109\/COMITCon.2019.8862186","DOI":"10.1109\/COMITCon.2019.8862186"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Chawathe, S.S.: Monitoring IoT networks for botnet activity. In: 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/NCA.2018.8548330"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Chen, J., et al.: Iotfuzzer: Discovering memory corruptions in IoT through app-based fuzzing. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23159"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Cosson, A., Sikder, A.K., Babun, L., Celik, Z.B., McDaniel, P., Uluagac, A.S.: Sentinel: a robust intrusion detection system for IoT networks using kernel-level system information. In: Proceedings of the International Conference on Internet-of-Things Design and Implementation, pp. 53\u201366 (2021)","DOI":"10.1145\/3450268.3453533"},{"key":"10_CR33","unstructured":"Costin, A., Zaddach, J.: IoT Malware: comprehensive survey, analysis framework and case studies. BlackHat Briefings (2019). https:\/\/bit.ly\/3DFrCBA"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Cozzi, E., Graziano, M., Fratantonio, Y., Balzarotti, D.: Understanding Linux malware. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 161\u2013175. IEEE (2018)","DOI":"10.1109\/SP.2018.00054"},{"key":"10_CR35","unstructured":"CrowdStrkie: Endpoint Detection and Response (EDR), Tech. rep., CrowdStrkie (2020)"},{"key":"10_CR36","unstructured":"Cybersecurity, A.: Malware using new Ezuri memory loader | at &t alien labs (2021). https:\/\/cybersecurity.att.com\/blogs\/labs-research\/malware-using-new-ezuri-memory-loader. Accessed 23 Jul 2021"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Ding, F., et al.: DeepPower: non-intrusive and deep learning-based detection of IoT Malware using power side channels. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 33\u201346 (2020)","DOI":"10.1145\/3320269.3384727"},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: IEEE S &P (2016)","DOI":"10.1109\/SP.2016.44"},{"key":"10_CR39","unstructured":"Google: Edge TPU - run inference at the edge | google cloud (2021). https:\/\/cloud.google.com\/edge-tpu. Accessed 23 Jul 2021"},{"key":"10_CR40","unstructured":"Google: Intro to autoencoders (2021). https:\/\/www.tensorflow.org\/tutorials\/generative\/autoencoder"},{"key":"10_CR41","unstructured":"Han, X., et al.: $$\\{$$SIGL$$\\}$$: Securing software installations through deep graph learning. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 2345\u20132362 (2021)"},{"key":"10_CR42","unstructured":"Harpaz, O.: FritzFrog: a new generation of peer-to-peer botnets - guardicore (2020). https:\/\/bit.ly\/3mJzyeq. Accessed 23 Jul 2021"},{"key":"10_CR43","doi-asserted-by":"crossref","unstructured":"Hassan, W.U., et al.: NoDoze: combatting threat alert fatigue with automated provenance triage. In: NDSS (2019)","DOI":"10.14722\/ndss.2019.23349"},{"key":"10_CR44","doi-asserted-by":"crossref","unstructured":"Jia, Y.J., et al.: ContexIoT: towards providing contextual integrity to appified IoT platforms. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23051"},{"key":"10_CR45","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1145\/945445.945467","volume":"37","author":"ST King","year":"2003","unstructured":"King, S.T., Chen, P.M.: Backtracking intrusions. ACM SIGOPS Oper. Syst. Rev. 37, 223\u2013236 (2003). https:\/\/doi.org\/10.1145\/945445.945467","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"10_CR46","unstructured":"Kipf, T.N., Welling, M.: Variational graph auto-encoders. arXiv preprint arXiv:1611.07308 (2016)"},{"key":"10_CR47","unstructured":"Kodi | Open source home theater software (2018). https:\/\/kodi.tv\/"},{"key":"10_CR48","doi-asserted-by":"crossref","unstructured":"Kumar, A., Lim, T.J.: Early detection of mirai-like IoT bots in large-scale networks through sub-sampled packet traffic analysis. arXiv preprint arXiv:1901.04805 (2019)","DOI":"10.1007\/978-3-030-12385-7_58"},{"issue":"3","key":"10_CR49","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382\u2013401 (1982). https:\/\/doi.org\/10.1145\/357172.357176","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"10_CR50","unstructured":"Le, Q., Mikolov, T.: Distributed representations of sentences and documents. In: International Conference on Machine Learning, pp. 1188\u20131196 (2014)"},{"key":"10_CR51","doi-asserted-by":"publisher","first-page":"102282","DOI":"10.1016\/j.cose.2021.102282","volume":"106","author":"Z Li","year":"2021","unstructured":"Li, Z., Chen, Q.A., Yang, R., Chen, Y., Ruan, W.: Threat detection and investigation with system-level provenance graphs: a survey. Comput. Secur. 