{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:14:25Z","timestamp":1771373665063,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":98,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T00:00:00Z","timestamp":1500336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF1610127"],"award-info":[{"award-number":["W911NF1610127"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["12-23967, 13-30491, 14-08944, 15-13939, 12-23477, 12-23495, 15-27141, 16-18493"],"award-info":[{"award-number":["12-23967, 13-30491, 14-08944, 15-13939, 12-23477, 12-23495, 15-27141, 16-18493"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,18]]},"DOI":"10.1145\/3098243.3098251","type":"proceedings-article","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T20:03:43Z","timestamp":1499976223000},"page":"122-133","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["HanGuard"],"prefix":"10.1145","author":[{"given":"Soteris","family":"Demetriou","sequence":"first","affiliation":[{"name":"University of Illinois"}]},{"given":"Nan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Indiana University"}]},{"given":"Yeonjoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Indiana University"}]},{"given":"XiaoFeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Indiana University"}]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[{"name":"University of Illinois"}]},{"given":"Xiaoyong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Samsung Research America"}]},{"given":"Michael","family":"Grace","sequence":"additional","affiliation":[{"name":"Samsung Research America"}]}],"member":"320","published-online":{"date-parts":[[2017,7,18]]},"reference":[{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTDCS.2008.43"},{"key":"e_1_3_2_1_6_1","unstructured":"android.com. 2017. VpnService-Android Developers. http:\/\/goo.gl\/0cKFyO. (2017). android.com. 2017. VpnService-Android Developers. http:\/\/goo.gl\/0cKFyO. (2017)."},{"key":"e_1_3_2_1_7_1","unstructured":"Anonymous. 2017. Demo website. https:\/\/goo.gl\/dfYeop. (2017). Anonymous. 2017. Demo website. https:\/\/goo.gl\/dfYeop. (2017)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"G. Appenzeller M. Roussopoulos and M. Baker. 1999. User-friendly access control for public network ports (INFOCOM '99). G. Appenzeller M. Roussopoulos and M. Baker. 1999. User-friendly access control for public network ports (INFOCOM '99).","DOI":"10.1109\/INFCOM.1999.751456"},{"key":"e_1_3_2_1_9_1","unstructured":"apple.com. 2017. Instruments: iOS performance analysis tool. https:\/\/goo.gl\/6XnAXF. (2017). apple.com. 2017. Instruments: iOS performance analysis tool. https:\/\/goo.gl\/6XnAXF. (2017)."},{"key":"e_1_3_2_1_10_1","volume-title":"Xcode: Apple's IDE. https:\/\/goo.gl\/TgMco6.","year":"2017","unstructured":"apple.com. 2017 . Xcode: Apple's IDE. https:\/\/goo.gl\/TgMco6. (2017). apple.com. 2017. Xcode: Apple's IDE. https:\/\/goo.gl\/TgMco6. (2017)."},{"key":"e_1_3_2_1_11_1","volume-title":"DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.. In NDSS.","author":"Arp Daniel","year":"2014","unstructured":"Daniel Arp , Michael Spreitzenbarth , Malte Hubner , Hugo Gascon , and Konrad Rieck . 2014 . DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.. In NDSS. Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, and Konrad Rieck. 2014. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.. In NDSS."