{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:17:15Z","timestamp":1755998235901,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3319724","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"140-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Blinded and confused"],"prefix":"10.1145","author":[{"given":"TJ","family":"OConnor","sequence":"first","affiliation":[{"name":"North Carolina State University"}]},{"given":"William","family":"Enck","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Bradley","family":"Reaves","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and A Selcuk Uluagac.","author":"Acar Abbas","year":"2018","unstructured":"Abbas Acar , Hossein Fereidooni , Tigist Abera , Amit Kumar Sikder , Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and A Selcuk Uluagac. 2018 . Peek-a-Boo : I see your smart home activities, even encrypted! https:\/\/arxiv.org\/pdf\/1808.02741.pdf Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and A Selcuk Uluagac. 2018. Peek-a-Boo: I see your smart home activities, even encrypted! https:\/\/arxiv.org\/pdf\/1808.02741.pdf"},{"key":"e_1_3_2_1_2_1","first-page":"814","article-title":"Service for developing dialog-driven applications","volume":"15","author":"Anbazhagan Vikram Sathyanarayana","year":"2018","unstructured":"Vikram Sathyanarayana Anbazhagan , Rama Krishna Sandeep Pokkunuri , Swaminathan Sivasubramanian , Stefano Stefani , and Vladimir Zhukov . 2018 . Service for developing dialog-driven applications . US Patent App. 15\/360 , 814 . Vikram Sathyanarayana Anbazhagan, Rama Krishna Sandeep Pokkunuri, Swaminathan Sivasubramanian, Stefano Stefani, and Vladimir Zhukov. 2018. Service for developing dialog-driven applications. US Patent App. 15\/360,814.","journal-title":"US Patent App."},{"key":"e_1_3_2_1_3_1","unstructured":"Apple Computers Inc. 2018. iOS 12 Security Guide iOS. https:\/\/www.apple.com\/business\/site\/docs\/iOS_Security_Guide.pdf  Apple Computers Inc. 2018. iOS 12 Security Guide iOS. https:\/\/www.apple.com\/business\/site\/docs\/iOS_Security_Guide.pdf"},{"key":"e_1_3_2_1_4_1","volume-title":"Dillon Reisman, Arvind Narayanan, and Nick Feamster.","author":"Apthorpe Noah","year":"2018","unstructured":"Noah Apthorpe , Danny Yuxing Huang , Dillon Reisman, Arvind Narayanan, and Nick Feamster. 2018 . Keeping the Smart Home Private with Smart (er) IoT Traffic Shaping . https:\/\/arxiv.org\/pdf\/1812.00955.pdf Noah Apthorpe, Danny Yuxing Huang, Dillon Reisman, Arvind Narayanan, and Nick Feamster. 2018. Keeping the Smart Home Private with Smart (er) IoT Traffic Shaping. https:\/\/arxiv.org\/pdf\/1812.00955.pdf"},{"key":"e_1_3_2_1_5_1","unstructured":"Noah Apthorpe Dillon Reisman Srikanth Sundaresan Arvind Narayanan and Nick Feamster. 2017. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. http:\/\/arxiv.org\/abs\/1708.05044  Noah Apthorpe Dillon Reisman Srikanth Sundaresan Arvind Narayanan and Nick Feamster. 2017. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. http:\/\/arxiv.org\/abs\/1708.05044"},{"key":"e_1_3_2_1_6_1","volume-title":"IDIoT: Securing the Internet of Things like it's","author":"Barrera David","year":"1994","unstructured":"David Barrera , Ian Molloy , and Heqing Huang . 2017. IDIoT: Securing the Internet of Things like it's 1994 . https:\/\/arxiv.org\/abs\/1712.03623 David Barrera, Ian Molloy, and Heqing Huang. 2017. IDIoT: Securing the Internet of Things like it's 1994. https:\/\/arxiv.org\/abs\/1712.03623"},{"volume-title":"Mobile ad hoc networking: Cutting edge directions","author":"Basagni Stefano","key":"e_1_3_2_1_7_1","unstructured":"Stefano Basagni , Marco Conti , Silvia Giordano , and Ivan Stojmenovic . 2013. Mobile ad hoc networking: Cutting edge directions . Vol. 35 . John Wiley & Sons , Hoboken, NJ . Stefano Basagni, Marco Conti, Silvia Giordano, and Ivan Stojmenovic. 2013. Mobile ad hoc networking: Cutting edge directions. Vol. 35. John Wiley & Sons, Hoboken, NJ."