106, 102282 (2021)","journal-title":"Comput. Secur."},{"key":"10_CR52","unstructured":"Lin, J., Zhu, L., Chen, W.M., Wang, W.C., Gan, C., Han, S.: On-device training under 256KB memory. In: Advances in Neural Information Processing Systems, vol. 35, pp. 2941\u20132295 (2022)"},{"key":"10_CR53","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Towards a timely causality analysis for enterprise security. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23254"},{"key":"10_CR54","doi-asserted-by":"publisher","unstructured":"Matsumoto, M., Oguchi, M.: Speeding up encryption on IoT devices using homomorphic encryption. In: 2021 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 270\u2013275 (2021). https:\/\/doi.org\/10.1109\/SMARTCOMP52413.2021.00059","DOI":"10.1109\/SMARTCOMP52413.2021.00059"},{"key":"10_CR55","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics, pp. 1273\u20131282. PMLR (2017)"},{"key":"10_CR56","doi-asserted-by":"crossref","unstructured":"Meidan, Y., et al.: N-Baiot: network-based detection of IoT botnet attacks using deep autoencoders. arXiv preprint arXiv:1805.03409 (2018)","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"10_CR57","unstructured":"metasploit: metasploit (2021). https:\/\/www.metasploit.com\/. Accessed 29 Nov 2021"},{"key":"10_CR58","unstructured":"Mirai Attacks (2016). https:\/\/goo.gl\/QVv89r"},{"key":"10_CR59","unstructured":"MITRE: Mitre att &ck\u00ae (2023). https:\/\/attack.mitre.org\/. Accessed 23 Jul 2021"},{"issue":"4","key":"10_CR60","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/JIOT.2021.3077803","volume":"9","author":"V Mothukuri","year":"2021","unstructured":"Mothukuri, V., Khare, P., Parizi, R.M., Pouriyeh, S., Dehghantanha, A., Srivastava, G.: Federated-learning-based anomaly detection for IoT security attacks. IEEE Internet Things J. 9(4), 2545\u20132554 (2021)","journal-title":"IEEE Internet Things J."},{"key":"10_CR61","doi-asserted-by":"crossref","unstructured":"Mukherjee, K.: ProvIoT: detecting stealthy attacks in IoT through federated edge-cloud security (2023). https:\/\/github.com\/syssec-utd\/proviot","DOI":"10.1007\/978-3-031-54776-8_10"},{"key":"10_CR62","unstructured":"Mukherjee, K., et al.: Evading provenance-based ML detectors with adversarial system actions. In: USENIX Security Symposium (SEC) (2023)"},{"key":"10_CR63","unstructured":"Nguyen, T.D., Marchal, S., Miettinen, M., Dang, M.H., Asokan, N., Sadeghi, A.R.: Diot: a crowdsourced self-learning approach for detecting compromised IoT devices. arXiv preprint arXiv:1804.07474 (2018)"},{"key":"10_CR64","doi-asserted-by":"crossref","unstructured":"N\u00f5mm, S., Bah\u015fi, H.: Unsupervised anomaly based botnet detection in IoT networks. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 1048\u20131053. IEEE (2018)","DOI":"10.1109\/ICMLA.2018.00171"},{"key":"10_CR65","unstructured":"NVIDIA: Nvidia jetson nano developer kit | nvidia developer (2022). https:\/\/developer.nvidia.com\/embedded\/jetson-nano-developer-kit. Accessed 23 Jul 2021"},{"key":"10_CR66","doi-asserted-by":"crossref","unstructured":"Ozcelik, M., Chalabianloo, N., Gur, G.: Software-defined edge defense against IoT-based DDOs. In: 2017 IEEE International Conference on Computer and Information Technology (CIT), pp. 308\u2013313. IEEE (2017)","DOI":"10.1109\/CIT.2017.61"},{"key":"10_CR67","doi-asserted-by":"crossref","unstructured":"Pan, S., Hu, R., Long, G., Jiang, J., Yao, L., Zhang, C.: Adversarially regularized graph autoencoder for graph embedding. arXiv preprint arXiv:1802.04407 (2019)","DOI":"10.24963\/ijcai.2018\/362"},{"issue":"8","key":"10_CR68","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza, S., Wallgren, L., Voigt, T.: Svelte: real-time intrusion detection in the internet of things. Ad Hoc Netw. 11(8), 2661\u20132674 (2013)","journal-title":"Ad Hoc Netw."},{"key":"10_CR69","unstructured":"Rieger, P., Chilese, M., Mohamed, R., Miettinen, M., Fereidooni, H., Sadeghi, A.R.: Argus: context-based detection of stealthy IoT infiltration attacks. arXiv preprint arXiv:2302.07589 (2023)"},{"issue":"6","key":"10_CR70","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1109\/JSAC.2017.2692307","volume":"35","author":"M Shafi","year":"2017","unstructured":"Shafi, M., et al.: 5G: a tutorial overview of standards, trials, challenges, deployment, and practice. IEEE J. Sel. Areas Commun. 