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"e_1_3_2_1_13_1","unstructured":"belkin.com. 2017. Belkin Netcam. http:\/\/goo.gl\/60dfkg. (2017). belkin.com. 2017. Belkin Netcam. http:\/\/goo.gl\/60dfkg. (2017)."},{"key":"e_1_3_2_1_14_1","unstructured":"belkin.com. 2017. WeMo Insight Switch. http:\/\/goo.gl\/0WGDFe. (2017). belkin.com. 2017. WeMo Insight Switch. http:\/\/goo.gl\/0WGDFe. (2017)."},{"key":"e_1_3_2_1_15_1","unstructured":"belkin.com. 2017. WeMo Switch + Motion. https:\/\/goo.gl\/sjUsi3. (2017). belkin.com. 2017. WeMo Switch + Motion. https:\/\/goo.gl\/sjUsi3. (2017)."},{"key":"e_1_3_2_1_16_1","unstructured":"Sven Bugiel Stephen Heuser and Ahmad-Reza Sadeghi. 2013. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies (USENIX Security 13). Sven Bugiel Stephen Heuser and Ahmad-Reza Sadeghi. 2013. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies (USENIX Security 13)."},{"key":"e_1_3_2_1_17_1","volume-title":"Estimating false discovery rates for contingency tables. Microsoft Res","author":"Carlson Jonathan M","year":"2009","unstructured":"Jonathan M Carlson , David Heckerman , and Guy Shani . 2009. Estimating false discovery rates for contingency tables. Microsoft Res ( 2009 ). Jonathan M Carlson, David Heckerman, and Guy Shani. 2009. Estimating false discovery rates for contingency tables. Microsoft Res (2009)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660323"},{"key":"e_1_3_2_1_19_1","volume-title":"Bellovin","author":"Cheswick William R.","year":"1994","unstructured":"William R. Cheswick and Steven M . Bellovin . 1994 . Firewalls and Internet Security: Repelling the Wily Hacker . William R. Cheswick and Steven M. Bellovin. 1994. Firewalls and Internet Security: Repelling the Wily Hacker."},{"key":"e_1_3_2_1_20_1","unstructured":"Andrei Costin Jonas Zaddach Aur\u00e9lien Francillon and Davide Balzarotti. 2014. A large-scale analysis of the security of embedded firmwares. In USENIX Security. Andrei Costin Jonas Zaddach Aur\u00e9lien Francillon and Davide Balzarotti. 2014. A large-scale analysis of the security of embedded firmwares. In USENIX Security."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198257"},{"key":"e_1_3_2_1_22_1","unstructured":"darkreading.com. 2011. Firms Slow To Secure Flaws In Embedded Devices. http:\/\/goo.gl\/b7Cltt. (2011). darkreading.com. 2011. Firms Slow To Secure Flaws In Embedded Devices. http:\/\/goo.gl\/b7Cltt. (2011)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"S.R. Das S. Chita N. Peterson B. Shirazi and M. Bhadkamkar. 2011. Home automation and security for mobile devices (PERCOM Workshops '11). S.R. Das S. Chita N. Peterson B. Shirazi and M. Bhadkamkar. 2011. Home automation and security for mobile devices (PERCOM Workshops '11).","DOI":"10.1109\/PERCOMW.2011.5766856"},{"key":"e_1_3_2_1_24_1","volume-title":"Gunter","author":"Demetriou Soteris","year":"2015","unstructured":"Soteris Demetriou , Xiaoyong Zhou , Muhammad Naveed , Yeonjoon Lee , Kan Yuan , XiaoFeng Wang , and Carl A . Gunter . 2015 . What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. (NDSS '15). Soteris Demetriou, Xiaoyong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, and Carl A. Gunter. 2015. What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. (NDSS '15)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398377"},{"key":"e_1_3_2_1_26_1","volume-title":"Security Analysis of Emerging Smart Home Applications. In IEEE Symposium on Security and Privacy.","author":"Fernandes Earlence","year":"2016","unstructured":"Earlence Fernandes , Jaeyeon Jung , and Atul Prakash . 