{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:21:57Z","timestamp":1764588117219,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/icccn49398.2020.9209626","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T20:59:41Z","timestamp":1601499581000},"page":"1-5","source":"Crossref","is-referenced-by-count":8,"title":["IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform"],"prefix":"10.1109","author":[{"given":"Yilian","family":"Li","sequence":"first","affiliation":[]},{"given":"Yiyu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Lihua","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Wenjie","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2020","key":"ref10","article-title":"Jeb"},{"year":"2020","key":"ref11","article-title":"Jdax"},{"year":"2020","key":"ref12","article-title":"Xpose"},{"year":"2020","key":"ref13","article-title":"MiJia"},{"year":"2020","key":"ref14","article-title":"Joylink"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23119"},{"article-title":"Hello Barbie Initial Security Analysis","year":"2018","author":"blaich","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1145\/2899007.2899008","article-title":"Analyzing the Security and Privacy of Cloud-based Video Surveillance Systems","author":"obermaier","year":"2016","journal-title":"Proceedings of the 2nd ACM International Workshop on IoT Privacy Trust and Security (IoTPTS &#x2019;16)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054850"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00039"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2013.74"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052709"},{"volume":"2","article-title":"TuyaSmart","year":"2020","key":"ref6"},{"year":"2020","key":"ref5","article-title":"Samsung SmartThings"},{"article-title":"The OAuth 2.0 Protocol","year":"2010","author":"hammerlahav","key":"ref8"},{"first-page":"2","article-title":"Alink","year":"2020","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23282"},{"year":"2020","key":"ref9","article-title":"Fiddler"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057145"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.11"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052609"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766499"},{"year":"2020","key":"ref24","article-title":"PostMan"},{"year":"2020","key":"ref23","article-title":"SoupUI"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.36"}],"event":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2020,8,3]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2020,8,6]]}},"container-title":["2020 29th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9205796\/9209588\/09209626.pdf?arnumber=9209626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:08:56Z","timestamp":1656374936000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9209626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icccn49398.2020.9209626","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}