35(6), 1201\u20131221 (2017). https:\/\/doi.org\/10.1109\/JSAC.2017.2692307","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10_CR71","doi-asserted-by":"crossref","unstructured":"Shahid, O., Mothukuri, V., Pouriyeh, S., Parizi, R.M., Shahriar, H.: Detecting network attacks using federated learning for IoT devices. In: 2021 IEEE 29th International Conference on Network Protocols (ICNP), pp. 1\u20136. IEEE (2021)","DOI":"10.1109\/ICNP52444.2021.9651915"},{"key":"10_CR72","unstructured":"Sikder, A.K., Aksu, H., Uluagac, A.S.: 6thSense: a context-aware sensor-based attack detector for smart devices. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 397\u2013414. USENIX Association, Vancouver, BC (2017). https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/sikder"},{"issue":"2","key":"10_CR73","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/TMC.2019.2893253","volume":"19","author":"AK Sikder","year":"2020","unstructured":"Sikder, A.K., Aksu, H., Uluagac, A.S.: A context-aware framework for detecting sensor-based threats on smart devices. IEEE Trans. Mob. Comput. 19(2), 245\u2013261 (2020). https:\/\/doi.org\/10.1109\/TMC.2019.2893253","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10_CR74","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/COMST.2021.3064507","volume":"23","author":"AK Sikder","year":"2021","unstructured":"Sikder, A.K., Petracca, G., Aksu, H., Jaeger, T., Uluagac, A.S.: A survey on sensor-based threats and attacks to smart devices and applications. IEEE Commun. Surv. Tutorials 23, 1125\u20131159 (2021). https:\/\/doi.org\/10.1109\/COMST.2021.3064507","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"10_CR75","doi-asserted-by":"crossref","unstructured":"Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R., Mehani, O.: Network-level security and privacy control for smart-home IoT devices. In: WiMob, pp. 163\u2013167 (2015)","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"10_CR76","unstructured":"Team, D.: Deep graph library: easy deep learning on graphs (2022). https:\/\/www.dgl.ai\/. Accessed 21 Sep 2021"},{"key":"10_CR77","unstructured":"Team, K.: Keras: the Python deep learning API (2021). https:\/\/keras.io\/"},{"key":"10_CR78","unstructured":"Trend Micro: Brickerbot malware permanently bricks IoT devices (2017). https:\/\/tinyurl.com\/2wc4vw5b"},{"key":"10_CR79","unstructured":"Introducing Arm TrustZone (2018). https:\/\/developer.arm.com\/technologies\/trustzone"},{"key":"10_CR80","unstructured":"VPNFilter (2018). https:\/\/blog.talosintelligence.com\/2018\/05\/VPNFilter.html"},{"issue":"2","key":"10_CR81","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1109\/JIOT.2020.3010023","volume":"8","author":"J Wang","year":"2020","unstructured":"Wang, J., et al.: IoT-praetor: undesired behaviors detection for IoT devices. IEEE Internet Things J. 8(2), 927\u2013940 (2020)","journal-title":"IEEE Internet Things J."},{"key":"10_CR82","doi-asserted-by":"crossref","unstructured":"Wang, Q., et al.: You are what you do: Hunting stealthy malware via data provenance analysis. In: NDSS (2020)","DOI":"10.14722\/ndss.2020.24167"},{"key":"10_CR83","unstructured":"Williams, M.: A new philips hue security patch keeps hackers from taking control of your network (2019). https:\/\/tinyurl.com\/yejh839k"},{"key":"10_CR84","unstructured":"Ying, R., Lou, Z., You, J., Wen, C., Canedo, A., Leskovec, J.: Neural subgraph matching. CoRR abs\/2007.03092 (2020), https:\/\/arxiv.org\/abs\/2007.03092"},{"key":"10_CR85","unstructured":"Zeek (2021). https:\/\/zeek.org\/"},{"key":"10_CR86","unstructured":"Critical flaw identified in Zigbee smart home devices (2015). https:\/\/goo.gl\/BFBa1X"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54776-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T16:17:23Z","timestamp":1709655443000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54776-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031547751","9783031547768"],"references-count":86,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54776-8_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wp.nyu.edu\/acns2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"230","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}