2016 . Security Analysis of Emerging Smart Home Applications. In IEEE Symposium on Security and Privacy. Earlence Fernandes, Jaeyeon Jung, and Atul Prakash. 2016. Security Analysis of Emerging Smart Home Applications. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_27_1","volume-title":"FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In USENIX Security Symposium.","author":"Fernandes Earlence","year":"2016","unstructured":"Earlence Fernandes , Justin Paupore , Amir Rahmati , Daniel Simionato , Mauro Conti , and Atul Prakash . 2016 . FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In USENIX Security Symposium. Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, and Atul Prakash. 2016. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In USENIX Security Symposium."},{"key":"e_1_3_2_1_28_1","volume-title":"On the interpretation of \u03a7 2 from contingency tables, and the calculation of P. Journal of the Royal Statistical Society","author":"Fisher Ronald A","year":"1922","unstructured":"Ronald A Fisher . 1922. On the interpretation of \u03a7 2 from contingency tables, and the calculation of P. Journal of the Royal Statistical Society ( 1922 ). Ronald A Fisher. 1922. On the interpretation of \u03a7 2 from contingency tables, and the calculation of P. Journal of the Royal Statistical Society (1922)."},{"key":"e_1_3_2_1_29_1","volume-title":"Up 30 Percent From","author":"Billion Gartner Says","year":"2015","unstructured":"Gartner. 2015. Gartner Says 6.4 Billion Connected \"Things\" Will Be in Use in 2016 , Up 30 Percent From 2015 . http:\/\/goo.gl\/L9ubfl. (2015). Gartner. 2015. Gartner Says 6.4 Billion Connected \"Things\" Will Be in Use in 2016, Up 30 Percent From 2015. http:\/\/goo.gl\/L9ubfl. (2015)."},{"key":"e_1_3_2_1_30_1","unstructured":"github.com. 2017. Github: dex2jar. https:\/\/goo.gl\/Hwx2WX. (2017). github.com. 2017. Github: dex2jar. https:\/\/goo.gl\/Hwx2WX. (2017)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5473869"},{"key":"e_1_3_2_1_32_1","unstructured":"Dan Goodin. 2013. Welcome to the \"Internet of Things\" where even lights aren't hacker safe2 more wireless baby monitors hacked: Hackers remotely spied on babies and parents. http:\/\/goo.gl\/l0qh05. (2013). Dan Goodin. 2013. Welcome to the \"Internet of Things\" where even lights aren't hacker safe2 more wireless baby monitors hacked: Hackers remotely spied on babies and parents. http:\/\/goo.gl\/l0qh05. (2013)."},{"key":"e_1_3_2_1_33_1","unstructured":"google.com. 2017. OnHub - Google. https:\/\/goo.gl\/igIM5c. (2017). google.com. 2017. OnHub - Google. https:\/\/goo.gl\/igIM5c. (2017)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_35_1","unstructured":"tim Greene. 2014. Spike malware toolkit can infect Windows Linux and ARM-based Linux devices. http:\/\/goo.gl\/KQgSyT. (2014). tim Greene. 2014. Spike malware toolkit can infect Windows Linux and ARM-based Linux devices. http:\/\/goo.gl\/KQgSyT. (2014)."},{"key":"e_1_3_2_1_36_1","unstructured":"Kashmir Hill. 2015. This guy's light bulb performed a DoS attack on his entire smart house. http:\/\/goo.gl\/24skXK. (2015). Kashmir Hill. 2015. This guy's light bulb performed a DoS attack on his entire smart house. http:\/\/goo.gl\/24skXK. (2015)."},{"key":"e_1_3_2_1_37_1","unstructured":"honeywell.com. 2017. Honeywell. http:\/\/goo.gl\/9yuiTX. (2017). honeywell.com. 2017. Honeywell. http:\/\/goo.gl\/9yuiTX. (2017)."