{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T19:19:14Z","timestamp":1769195954842,"version":"3.49.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179294","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"3365-3381","source":"Crossref","is-referenced-by-count":13,"title":["How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices"],"prefix":"10.1109","author":[{"given":"Peiyu","family":"Liu","sequence":"first","affiliation":[{"name":"Zhejiang University"}]},{"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Lirong","family":"Fu","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Kangjie","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Minnesota"}]},{"given":"Xuhong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Jingchang","family":"Qin","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Wenhai","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Wenzhi","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]}],"member":"263","reference":[{"key":"ref3","volume-title":"Check Point research reveals how hackers can intrude networks via fax machines","year":"2022"},{"key":"ref6","volume-title":"The Global E-waste Monitor 2020","year":"2022"},{"key":"ref7","volume-title":"Hackers can steal your identity and bank details from a coffee machine","year":"2022"},{"key":"ref8","volume-title":"Internet of Things (IoT) active device connections installed base worldwide from 2015 to 2025","year":"2022"},{"key":"ref9","volume-title":"JFFS2 filesystem extraction tool","year":"2022"},{"key":"ref11","volume-title":"The Menlo Report","year":"2022"},{"key":"ref13","volume-title":"Privacy Commissioner Urges IoT Manufacturers to Enhance the Transparency of Their Privacy Protection Measures","year":"2022"},{"key":"ref14","volume-title":"Switched on to value: Powering business change","year":"2022"},{"key":"ref15","volume-title":"Total Green Recycling","year":"2022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2019.11.005"},{"key":"ref17","first-page":"1687","volume-title":"Sensitive information tracking in commodity iot","author":"Celik"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2866423"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.84338"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384732"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"ref23","first-page":"531","article-title":"Flowfence: Practical data protection for emerging iot application frameworks","volume-title":"25th USENIX security symposium (USENIX Security 16)","author":"Fernandes"},{"key":"ref24","article-title":"\u201cit\u2019s the company, the government, you and i\u201d: User perceptions of responsibility for smart home privacy and security","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Haney"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50309-3_26"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.8330","author":"Haney","year":"2020","journal-title":"User perceptions of smart home privacy and security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3035958"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"ref29","article-title":"Assessing browser-level defense against idn-based phishing","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Hu"},{"key":"ref30","first-page":"1169","article-title":"All things considered: an analysis of iot devices on home networks","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Kumar"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2891103"},{"key":"ref34","article-title":"Weak links in authentication chains: A large-scale analysis of email sender spoofing attacks","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Shen"},{"key":"ref35","article-title":"Keyforge: Non-attributable email from forward-forgeable signatures","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Specter"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052709"},{"key":"ref37","article-title":"Blind in\/on-path attacks and applications to vpns","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Tolley"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632107"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2864782"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76481-8_4"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243830"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2012.65"},{"key":"ref43","first-page":"1","article-title":"Lx-ssd: Enhancing the lifespan of nand flash-based memory via recycling invalid pages","volume-title":"Proc. 33rd Int. Conf. Massive Storage Syst. Technol.(MSST)","author":"Zhou"},{"key":"ref44","first-page":"1133","article-title":"Discovering and understanding the security hazards in the interactions between iot devices, mobile apps, and clouds on smart home platforms","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zhou"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179294.pdf?arnumber=10179294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T04:44:06Z","timestamp":1721450646000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179294","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}