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266452"},{"key":"e_1_3_2_1_9_1","unstructured":"Nick Bilton. 2016. Nest Thermostat Glitch Leaves Users in the Cold. https:\/\/nyti.ms\/1Or0eH0  Nick Bilton. 2016. Nest Thermostat Glitch Leaves Users in the Cold. https:\/\/nyti.ms\/1Or0eH0"},{"key":"e_1_3_2_1_10_1","volume-title":"Locks and Lights: Digital Tools of Domestic Abuse. The New York Times","author":"Bowles Nellie","year":"2018","unstructured":"Nellie Bowles . 2018. Thermostats , Locks and Lights: Digital Tools of Domestic Abuse. The New York Times ( 2018 ). Nellie Bowles. 2018. Thermostats, Locks and Lights: Digital Tools of Domestic Abuse. The New York Times (2018)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212494"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23222"},{"key":"e_1_3_2_1_13_1","unstructured":"Google Cloud. 2018. Overview of Internet of Things: Data Storage. https:\/\/cloud.google.com\/solutions\/iot-overview  Google Cloud. 2018. Overview of Internet of Things: Data Storage. https:\/\/cloud.google.com\/solutions\/iot-overview"},{"key":"e_1_3_2_1_14_1","unstructured":"Thomas d'Otreppe. 2019. Aircrack-ng. https:\/\/www.aircrack-ng.org  Thomas d'Otreppe. 2019. Aircrack-ng. https:\/\/www.aircrack-ng.org"},{"key":"e_1_3_2_1_15_1","first-page":"462","article-title":"Distributed control scheme for remote control and monitoring of devices through a data network","volume":"9","author":"Hagins Jeffrey","year":"2016","unstructured":"Jeffrey Hagins and Alexander Hawkinson . 2016 . Distributed control scheme for remote control and monitoring of devices through a data network . US Patent 9 , 462 ,041. Jeffrey Hagins and Alexander Hawkinson. 2016. Distributed control scheme for remote control and monitoring of devices through a data network. US Patent 9,462,041.","journal-title":"US Patent"},{"key":"e_1_3_2_1_16_1","unstructured":"Jason Hanna and Stella Chan. 2018. The murder suspect denies it. The victim's Fitbit tells another story police says. https:\/\/www.cnn.com\/2018\/10\/04\/us\/california-fitbit-killing\/  Jason Hanna and Stella Chan. 2018. The murder suspect denies it. The victim's Fitbit tells another story police says. https:\/\/www.cnn.com\/2018\/10\/04\/us\/california-fitbit-killing\/"},{"key":"e_1_3_2_1_17_1","unstructured":"Marshall Honorof. 2017. Amazon Cloud Cam Key Flaws Could Let in Burglars. https:\/\/www.tomsguide.com\/us\/amazon-key-cloud-cam-hack news-26132.html  Marshall Honorof. 2017. Amazon Cloud Cam Key Flaws Could Let in Burglars. https:\/\/www.tomsguide.com\/us\/amazon-key-cloud-cam-hack news-26132.html"},{"key":"e_1_3_2_1_18_1","unstructured":"CleverLoop Inc. 2018. Smart Home Security System: FAQs Before Purchase. https:\/\/www.cleverloop.com\/faqs.html  CleverLoop Inc. 2018. Smart Home Security System: FAQs Before Purchase. https:\/\/www.cleverloop.com\/faqs.html"},{"key":"e_1_3_2_1_19_1","unstructured":"Information Sciences Institute. 1981. IETF RFC 793: Transmission Control Protocol (TCP). https:\/\/www.ietf.org\/rfc\/rfc793.txt  Information Sciences Institute. 1981. IETF RFC 793: Transmission Control Protocol (TCP). https:\/\/www.ietf.org\/rfc\/rfc793.txt"},{"key":"e_1_3_2_1_20_1","volume-title":"Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash, and Shanghai JiaoTong Unviersity.","author":"Jia Yunhan Jack","year":"2017","unstructured":"Yunhan Jack Jia , Qi Alfred Chen , Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash, and Shanghai JiaoTong Unviersity. 2017 . ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms . Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash, and Shanghai JiaoTong Unviersity. 2017. ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212500"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"volume-title":"Replacement AutoEncoder: A Privacy-Preserving Algorithm for Sensory Data Analysis. In 2018 IEEE\/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE","author":"Malekzadeh M.","key":"e_1_3_2_1_24_1","unstructured":"M. Malekzadeh , R. G. Clegg , and H. Haddadi . 