},{"key":"e_1_3_2_1_38_1","unstructured":"ibabylabs.com. 2017. ibabylabs.com. https:\/\/goo.gl\/y6Gdzd. (2017). ibabylabs.com. 2017. ibabylabs.com. https:\/\/goo.gl\/y6Gdzd. (2017)."},{"key":"e_1_3_2_1_39_1","volume-title":"IDC: Smartphone OS Market Share","author":"IDC.","year":"2016","unstructured":"IDC. 2016 . IDC: Smartphone OS Market Share . http:\/\/goo.gl\/y1uN4Q. (2016). IDC. 2016. IDC: Smartphone OS Market Share. http:\/\/goo.gl\/y1uN4Q. (2016)."},{"key":"e_1_3_2_1_40_1","unstructured":"indianexpress.com. 2016. Android malware 'Godless' has affected over 8.5 lakh devices globally. http:\/\/goo.gl\/RE5ffK. (2016). indianexpress.com. 2016. Android malware 'Godless' has affected over 8.5 lakh devices globally. http:\/\/goo.gl\/RE5ffK. (2016)."},{"key":"e_1_3_2_1_41_1","unstructured":"infinit.dk. 2012. Nabto. http:\/\/goo.gl\/ApJo1G. (2012). infinit.dk. 2012. Nabto. http:\/\/goo.gl\/ApJo1G. (2012)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.19"},{"key":"e_1_3_2_1_43_1","unstructured":"J.M Jorup. 2016. \"Internet of Things\" security is hilariously broken and getting worse. http:\/\/goo.gl\/PZgKN9. (2016). J.M Jorup. 2016. \"Internet of Things\" security is hilariously broken and getting worse. http:\/\/goo.gl\/PZgKN9. (2016)."},{"key":"e_1_3_2_1_44_1","unstructured":"P. Judge and M. Ammar. 2002. Gothic: a group access control architecture for secure multicast and anycast (INFOCOM '02). P. Judge and M. Ammar. 2002. Gothic: a group access control architecture for secure multicast and anycast (INFOCOM '02)."},{"key":"e_1_3_2_1_45_1","unstructured":"Isaac Kelly. 2012. Hacking the WeMo WiFi switch Part 1. https:\/\/goo.gl\/PKeO1A. (2012). Isaac Kelly. 2012. Hacking the WeMo WiFi switch Part 1. https:\/\/goo.gl\/PKeO1A. (2012)."},{"key":"e_1_3_2_1_46_1","unstructured":"Insoon Kim. 2015. Is CCTV A Spy? Backdoor That Was Secretly Hidden In Chinese Products Were Found. http:\/\/goo.gl\/3xQ7Dy. (2015). Insoon Kim. 2015. Is CCTV A Spy? Backdoor That Was Secretly Hidden In Chinese Products Were Found. http:\/\/goo.gl\/3xQ7Dy. (2015)."},{"key":"e_1_3_2_1_47_1","unstructured":"Ji Eun Kim G. Boulos J. Yackovich T. Barth C. Beckel and D. Mosse. 2012. Seamless Integration of Heterogeneous Devices and Access Control in Smart Homes (IE '12). Ji Eun Kim G. Boulos J. Yackovich T. Barth C. Beckel and D. Mosse. 2012. Seamless Integration of Heterogeneous Devices and Access Control in Smart Homes (IE '12)."},{"key":"e_1_3_2_1_48_1","unstructured":"Tiffany Hyun-Jin Kim Lujo Bauer James Newsome Adrian Perrig and Jesse Walker. 2010. Challenges in Access Right Assignment for Secure Home Networks (HotSec'10). Tiffany Hyun-Jin Kim Lujo Bauer James Newsome Adrian Perrig and Jesse Walker. 2010. Challenges in Access Right Assignment for Secure Home Networks (HotSec'10)."},{"key":"e_1_3_2_1_49_1","volume-title":"Proc. IEEE","author":"Kreutz D.","year":"2015","unstructured":"D. Kreutz , F.M.V. Ramos , P. Esteves Verissimo , C. Esteve Rothenberg , S. Azodolmolky , and S. Uhlig . 2015. Software-Defined Networking: A Comprehensive Survey . Proc. IEEE ( 2015 ). D. Kreutz, F.M.V. Ramos, P. Esteves Verissimo, C. Esteve Rothenberg, S. Azodolmolky, and S. Uhlig. 2015. Software-Defined Networking: A Comprehensive Survey. Proc. IEEE (2015)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2787394.2787396"},{"key":"e_1_3_2_1_51_1","unstructured":"A. Lioy A. Pastor F. Risso R. Sassu and A.L. Shaw. 2014. Offloading security applications into the network (eChallenges e-2014). A. Lioy A. Pastor F. Risso R. Sassu and A.L. Shaw. 2014. Offloading security applications into the network (eChallenges e-2014)."