{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:15:04Z","timestamp":1770538504226,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243841","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1102-1119","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":68,"title":["If This Then What?"],"prefix":"10.1145","author":[{"given":"Iulia","family":"Bastys","sequence":"first","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]},{"given":"Musard","family":"Balliu","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"given":"Andrei","family":"Sabelfeld","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"textttalexander via IFTTT. 2018. Automatically back up your new iOS photos to Google Drive. https:\/\/ifttt.com\/applets\/90254p-automatically-back-up-your-new-ios-photos-to-google-drive. (2018).  textttalexander via IFTTT. 2018. Automatically back up your new iOS photos to Google Drive. https:\/\/ifttt.com\/applets\/90254p-automatically-back-up-your-new-ios-photos-to-google-drive. (2018)."},{"key":"e_1_3_2_2_2_1","unstructured":"Almond via IFTTT. 2018. Get an email alert when your kids come home and connect to Almond. https:\/\/ifttt.com\/applets\/458027p-get-an-email-alert-when-your-kids-come-home-and-connect-to-almond. (2018).  Almond via IFTTT. 2018. Get an email alert when your kids come home and connect to Almond. https:\/\/ifttt.com\/applets\/458027p-get-an-email-alert-when-your-kids-come-home-and-connect-to-almond. (2018)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243841"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653673"},{"key":"e_1_3_2_2_6_1","volume-title":"Sensitive Information Tracking in Commodity IoT. 27th USENIX Security Symposium (USENIX Security 18)","author":"Celik Z. Berkay","unstructured":"Z. Berkay Celik , Leonardo Babun , Amit Kumar Sikder , Hidayet Aksu , Gang Tan , Patrick McDaniel , and A. Selcuk Uluagac . 2018 . Sensitive Information Tracking in Commodity IoT. 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD. Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A. Selcuk Uluagac. 2018. Sensitive Information Tracking in Commodity IoT. 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD."},{"key":"e_1_3_2_2_7_1","unstructured":"E. S. Cohen. 1978. Information Transmission in Sequential Programs. F. Sec. Comp.  E. S. Cohen. 1978. Information Transmission in Sequential Programs. F. Sec. Comp."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"e_1_3_2_2_9_1","unstructured":"textttdevin via IFTTT. 2018. Automatically text someone important when you call 911 from your Android phone. https:\/\/ifttt.com\/applets\/165118p-automatically-text-someone-important-when-you-call-911-from-your-android-phone. (2018).  textttdevin via IFTTT. 2018. Automatically text someone important when you call 911 from your Android phone. https:\/\/ifttt.com\/applets\/165118p-automatically-text-someone-important-when-you-call-911-from-your-android-phone. (2018)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11748625_16"},{"key":"e_1_3_2_2_11_1","unstructured":"Earlence Fernandes Justin Paupore Amir Rahmati Daniel Simionato Mauro Conti and Atul Prakash. 2016. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In USENIX.   Earlence Fernandes Justin Paupore Amir Rahmati Daniel Simionato Mauro Conti and Atul Prakash. 2016. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In USENIX."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Earlence Fernandes Amir Rahmati Jaeyeon Jung and Atul Prakash. 2018. Decentralized Action Integrity for Trigger-Action IoT Platforms. In NDSS.  Earlence Fernandes Amir Rahmati Jaeyeon Jung and Atul Prakash. 2018. Decentralized Action Integrity for Trigger-Action IoT Platforms. In NDSS.","DOI":"10.14722\/ndss.2018.23119"},{"key":"e_1_3_2_2_13_1","volume-title":"Gone in Six Characters: Short URLs Considered Harmful for Cloud Services. CoRR","author":"Georgiev Martin","year":"2016","unstructured":"Martin Georgiev and Vitaly Shmatikov . 2016. Gone in Six Characters: Short URLs Considered Harmful for Cloud Services. CoRR , Vol. abs\/ 1604 .02734 ( 2016 ). Martin Georgiev and Vitaly Shmatikov. 