{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:22:23Z","timestamp":1776082943478,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/percomw.2017.7917622","type":"proceedings-article","created":{"date-parts":[[2017,5,4]],"date-time":"2017-05-04T20:32:54Z","timestamp":1493929974000},"page":"551-556","source":"Crossref","is-referenced-by-count":54,"title":["Securing vulnerable home IoT devices with an in-hub security manager"],"prefix":"10.1109","author":[{"given":"Anna Kornfeld","family":"Simpson","sequence":"first","affiliation":[]},{"given":"Franziska","family":"Roesner","sequence":"additional","affiliation":[]},{"given":"Tadayoshi","family":"Kohno","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Flowfence: Practical data protection for emerging iot application frameworks","author":"fernandes","year":"2016","journal-title":"USENIX Security Symposium"},{"key":"ref11","article-title":"Securing software updates for automobiles","author":"kuppusamy","year":"2016","journal-title":"To appear at escar EU 2016"},{"key":"ref12","article-title":"They Keep Coming Back Like Zombies&#x201D;: Improving Software Updating Interfaces","author":"mathur","year":"2016","journal-title":"SOUPS 2016"},{"key":"ref13","author":"mclean","year":"2015","journal-title":"IoT malware and ransomware attacks on the incline Intel Security"},{"key":"ref14","article-title":"Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: A Case Study of Home Automation Security","author":"oluwafemi","year":"2013","journal-title":"LASER 2013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1281480.1281481"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866315"},{"key":"ref17","author":"hilton","year":"2016","journal-title":"Dyn Analysis Summary of Friday October 21 Attack"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917622"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015489"},{"key":"ref4","author":"krebs","year":"2016","journal-title":"Hacked Cameras DVRs Powered Todays Massive Internet Outage"},{"key":"ref3","author":"bilton","year":"2016","journal-title":"Nest Thermostat Glitch Leaves Users in the Cold"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398377"},{"key":"ref5","year":"2013","journal-title":"CVE-2013-2560"},{"key":"ref8","article-title":"An Operating System for the Home","author":"dixon","year":"2012","journal-title":"NSDI"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620564"},{"key":"ref2","article-title":"Secure software updates: Disappointments and new challenges","author":"bellissimo","year":"2006","journal-title":"HOTSEC"},{"key":"ref1","year":"2015","journal-title":"Samsung SmartThings Hub FAQ-SmartThings Developer Documentation"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"ref20","article-title":"Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences","author":"wash","year":"2014","journal-title":"SOUPS &#x2018;14"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1145\/2834050.2834095","article-title":"Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things","author":"yu","year":"2015","journal-title":"HotNets"},{"key":"ref21","article-title":"DDoS attack that disrupted internet was largest of its kind in history, experts say","author":"woolf","year":"2016","journal-title":"The Guardian"}],"event":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications: Workshops (PerCom Workshops)","location":"Kona, HI","start":{"date-parts":[[2017,3,13]]},"end":{"date-parts":[[2017,3,17]]}},"container-title":["2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7911894\/7917470\/07917622.pdf?arnumber=7917622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,23]],"date-time":"2019-09-23T09:37:15Z","timestamp":1569231435000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7917622\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/percomw.2017.7917622","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}