},{"key":"e_1_3_2_1_52_1","unstructured":"Sharon Machlis. 2015. IoT's dark side: Hundreds of unsecured devices open to attack. http:\/\/goo.gl\/pM9TNk. (2015). Sharon Machlis. 2015. IoT's dark side: Hundreds of unsecured devices open to attack. http:\/\/goo.gl\/pM9TNk. (2015)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23165"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753421"},{"key":"e_1_3_2_1_55_1","unstructured":"mcafee.com. 2013. Mobile Malware -The Rise Continues. http:\/\/goo.gl\/3f1LP8. (2013). mcafee.com. 2013. Mobile Malware -The Rise Continues. http:\/\/goo.gl\/3f1LP8. (2013)."},{"key":"e_1_3_2_1_56_1","unstructured":"microsoft.com. 2017. Azure IoT Hub - Microsoft Azure. https:\/\/goo.gl\/RYZTGC. (2017). microsoft.com. 2017. Azure IoT Hub - Microsoft Azure. https:\/\/goo.gl\/RYZTGC. (2017)."},{"key":"e_1_3_2_1_57_1","unstructured":"myn3rd.com. 2017. My N3rd: CONNECT AND CONTROL ANYTHING FROM ANYWHERE. http:\/\/goo.gl\/8gpa0D. (2017). myn3rd.com. 2017. My N3rd: CONNECT AND CONTROL ANYTHING FROM ANYWHERE. http:\/\/goo.gl\/8gpa0D. (2017)."},{"key":"e_1_3_2_1_58_1","unstructured":"nabto.com. 2015. Nabto IoT Platform Specifications. https:\/\/goo.gl\/SekiZV. (2015). nabto.com. 2015. Nabto IoT Platform Specifications. https:\/\/goo.gl\/SekiZV. (2015)."},{"key":"e_1_3_2_1_59_1","volume-title":"Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.. In NDSS.","author":"Naveed Muhammad","year":"2014","unstructured":"Muhammad Naveed , Xiao-yong Zhou, Soteris Demetriou , XiaoFeng Wang , and Carl A Gunter . 2014 . Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.. In NDSS. Muhammad Naveed, Xiao-yong Zhou, Soteris Demetriou, XiaoFeng Wang, and Carl A Gunter. 2014. Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.. In NDSS."},{"key":"e_1_3_2_1_60_1","unstructured":"nest.com. 2017. Nest Protect. https:\/\/goo.gl\/jM8ALk. (2017). nest.com. 2017. Nest Protect. https:\/\/goo.gl\/jM8ALk. (2017)."},{"key":"e_1_3_2_1_61_1","unstructured":"nest.com. 2017. Nest Thermostat. https:\/\/goo.gl\/oSIFfQ. (2017). nest.com. 2017. Nest Thermostat. https:\/\/goo.gl\/oSIFfQ. (2017)."},{"key":"e_1_3_2_1_62_1","unstructured":"Matte Noble. 2013. WeMo Hacking. http:\/\/goo.gl\/C97vKv. (2013). Matte Noble. 2013. WeMo Hacking. http:\/\/goo.gl\/C97vKv. (2013)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Sukhvir Notra Muhammad Siddiqi Hassan H. Gharakheili Vijay Sivaraman and Roksana Boreli. 2014. An Experimental Study of Security and Privacy Risks with Emerging Household Appliances (M2MSec '14). Sukhvir Notra Muhammad Siddiqi Hassan H. Gharakheili Vijay Sivaraman and Roksana Boreli. 2014. An Experimental Study of Security and Privacy Risks with Emerging Household Appliances (M2MSec '14).","DOI":"10.1109\/CNS.2014.6997469"},{"key":"e_1_3_2_1_64_1","unstructured":"Pierluigi Paganini. 2013. Internet of Things - Symantec has discovered a new Linux worm. http:\/\/goo.gl\/DwPGnM. (2013). Pierluigi Paganini. 2013. Internet of Things - Symantec has discovered a new Linux worm. http:\/\/goo.gl\/DwPGnM. (2013)."},{"key":"e_1_3_2_1_65_1","unstructured":"Danny Palmer. 2016. This Android malware has infected 85 million devices and makes its creators 300 000 a month. http:\/\/goo.gl\/4YbaWg. (2016). Danny Palmer. 