2016. Gone in Six Characters: Short URLs Considered Harmful for Cloud Services. CoRR, Vol. abs\/1604.02734 (2016)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964017"},{"key":"e_1_3_2_2_15_1","volume-title":"Security Policies and Security Models","author":"Goguen Joseph","unstructured":"Joseph Goguen and Jos\u00e9 Meseguer . 1982. Security Policies and Security Models . In IEEE S &P. Joseph Goguen and Jos\u00e9 Meseguer. 1982. Security Policies and Security Models. In IEEE S&P."},{"key":"e_1_3_2_2_16_1","unstructured":"Google via IFTTT. 2018. Keep a list of notes to email yourself at the end of the day. https:\/\/ifttt.com\/applets\/479449p-keep-a-list-of-notes-to-email-yourself-at-the-end-of-the-day. (2018).  Google via IFTTT. 2018. Keep a list of notes to email yourself at the end of the day. https:\/\/ifttt.com\/applets\/479449p-keep-a-list-of-notes-to-email-yourself-at-the-end-of-the-day. (2018)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Simon Greiner and Daniel Grahl. 2016. Non-interference with What-Declassification in Component-Based Systems. In CSF.  Simon Greiner and Daniel Grahl. 2016. Non-interference with What-Declassification in Component-Based Systems. In CSF.","DOI":"10.1109\/CSF.2016.25"},{"key":"e_1_3_2_2_18_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"He Weijia","year":"2018","unstructured":"Weijia He , Maximilian Golla , Roshni Padhi , Jordan Ofek , Markus D\u00fcrmuth , Earlence Fernandes , and Blase Ur . 2018 . Rethinking Access Control and Authentication for the Home Internet of Things (IoT) . In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD. Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus D\u00fcrmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking Access Control and Authentication for the Home Internet of Things (IoT). In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"Daniel Hedin Luciano Bello and Andrei Sabelfeld. 2016. Information-flow security for JavaScript and its APIs. J. Comp. Sec. (2016).  Daniel Hedin Luciano Bello and Andrei Sabelfeld. 2016. Information-flow security for JavaScript and its APIs. J. Comp. Sec. (2016).","DOI":"10.3233\/JCS-160544"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554909"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2805830"},{"key":"e_1_3_2_2_22_1","unstructured":"iBaby via IFTTT. 2018. Email me when temperature drops below threshold in the baby's room. https:\/\/ifttt.com\/applets\/UFcy5hZP-email-me-when-temperature-drops-below-threshold-in-the-baby-s-room. (2018).  iBaby via IFTTT. 2018. Email me when temperature drops below threshold in the baby's room. https:\/\/ifttt.com\/applets\/UFcy5hZP-email-me-when-temperature-drops-below-threshold-in-the-baby-s-room. (2018)."},{"key":"e_1_3_2_2_23_1","unstructured":"IFTTT. 2016. How people use IFTTT today. https:\/\/ifttt.com\/blog\/2016\/11\/connected-life-of-an-ifttt-user. (2016).  IFTTT. 2016. How people use IFTTT today. https:\/\/ifttt.com\/blog\/2016\/11\/connected-life-of-an-ifttt-user. (2016)."},{"key":"e_1_3_2_2_24_1","unstructured":"IFTTT. 2017. 550 apps and devices now work with IFTTT. https:\/\/ifttt.com\/blog\/2017\/09\/550-apps-and-devices-now-on-ifttt-infographic. (2017).  IFTTT. 2017. 550 apps and devices now work with IFTTT. https:\/\/ifttt.com\/blog\/2017\/09\/550-apps-and-devices-now-on-ifttt-infographic. (2017)."},{"key":"e_1_3_2_2_25_1","unstructured":"IFTTT. 2018a. Share your Applet ideas with us! https:\/\/www.surveymonkey.com\/r\/2XZ7D27. (2018).  IFTTT. 2018a. Share your Applet ideas with us! https:\/\/www.surveymonkey.com\/r\/2XZ7D27. (2018)."},{"key":"e_1_3_2_2_26_1","unstructured":"IFTTT. 2018b. URL Shortening in IFTTT. https:\/\/help.ifttt.com\/hc\/en-us\/articles\/115010361648-Do-all-Applets-run-through-the-ift-tt-url-shortener-. (2018).  IFTTT. 2018b. URL Shortening in IFTTT. https:\/\/help.ifttt.com\/hc\/en-us\/articles\/115010361648-Do-all-Applets-run-through-the-ift-tt-url-shortener-. (2018)."},{"key":"e_1_3_2_2_27_1","volume-title":"USENIX Security Symposium. USENIX Association, 579--593","author":"Jagpal Nav","year":"2015","unstructured":"Nav Jagpal , Eric Dingle , Jean-Philippe Gravel , Panayiotis Mavrommatis , Niels Provos , Moheeb Abu Rajab , and Kurt Thomas . 