{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:27:11Z","timestamp":1754162831478,"version":"3.41.2"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/fmec.2019.8795349","type":"proceedings-article","created":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T19:23:29Z","timestamp":1565897009000},"page":"173-180","source":"Crossref","is-referenced-by-count":1,"title":["OKAPI: In Support of Application Correctness in Smart Home Environments"],"prefix":"10.1109","author":[{"given":"Themis","family":"Melissaris","sequence":"first","affiliation":[{"name":"Princeton University"}]},{"given":"Kelly","family":"Shaw","sequence":"additional","affiliation":[{"name":"University of Richmond"}]},{"given":"Margaret","family":"Martonosi","sequence":"additional","affiliation":[{"name":"Princeton University"}]}],"member":"263","reference":[{"key":"ref33","article-title":"Ski: Exposing kernel concurrency bugs through systematic schedule exploration","author":"fonseca","year":"2014","journal-title":"OSDI &#x2018;14"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2858965.2814303"},{"article-title":"Check Research Tools and Papers","year":"0","author":"martonosi","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.38"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1145\/2858965.2814282","article-title":"Stateless model checking of event-driven applications","author":"jensen","year":"2015","journal-title":"SIGPLAN Not"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064183"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"journal-title":"Samsung SmartThings Smart home Monitoring kit","year":"0","key":"ref10"},{"journal-title":"Vera Control Smart Home Hub","year":"0","key":"ref11"},{"journal-title":"Vera forum","year":"0","key":"ref12"},{"journal-title":"Zigbee wireless mesh network technology","year":"0","key":"ref13"},{"journal-title":"Z-Wave wireless control technology","year":"0","key":"ref14"},{"journal-title":"Bluetooth a global wireless standard for simple secure connectivity","year":"0","key":"ref15"},{"journal-title":"Transaction Processing Concepts and Techniques","year":"1992","author":"gray","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1435417.1435432"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"journal-title":"SmartThings Architecture Documentation","year":"0","key":"ref19"},{"key":"ref28","article-title":"FlowFence: Practical Data Protection for Emerging IoT Application Frameworks","author":"fernandes","year":"2016","journal-title":"25th USENIX Security Symposium"},{"journal-title":"Google Play Apps Store","year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"journal-title":"Dyn Analysis Summary of Friday October 21 Attack","year":"0","author":"hilton","key":"ref3"},{"journal-title":"Google Personal Assistant webpage","year":"0","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"journal-title":"Amazon Alexa webpage","year":"0","key":"ref5"},{"journal-title":"Google Cloud Platform","year":"0","key":"ref8"},{"journal-title":"Amazon Web Services","year":"0","key":"ref7"},{"journal-title":"Update bricks smart locks preferred by Airbnb","year":"0","author":"lomas","key":"ref2"},{"journal-title":"Developing for Homekit","year":"0","key":"ref9"},{"journal-title":"BlueBorne Bluetooth vulnerabilities affect billions of devices","year":"0","author":"heller","key":"ref1"},{"journal-title":"Apache Cassandra Database","year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815426"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675439"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2011.5898905"},{"journal-title":"Linode Cloud Hosting","year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065916"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064188"}],"event":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","start":{"date-parts":[[2019,6,10]]},"location":"Rome, Italy","end":{"date-parts":[[2019,6,13]]}},"container-title":["2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8787850\/8795303\/08795349.pdf?arnumber=8795349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T18:41:16Z","timestamp":1753900876000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8795349\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/fmec.2019.8795349","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}