{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:30:28Z","timestamp":1747805428446,"version":"3.37.3"},"reference-count":69,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,13]]},"DOI":"10.1109\/icnp49622.2020.9259352","type":"proceedings-article","created":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T20:56:20Z","timestamp":1605905780000},"page":"1-13","source":"Crossref","is-referenced-by-count":3,"title":["Lumos: Improving Smart Home IoT Visibility and Interoperability Through Analyzing Mobile Apps"],"prefix":"10.1109","author":[{"given":"Jeongmin","family":"Kim","sequence":"first","affiliation":[]},{"given":"Steven Y.","family":"Ko","sequence":"additional","affiliation":[]},{"given":"Sooel","family":"Son","sequence":"additional","affiliation":[]},{"given":"Dongsu","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Your Wish Is My Command Programming by Example","year":"2001","author":"lieberman","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210339"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999596"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2347992"},{"journal-title":"An open source software framework enabling seamless device-to-device connectivity to address the emerging needs of the Internet of Things","year":"2019","key":"ref31"},{"journal-title":"Smart Home Interoperability The Key Hurdles","year":"2019","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58735-6_1"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025483"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357323"},{"key":"ref34","first-page":"145","article-title":"Programming by Demonstration:An Inductive Learning Formulation","author":"lau","year":"1998","journal-title":"Proceedings of the 4th international conference on Intelligent user interfaces"},{"key":"ref60","first-page":"1","article-title":"Semantic middleware for the internet of things","author":"song","year":"2010","journal-title":"Internet of Things (IoT)"},{"journal-title":"TLS Interception and SSL Inspection","year":"2017","key":"ref62"},{"journal-title":"The IoT journey for manufacturers concept production and beyond","year":"2017","key":"ref61"},{"key":"ref63","first-page":"1","article-title":"A Semantics Aware Approach toAutomated Reverse Engineering Unknown Protocols","author":"wang","year":"2012","journal-title":"IEEE International conference on Network Protocols (ICNP)"},{"journal-title":"Why interoperability holds the keys to the smart home","year":"2016","key":"ref28"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_13"},{"journal-title":"A smart home app is an application used to remotely control and manage connected non-computing devices in the home typically from a smartphone or tablet","year":"2015","key":"ref27"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9489-2"},{"journal-title":"Wink Door\/Window sensor manual","year":"2019","key":"ref66"},{"journal-title":"IoT Platform Company List 2017","year":"2017","key":"ref29"},{"journal-title":"Wink support products","year":"2019","key":"ref67"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2014.351"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2699343.2699344"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI.2015.29"},{"year":"2019","key":"ref1","article-title":"an open source software framework that makes it easy for devices and apps to discover and communicate with each other"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23456"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.11.003"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2016.8206"},{"journal-title":"The free way to get all your apps and devices talking to each other","year":"2019","key":"ref24"},{"journal-title":"Chromecast is a line of digital media players developed by Google","year":"2019","key":"ref23"},{"journal-title":"Smart Homes Market -Growth Trends and Forecast (2019 - 2024)","year":"2018","key":"ref26"},{"journal-title":"Creating a Scene with the Insteon Hub (Android)","year":"2019","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1089-9"},{"journal-title":"Homeautomation forum","year":"2019","key":"ref51"},{"journal-title":"Web Service","year":"2019","key":"ref59"},{"journal-title":"Support Products","year":"2019","key":"ref58"},{"journal-title":"Publish your devices to Smart- Things","year":"2019","key":"ref57"},{"journal-title":"Developer Documentation","year":"2019","key":"ref56"},{"journal-title":"SmartThings hub stores the latest value locally","year":"2016","key":"ref55"},{"journal-title":"SmartThings devices-integrations forum","year":"2019","key":"ref54"},{"journal-title":"A Mobile App for a Smart Home Solution Takeaways and Guidelines","year":"2019","key":"ref53"},{"journal-title":"Smart Home Market by Product Software & Services and Region - Global Forecast to 2024","year":"2019","key":"ref52"},{"key":"ref10","first-page":"32","article-title":"Rosetta: Extracting protocol semantics using binary analysis with applications to protocol replay and natrewriting","author":"caballero","year":"2007","journal-title":"CyLab"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.08.003"},{"journal-title":"What Is Google Brillo and Weave&#x0192;","year":"2019","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315286"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2010.60"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1378773.1378794"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.14"},{"key":"ref16","article-title":"Protocol-Independent Adaptive Replay of Application Dialog","author":"cui","year":"2006","journal-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455820"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2015.51"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.01.010"},{"key":"ref4","first-page":"4","article-title":"Hydra: Networked embedded system middleware for heterogeneous physical devices in a distributed architecture","author":"badii","year":"2010","journal-title":"Final External Developers Workshops Teaching Materials"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.013"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2014.7030119"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.02.015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1095034.1095062"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180444"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653737"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"article-title":"Toward interoperability for the Internet of Things with meta-hubs","year":"2015","author":"mineraud","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787482"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143383"},{"journal-title":"OpenT2T github","year":"2015","key":"ref42"},{"key":"ref41","first-page":"1","article-title":"Automatic protocol format reverse engineering through context-aware monitored execution","volume":"8","author":"lin","year":"2008","journal-title":"NDSS"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.03.015"},{"journal-title":"OpenT2T - An Open Source project to translate common IoT schemas to specific hardware devices","year":"2019","key":"ref43"}],"event":{"name":"2020 IEEE 28th International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2020,10,13]]},"location":"Madrid, Spain","end":{"date-parts":[[2020,10,16]]}},"container-title":["2020 IEEE 28th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9259328\/9259327\/09259352.pdf?arnumber=9259352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:21:55Z","timestamp":1656375715000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9259352\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,13]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/icnp49622.2020.9259352","relation":{},"subject":[],"published":{"date-parts":[[2020,10,13]]}}}