2015 . Trends and Lessons from Three Years Fighting Malicious Extensions . In USENIX Security Symposium. USENIX Association, 579--593 . Nav Jagpal, Eric Dingle, Jean-Philippe Gravel, Panayiotis Mavrommatis, Niels Provos, Moheeb Abu Rajab, and Kurt Thomas. 2015. Trends and Lessons from Three Years Fighting Malicious Extensions. In USENIX Security Symposium. USENIX Association, 579--593."},{"key":"e_1_3_2_2_28_1","unstructured":"textttjayreddin via IFTTT. 2018. Google Contacts saved to Google Drive Spreadsheet. https:\/\/ifttt.com\/applets\/nyRJVwYa-google-contacts-saved-to-google-drive-spreadsheet. (2018).  textttjayreddin via IFTTT. 2018. Google Contacts saved to Google Drive Spreadsheet. https:\/\/ifttt.com\/applets\/nyRJVwYa-google-contacts-saved-to-google-drive-spreadsheet. (2018)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950356"},{"key":"e_1_3_2_2_30_1","unstructured":"Manything via IFTTT. 2018. When you leave home start recording on your Manything security camera. https:\/\/ifttt.com\/applets\/187215p-when-you-leave-home-start-recording-on-your-manything-security-camera. (2018).  Manything via IFTTT. 2018. When you leave home start recording on your Manything security camera. https:\/\/ifttt.com\/applets\/187215p-when-you-leave-home-start-recording-on-your-manything-security-camera. (2018)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131369"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Toby C. Murray Robert Sison Edward Pierzchalski and Christine Rizkallah. 2016. Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference. In CSF.  Toby C. Murray Robert Sison Edward Pierzchalski and Christine Rizkallah. 2016. Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference. In CSF.","DOI":"10.1109\/CSF.2016.36"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993601"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79576-6_13"},{"key":"e_1_3_2_2_35_1","volume-title":"Efail: Breaking S\/MIME and OpenPGP Email Encryption using Exfiltration Channels. In USENIX Security.","author":"Poddebniak Damian","year":"2018","unstructured":"Damian Poddebniak , Jens M\u00fcller , Christian Dresen , Fabian Ising , Sebastian Schinzel , Simon Friedberger , Juraj Somorovsky , and J\u00f6rg Schwenk . 2018 . Efail: Breaking S\/MIME and OpenPGP Email Encryption using Exfiltration Channels. In USENIX Security. Damian Poddebniak, Jens M\u00fcller, Christian Dresen, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Somorovsky, and J\u00f6rg Schwenk. 2018. Efail: Breaking S\/MIME and OpenPGP Email Encryption using Exfiltration Channels. In USENIX Security."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011553200337"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.28"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052709"},{"key":"e_1_3_2_2_39_1","unstructured":"textttthegrowthguy via IFTTT. 2017. Automatically log new Stripe payments to a Google Spreadsheet. https:\/\/ifttt.com\/applets\/264933p-automatically-log-new-stripe-payments-to-a-google-spreadsheet. (2017).  textttthegrowthguy via IFTTT. 2017. Automatically log new Stripe payments to a Google Spreadsheet. https:\/\/ifttt.com\/applets\/264933p-automatically-log-new-stripe-payments-to-a-google-spreadsheet. (2017)."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858556"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557420"},{"key":"e_1_3_2_2_42_1","volume-title":"Christopher Kr\u00fc gel, and Giovanni Vigna","author":"Vogt Philipp","year":"2007","unstructured":"Philipp Vogt , Florian Nentwich , Nenad Jovanovic , Engin Kirda , Christopher Kr\u00fc gel, and Giovanni Vigna . 2007 . Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In NDSS. Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kr\u00fc gel, and Giovanni Vigna. 2007. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In NDSS."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516727"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243841","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:08Z","timestamp":1750212788000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243841"}},"subtitle":["Controlling Flows in IoT Apps"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":43,"alternative-id":["10.1145\/3243734.3243841","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243841","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}