2016. This Android malware has infected 85 million devices and makes its creators 300 000 a month. http:\/\/goo.gl\/4YbaWg. (2016)."},{"key":"e_1_3_2_1_66_1","unstructured":"Sue Marquette Poremba. 2016. Studies Show Rise of the Mobile Malware Threat. http:\/\/goo.gl\/VfUKB4. (2016). Sue Marquette Poremba. 2016. Studies Show Rise of the Mobile Malware Threat. http:\/\/goo.gl\/VfUKB4. (2016)."},{"key":"e_1_3_2_1_67_1","volume-title":"Smartphone Ownership and Internet Usage Continues to Climb in Emerging Economies","author":"Poushter Jacob","year":"2016","unstructured":"Jacob Poushter . 2016. Smartphone Ownership and Internet Usage Continues to Climb in Emerging Economies . Pew Research Center : Global Attitudes & Trends ( 2016 ). Jacob Poushter. 2016. Smartphone Ownership and Internet Usage Continues to Climb in Emerging Economies. Pew Research Center: Global Attitudes & Trends (2016)."},{"key":"e_1_3_2_1_68_1","unstructured":"qualcomm.com. 2017. Trepn Power Profiler. https:\/\/goo.gl\/KGrswV. (2017). qualcomm.com. 2017. Trepn Power Profiler. https:\/\/goo.gl\/KGrswV. (2017)."},{"key":"e_1_3_2_1_69_1","unstructured":"Juha Saarinen. 2014. Vendors slow to patch OpenSSL vulnerabilities. http:\/\/goo.gl\/9EFXAT. (2014). Juha Saarinen. 2014. Vendors slow to patch OpenSSL vulnerabilities. http:\/\/goo.gl\/9EFXAT. (2014)."},{"key":"e_1_3_2_1_70_1","unstructured":"samsung.com. 2017. Samsung Family Hub Refrigerator. http:\/\/goo.gl\/ddwlxb. (2017). samsung.com. 2017. Samsung Family Hub Refrigerator. http:\/\/goo.gl\/ddwlxb. (2017)."},{"key":"e_1_3_2_1_71_1","unstructured":"securityfocus.com. 2013. Belkin WiFi NetCam video stream backdoor with unchangeable admin\/admin credentials. http:\/\/goo.gl\/XnmwAk. (2013). securityfocus.com. 2013. Belkin WiFi NetCam video stream backdoor with unchangeable admin\/admin credentials. http:\/\/goo.gl\/XnmwAk. (2013)."},{"key":"e_1_3_2_1_72_1","unstructured":"securityintelligence.com. 2015. 2015 Mobile Threat Report - The Rise of Mobile Malware. https:\/\/goo.gl\/lhZ1yb. (2015). securityintelligence.com. 2015. 2015 Mobile Threat Report - The Rise of Mobile Malware. https:\/\/goo.gl\/lhZ1yb. (2015)."},{"key":"e_1_3_2_1_73_1","unstructured":"Sergey Shekyan and Artem Hartutyunyan. 2013. Watching the watchers:hacking wireless IP security cameras. In HITB. Sergey Shekyan and Artem Hartutyunyan. 2013. Watching the watchers:hacking wireless IP security cameras. In HITB."},{"key":"e_1_3_2_1_74_1","unstructured":"shodan.io. 2017. Shodan. https:\/\/goo.gl\/vUL10K. (2017). shodan.io. 2017. Shodan. https:\/\/goo.gl\/vUL10K. (2017)."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939925"},{"key":"e_1_3_2_1_76_1","volume-title":"Arun Vishwanath, Roksana Boreli, and Olivier Mehani.","author":"Sivaraman Vijay","year":"2015","unstructured":"Vijay Sivaraman , Hassan Habibi Gharakheili , Arun Vishwanath, Roksana Boreli, and Olivier Mehani. 2015 . Network-level security and privacy control for smart-home IoT devices (WiMob '15). Vijay Sivaraman, Hassan Habibi Gharakheili, Arun Vishwanath, Roksana Boreli, and Olivier Mehani. 2015. Network-level security and privacy control for smart-home IoT devices (WiMob '15)."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","unstructured":"Stephen Smalley and Robert Craig. 2013. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. (NDSS '13). Stephen Smalley and Robert Craig. 2013. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. (NDSS '13).","DOI":"10.1016\/S1361-3723(13)70103-9"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"crossref","unstructured":"Stephen Smalley and Robert Craig. 2013. Security Enhanced (SE) Android: Bringing Flexible MAC to Android (NDSS '13). Stephen Smalley and Robert Craig. 2013. Security Enhanced (SE) Android: Bringing Flexible MAC to Android (NDSS '13).","DOI":"10.1016\/S1361-3723(13)70103-9"},{"key":"e_1_3_2_1_79_1","unstructured":"Ms. Smith. 2013. Eavesdropping made easy: Remote spying with WeMo Baby and an iPhone. http:\/\/goo.gl\/OUxdUy. (2013). Ms. Smith. 2013. Eavesdropping made easy: Remote spying with WeMo Baby and an iPhone. http:\/\/goo.gl\/OUxdUy. (2013)."},{"key":"#cr-split#-e_1_3_2_1_80_1.1","unstructured":"Ms. Smith. 2014. 500 000 Belkin WeMo users could be hacked"},{"key":"#cr-split#-e_1_3_2_1_80_1.2","unstructured":"CERT issues advisory. http:\/\/goo.gl\/HBN9HB. (2014). Ms. Smith. 2014. 500 000 Belkin WeMo users could be hacked"},{"key":"#cr-split#-e_1_3_2_1_80_1.3","unstructured":"CERT issues advisory. http:\/\/goo.gl\/HBN9HB. (2014)."},{"key":"e_1_3_2_1_81_1","unstructured":"Howard Solomon. 2016. Mobile malware unpatched Android devices are increasing problems say studies. http:\/\/goo.gl\/EUGmDC. (2016). Howard Solomon. 2016. Mobile malware unpatched Android devices are increasing problems say studies. http:\/\/goo.gl\/EUGmDC. (2016)."},{"key":"e_1_3_2_1_82_1","unstructured":"Mark Stanislav and Tod Beardsley. 2015. HACKING IoT: A Case Study on Baby Monitor Exposures and Vulnerabilities. https:\/\/goo.gl\/Uh7y4e. (2015). Mark Stanislav and Tod Beardsley. 2015. HACKING IoT: A Case Study on Baby Monitor Exposures and Vulnerabilities. https:\/\/goo.gl\/Uh7y4e. (2015)."},{"key":"e_1_3_2_1_83_1","volume-title":"Number of apps available in leading app stores as of","year":"2016","unstructured":"statista.com. 2016. Number of apps available in leading app stores as of June 2016 . http:\/\/goo.gl\/LO6umz. (2016). statista.com. 2016. Number of apps available in leading app stores as of June 2016. http:\/\/goo.gl\/LO6umz. (2016)."},{"key":"e_1_3_2_1_84_1","volume-title":"Android version market share distribution among smartphone owners as of","year":"2016","unstructured":"statista.com. 2017. Android version market share distribution among smartphone owners as of September 2016 . http:\/\/goo.gl\/vMm2t2. (2017). statista.com. 2017. Android version market share distribution among smartphone owners as of September 2016. http:\/\/goo.gl\/vMm2t2. (2017)."},{"key":"e_1_3_2_1_85_1","unstructured":"Darlene Storm. 2015. 2 more wireless baby monitors hacked: Hackers remotely spied on babies and parents. http:\/\/goo.gl\/UIbWvA. (2015). Darlene Storm. 2015. 2 more wireless baby monitors hacked: Hackers remotely spied on babies and parents. http:\/\/goo.gl\/UIbWvA. (2015)."},{"key":"e_1_3_2_1_86_1","volume-title":"Eerie music coming from wireless baby cam","author":"Storm Darlene","year":"2015","unstructured":"Darlene Storm . 2015. Eerie music coming from wireless baby cam ; is it a haunting? No , it's a hacker. http:\/\/goo.gl\/49Larp. ( 2015 ). Darlene Storm. 2015. Eerie music coming from wireless baby cam; is it a haunting? No, it's a hacker. http:\/\/goo.gl\/49Larp. (2015)."},{"key":"e_1_3_2_1_87_1","volume-title":"TrustDump: Reliable Memory Acquisition on Smartphones (ESORICS '14)","author":"Sun He","year":"2014","unstructured":"He Sun , Kun Sun , Yuewu Wang , Jiwu Jing , and Sushil Jajodia . 