2018 . Replacement AutoEncoder: A Privacy-Preserving Algorithm for Sensory Data Analysis. In 2018 IEEE\/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE , Orlando, FL, 165--176. M. Malekzadeh, R. G. Clegg, and H. Haddadi. 2018. Replacement AutoEncoder: A Privacy-Preserving Algorithm for Sensory Data Analysis. In 2018 IEEE\/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, Orlando, FL, 165--176."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420960"},{"key":"e_1_3_2_1_26_1","unstructured":"Molly McHugh. 2015. How NestDoor and Nest Cams are helping cops solve crimes. https:\/\/www.wired.com\/2015\/12\/nextdoor-crime-nest-cams\/  Molly McHugh. 2015. How NestDoor and Nest Cams are helping cops solve crimes. https:\/\/www.wired.com\/2015\/12\/nextdoor-crime-nest-cams\/"},{"volume-title":"IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, IEEE","author":"Miettinen M.","key":"e_1_3_2_1_27_1","unstructured":"M. Miettinen , S. Marchal , I. Hafeez , N. Asokan , A. R. Sadeghi , and S. Tarkoma . 2017 . IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, IEEE , Atlanta, GA, 2177--2184. M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A. R. Sadeghi, and S. Tarkoma. 2017. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, IEEE, Atlanta, GA, 2177--2184."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212488"},{"key":"e_1_3_2_1_29_1","unstructured":"Mariella Moon. 2016. Software bug forced Nest thermostats offline. http:\/\/engt.co\/1Oskqsf  Mariella Moon. 2016. Software bug forced Nest thermostats offline. http:\/\/engt.co\/1Oskqsf"},{"key":"e_1_3_2_1_30_1","unstructured":"Lily Hay Newman. 2018. Turning an Echo Into a Spy Device Only Took Some Clever Coding. https:\/\/www.wired.com\/story\/amazon-echo-alexa-skill-spying  Lily Hay Newman. 2018. Turning an Echo Into a Spy Device Only Took Some Clever Coding. https:\/\/www.wired.com\/story\/amazon-echo-alexa-skill-spying"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899007.2899008"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2307197"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18103492"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Vitaly Shmatikov and Ming-Hsiu Wang. 2006. Timing analysis in low-latency mix networks: Attacks and defenses. 18--33 pages.   Vitaly Shmatikov and Ming-Hsiu Wang. 2006. Timing analysis in low-latency mix networks: Attacks and defenses. 18--33 pages.","DOI":"10.1007\/11863908_2"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055245.3055253"},{"volume-title":"6thsense: A context-aware sensor-based attack detector for smart devices","author":"Sikder Amit Kumar","key":"e_1_3_2_1_36_1","unstructured":"Amit Kumar Sikder , Hidayet Aksu , and A Selcuk Uluagac . 2017. 6thsense: A context-aware sensor-based attack detector for smart devices . Amit Kumar Sikder, Hidayet Aksu, and A Selcuk Uluagac. 2017. 6thsense: A context-aware sensor-based attack detector for smart devices."},{"key":"e_1_3_2_1_37_1","unstructured":"Amit Kumar Sikder Giuseppe Petracca Hidayet Aksu Trent Jaeger and A Selcuk Uluagac. 2018. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications. https:\/\/arxiv.org\/pdf\/1802.02041.pdf  Amit Kumar Sikder Giuseppe Petracca Hidayet Aksu Trent Jaeger and A Selcuk Uluagac. 2018. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications. https:\/\/arxiv.org\/pdf\/1802.02041.pdf"},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. USENIX Security","volume":"18","author":"Soltan Saleh","year":"2018","unstructured":"Saleh Soltan , Prateek Mittal , and H Vincent Poor . 2018 . BlackIoT: IoT Botnet of high wattage devices can disrupt the power grid . In Proc. USENIX Security , Vol. 18 . USENIX, Baltimore, MD, 15--32. Saleh Soltan, Prateek Mittal, and H Vincent Poor. 2018. BlackIoT: IoT Botnet of high wattage devices can disrupt the power grid. In Proc. USENIX Security, Vol. 18. USENIX, Baltimore, MD, 15--32."},{"volume-title":"2014 IEEE Conference on Communications and Network Security. IEEE","author":"Uluagac A. S.","key":"e_1_3_2_1_39_1","unstructured":"A. S. Uluagac , V. Subramanian , and R. Beyah . 