{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:28:32Z","timestamp":1773844112776,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program of China","award":["No.2016QY03D0605"],"award-info":[{"award-number":["No.2016QY03D0605"]}]},{"name":"National Nature Science Foundation of China","award":["No.61672111"],"award-info":[{"award-number":["No.61672111"]}]},{"name":"Beijing Natural Science Foundation","award":["No.4162043"],"award-info":[{"award-number":["No.4162043"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,20]]},"DOI":"10.1145\/3175684.3175718","type":"proceedings-article","created":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T12:47:13Z","timestamp":1523278033000},"page":"195-199","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A Novel Semi-Automatic Vulnerability Detection System for Smart Home"],"prefix":"10.1145","author":[{"given":"Xiaoyan","family":"Jia","sequence":"first","affiliation":[{"name":"Key Laboratory of Trustworthy Distributed Computing and Service, Ministry of Education (BUPT), Beijing, China"}]},{"given":"Xiaoyong","family":"Li","sequence":"additional","affiliation":[{"name":"Key Laboratory of Trustworthy Distributed Computing and Service, Ministry of Education (BUPT), Beijing, China"}]},{"given":"Yali","family":"Gao","sequence":"additional","affiliation":[{"name":"Key Laboratory of Trustworthy Distributed Computing and Service, Ministry of Education (BUPT), Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"https:\/\/zh.wikipedia.org\/zh-hans\/Mirai_(%E6%81%B6%E6%84%8F%E8%BD%AF%E4%BB%B6) accessed by 2017-11-06  https:\/\/zh.wikipedia.org\/zh-hans\/Mirai_(%E6%81%B6%E6%84%8F%E8%BD%AF%E4%BB%B6) accessed by 2017-11-06"},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/www.antiy.com\/response\/Mirai\/Mirai.html accessed by 2017-11-06  http:\/\/www.antiy.com\/response\/Mirai\/Mirai.html accessed by 2017-11-06"},{"key":"e_1_3_2_1_3_1","first-page":"431","volume-title":"Data Science & Engineering - Confluence","author":"Saxena U.","year":"2017","unstructured":"U. Saxena , J. S. Sodhi and Y. Singh , \" Analysis of security attacks in a smart home networks,\" 2017 7th International Conference on Cloud Computing , Data Science & Engineering - Confluence , Noida , 2017 , pp. 431 -- 436 . U. Saxena, J. S. Sodhi and Y. Singh, \"Analysis of security attacks in a smart home networks,\" 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence, Noida, 2017, pp. 431--436."},{"key":"e_1_3_2_1_4_1","first-page":"551","volume-title":"Securing vulnerable home IoT devices with an in-hub security manager,\" 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","author":"Simpson A. K.","year":"2017","unstructured":"A. K. Simpson , F. Roesner and T. Kohno , \" Securing vulnerable home IoT devices with an in-hub security manager,\" 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) , Kona, HI , 2017 , pp. 551 -- 556 . A. K. Simpson, F. Roesner and T. Kohno, \"Securing vulnerable home IoT devices with an in-hub security manager,\" 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kona, HI, 2017, pp. 551--556."},{"key":"e_1_3_2_1_5_1","first-page":"172","volume-title":"Uppsala","author":"Bugeja J.","year":"2016","unstructured":"J. Bugeja , A. Jacobsson and P. Davidsson , \" On Privacy and Security Challenges in Smart Connected Homes,\" 2016 European Intelligence and Security Informatics Conference (EISIC) , Uppsala , 2016 , pp. 172 -- 175 . J. Bugeja, A. Jacobsson and P. Davidsson, \"On Privacy and Security Challenges in Smart Connected Homes,\" 2016 European Intelligence and Security Informatics Conference (EISIC), Uppsala, 2016, pp. 172--175."},{"key":"e_1_3_2_1_6_1","first-page":"242","volume-title":"Augsburg","author":"Pacheco J.","year":"2016","unstructured":"J. Pacheco and S. Hariri , \" IoT Security Framework for Smart Cyber Infrastructures,\" 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W) , Augsburg , 2016 , pp. 242 -- 247 . J. Pacheco and S. Hariri, \"IoT Security Framework for Smart Cyber Infrastructures,\" 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W), Augsburg, 2016, pp. 242--247."},{"key":"e_1_3_2_1_7_1","first-page":"1006","volume-title":"USA","author":"Minoli D.","year":"2017","unstructured":"D. Minoli , K. Sohraby and J. Kouns , \" IoT security (IoTSec) considerations, requirements, and architectures,\" 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV , USA , 2017 , pp. 1006 -- 1007 . D. Minoli, K. Sohraby and J. Kouns, \"IoT security (IoTSec) considerations, requirements, and architectures,\" 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 2017, pp. 1006--1007."},{"key":"e_1_3_2_1_8_1","first-page":"46","volume-title":"Montreal","author":"Musman S.","year":"2011","unstructured":"S. Musman , M. Tanner , A. Temin , E. Elsaesser and L. Loren , \" Computing the impact of cyber attacks on complex missions,\" 2011 IEEE International Systems Conference , Montreal , QC , 2011 , pp. 46 -- 51 . S. Musman, M. Tanner, A. Temin, E. Elsaesser and L. Loren, \"Computing the impact of cyber attacks on complex missions,\" 2011 IEEE International Systems Conference, Montreal, QC, 2011, pp. 46--51."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2013.81"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.24"},{"key":"e_1_3_2_1_11_1","first-page":"197","volume-title":"Cambridge","author":"Schlegel R.","year":"2015","unstructured":"R. Schlegel , S. Obermeier and J. Schneider , \" Structured system threat modeling and mitigation analysis for industrial automation systems,\" 2015 IEEE 13th International Conference on Industrial Informatics (INDIN) , Cambridge , 2015 , pp. 197 -- 203 . R. Schlegel, S. Obermeier and J. Schneider, \"Structured system threat modeling and mitigation analysis for industrial automation systems,\" 2015 IEEE 13th International Conference on Industrial Informatics (INDIN), Cambridge, 2015, pp. 197--203."},{"key":"e_1_3_2_1_12_1","unstructured":"\"Internet of Things: Architectures Protocols and Applications\" https:\/\/www.hindawi.com\/journals\/jece\/2017\/9324035\/accessed 10\/02\/2017  \"Internet of Things: Architectures Protocols and Applications\" https:\/\/www.hindawi.com\/journals\/jece\/2017\/9324035\/accessed 10\/02\/2017"}],"event":{"name":"BDIOT2017: International Conference on Big Data and Internet of Thing","location":"London United Kingdom","acronym":"BDIOT2017"},"container-title":["Proceedings of the International Conference on Big Data and Internet of Thing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3175684.3175718","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3175684.3175718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:49Z","timestamp":1750273489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3175684.3175718"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"references-count":12,"alternative-id":["10.1145\/3175684.3175718","10.1145\/3175684"],"URL":"https:\/\/doi.org\/10.1145\/3175684.3175718","relation":{},"subject":[],"published":{"date-parts":[[2017,12,20]]},"assertion":[{"value":"2017-12-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}