2014 . TrustDump: Reliable Memory Acquisition on Smartphones (ESORICS '14) . He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, and Sushil Jajodia. 2014. TrustDump: Reliable Memory Acquisition on Smartphones (ESORICS '14)."},{"key":"e_1_3_2_1_88_1","unstructured":"theverge.com. 2012. Square updates its credit card reader to include hardware encryption. http:\/\/goo.gl\/G0Vji7. (2012). theverge.com. 2012. Square updates its credit card reader to include hardware encryption. http:\/\/goo.gl\/G0Vji7. (2012)."},{"key":"e_1_3_2_1_89_1","unstructured":"throughtek.com. 2015. Kalay Platform. http:\/\/goo.gl\/t9oGM3. (2015). throughtek.com. 2015. Kalay Platform. http:\/\/goo.gl\/t9oGM3. (2015)."},{"key":"e_1_3_2_1_90_1","volume-title":"The Current State of Access Control for Smart Devices in Homes (HUPS '13)","author":"Ur Blase","year":"2013","unstructured":"Blase Ur , Jaeyeon Jung , and Stuart Schechter . 2013 . The Current State of Access Control for Smart Devices in Homes (HUPS '13) . Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2013. The Current State of Access Control for Smart Devices in Homes (HUPS '13)."},{"key":"e_1_3_2_1_91_1","unstructured":"weaved.com. 2015. Weaved Remote Connections. https:\/\/goo.gl\/elBwS3. (2015). weaved.com. 2015. Weaved Remote Connections. https:\/\/goo.gl\/elBwS3. (2015)."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456460"},{"key":"e_1_3_2_1_94_1","unstructured":"Ryszard Winiewski and Tumbleson. 2017. A tool for reverse engineering Android apk files. http:\/\/goo.gl\/26AzzN. (2017). Ryszard Winiewski and Tumbleson. 2017. A tool for reverse engineering Android apk files. http:\/\/goo.gl\/26AzzN. (2017)."},{"key":"e_1_3_2_1_95_1","unstructured":"yahoo.com. 2014. Proofpoint Uncovers Internet of Things (IoT) Cyberattack. http:\/\/goo.gl\/GBqies. (2014). yahoo.com. 2014. Proofpoint Uncovers Internet of Things (IoT) Cyberattack. http:\/\/goo.gl\/GBqies. (2014)."},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.61"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_100_1","volume-title":"Detecting Passive Content Leaks and Pollution in Android Applications (NDSS '13)","author":"Zhou Yajin","year":"2013","unstructured":"Yajin Zhou and Xuxian Jiang . 2013 . Detecting Passive Content Leaks and Pollution in Android Applications (NDSS '13) . Yajin Zhou and Xuxian Jiang. 2013. Detecting Passive Content Leaks and Pollution in Android Applications (NDSS '13)."}],"event":{"name":"WiSec '17: 10th ACM Conference on Security & Privacy in Wireless and Mobile Networks","location":"Boston Massachusetts","acronym":"WiSec '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","NSF National Science Foundation","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098243.3098251","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3098243.3098251","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3098243.3098251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:03Z","timestamp":1750217403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098243.3098251"}},"subtitle":["SDN-driven protection of smart home WiFi devices from malicious mobile apps"],"short-title":[],"issued":{"date-parts":[[2017,7,18]]},"references-count":98,"alternative-id":["10.1145\/3098243.3098251","10.1145\/3098243"],"URL":"https:\/\/doi.org\/10.1145\/3098243.3098251","relation":{},"subject":[],"published":{"date-parts":[[2017,7,18]]},"assertion":[{"value":"2017-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}