2014. Sensory channel threats to Cyber Physical Systems: A wake-up call . In 2014 IEEE Conference on Communications and Network Security. IEEE , San Francisco, CA, 301--309. A. S. Uluagac, V. Subramanian, and R. Beyah. 2014. Sensory channel threats to Cyber Physical Systems: A wake-up call. In 2014 IEEE Conference on Communications and Network Security. IEEE, San Francisco, CA, 301--309."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664260"},{"key":"e_1_3_2_1_41_1","unstructured":"Mathy Vanhoef and Frank Piessens. 2015. All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. 97--112 pages.   Mathy Vanhoef and Frank Piessens. 2015. All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. 97--112 pages."},{"key":"e_1_3_2_1_42_1","unstructured":"Mathy Vanhoef and Frank Piessens. 2016. Predicting Decrypting and Abusing WPA2\/802.11 Group Keys. 673--688 pages.   Mathy Vanhoef and Frank Piessens. 2016. Predicting Decrypting and Abusing WPA2\/802.11 Group Keys. 673--688 pages."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243807"},{"key":"e_1_3_2_1_45_1","unstructured":"WikiLeaks. 2018. Vault 7: Detailed Notes regarding Samsung F8000 Smart TV networking. https:\/\/wikileaks.org\/ciav7p1\/cms\/page_13205592.html  WikiLeaks. 2018. Vault 7: Detailed Notes regarding Samsung F8000 Smart TV networking. https:\/\/wikileaks.org\/ciav7p1\/cms\/page_13205592.html"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998422"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139939"},{"key":"e_1_3_2_1_48_1","volume-title":"Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.","author":"Wright Charles V","year":"2009","unstructured":"Charles V Wright , Scott E Coull , and Fabian Monrose . 2009 . Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. Charles V Wright, Scott E Coull, and Fabian Monrose. 2009. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis."},{"key":"e_1_3_2_1_49_1","unstructured":"Kevin Wu and Brent Lagesse. 2019. Do You See What I See? Detecting Hidden Streaming Cameras Through Similarity of Simultaneous Observation. https:\/\/faculty.washington.edu\/lagesse\/publications\/SSO.pdf  Kevin Wu and Brent Lagesse. 2019. Do You See What I See? Detecting Hidden Streaming Cameras Through Similarity of Simultaneous Observation. https:\/\/faculty.washington.edu\/lagesse\/publications\/SSO.pdf"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Hiroto Yasuura Chong-Min Kyung Yongpan Liu and Youn-Long Lin. 2018. Smart sensors at the IoT frontier.  Hiroto Yasuura Chong-Min Kyung Yongpan Liu and Youn-Long Lin. 2018. Smart sensors at the IoT frontier.","DOI":"10.1007\/978-3-319-55345-0"},{"key":"e_1_3_2_1_51_1","unstructured":"Nan Zhang Soteris Demetriou Xianghang Mi Wenrui Diao Kan Yuan Peiyuan Zong Feng Qian XiaoFeng Wang Kai Chen Yuan Tian Carl A. Gunter Kehuan Zhang Patrick Tague and Yue-Hsun Lin. 2017. Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be. http:\/\/arxiv.org\/abs\/1703.09809  Nan Zhang Soteris Demetriou Xianghang Mi Wenrui Diao Kan Yuan Peiyuan Zong Feng Qian XiaoFeng Wang Kai Chen Yuan Tian Carl A. Gunter Kehuan Zhang Patrick Tague and Yue-Hsun Lin. 2017. Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be. http:\/\/arxiv.org\/abs\/1703.09809"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Miami Florida","acronym":"WiSec '19"},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3319724","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3319724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:17Z","timestamp":1750276877000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3319724"}},"subtitle":["uncovering systemic flaws in device telemetry for smart-home internet of things"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":51,"alternative-id":["10.1145\/3317549.3319724","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3319724","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}