{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:54:25Z","timestamp":1776095665147,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Research Foundation (Deutsche Forschungs Gemein-schaft - DFG)","award":["Project S2 within the CRC 1119 CROSSING."],"award-info":[{"award-number":["Project S2 within the CRC 1119 CROSSING."]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3323409","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"128-138","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":91,"title":["HomeSnitch"],"prefix":"10.1145","author":[{"given":"TJ","family":"OConnor","sequence":"first","affiliation":[{"name":"North Carolina State University"}]},{"given":"Reham","family":"Mohamed","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt"}]},{"given":"Markus","family":"Miettinen","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt"}]},{"given":"William","family":"Enck","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Bradley","family":"Reaves","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2905020"},{"key":"e_1_3_2_1_2_1","volume-title":"Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and A Selcuk Uluagac.","author":"Acar Abbas","year":"2018","unstructured":"Abbas Acar , Hossein Fereidooni , Tigist Abera , Amit Kumar Sikder , Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and A Selcuk Uluagac. 2018 . Peek-a-Boo : I see your smart home activities, even encrypted! https:\/\/arxiv.org\/pdf\/1808.02741.pdf. Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and A Selcuk Uluagac. 2018. Peek-a-Boo: I see your smart home activities, even encrypted! https:\/\/arxiv.org\/pdf\/1808.02741.pdf."},{"key":"e_1_3_2_1_3_1","volume-title":"SoK: Security Evaluation of Home-Based IoT Deployments","author":"Alrawi Omar","unstructured":"Omar Alrawi , Chaz Lever , Manos Antonakakis , and Fabian Monrose . 2019. SoK: Security Evaluation of Home-Based IoT Deployments . In IEEE Security and Privacy. IEEE, San Francisco, CA , 20--25. Omar Alrawi, Chaz Lever, Manos Antonakakis, and Fabian Monrose. 2019. SoK: Security Evaluation of Home-Based IoT Deployments. In IEEE Security and Privacy. IEEE, San Francisco, CA, 20--25."},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Computer Communications and Networks. Los Alamos National Laboratory","author":"Ayyorgun Sami","year":"2004","unstructured":"Sami Ayyorgun and Wu-chun Feng. 2004 . A Deterministic Definition of Burstiness For Network Traffic Characterization . In International Conference on Computer Communications and Networks. Los Alamos National Laboratory , Los Alamos, NM, 1--29. Sami Ayyorgun and Wu-chun Feng. 2004. A Deterministic Definition of Burstiness For Network Traffic Characterization. In International Conference on Computer Communications and Networks. Los Alamos National Laboratory, Los Alamos, NM, 1--29."},{"key":"e_1_3_2_1_5_1","volume-title":"IDIoT: Securing the Internet of Things like it's","author":"Barrera David","year":"1994","unstructured":"David Barrera , Ian Molloy , and Heqing Huang . 2017. IDIoT: Securing the Internet of Things like it's 1994 . https:\/\/arxiv.org\/abs\/1712.03623. David Barrera, Ian Molloy, and Heqing Huang. 2017. IDIoT: Securing the Internet of Things like it's 1994. https:\/\/arxiv.org\/abs\/1712.03623."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266452"},{"key":"e_1_3_2_1_7_1","unstructured":"Bitdefender. 2018. BOX 2: The new way to secure your connected home. https:\/\/www.bitdefender.com\/box\/.  Bitdefender. 2018. BOX 2: The new way to secure your connected home. https:\/\/www.bitdefender.com\/box\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"e_1_3_2_1_9_1","volume-title":"Abusing the internet of things: blackouts, freakouts, and stakeouts","author":"Dhanjani Nitesh","unstructured":"Nitesh Dhanjani . 2015. Abusing the internet of things: blackouts, freakouts, and stakeouts . O'Reilly Media, Inc. , Sebastopol, CA . Nitesh Dhanjani. 2015. Abusing the internet of things: blackouts, freakouts, and stakeouts. O'Reilly Media, Inc., Sebastopol, CA."},{"key":"e_1_3_2_1_10_1","volume-title":"International Conference on Knowledge Discovery and Data Mining (KDD). AAAI Press","author":"Ester Martin","year":"1996","unstructured":"Martin Ester , Hans-Peter Kriegel , J\u00f6rg Sander , and Xiaowei Xu . 1996 . A Density-based Algorithm for Discovering Clusters a Density-based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. http:\/\/dl.acm.org\/citation.cfm?id=3001460.3001507 . In International Conference on Knowledge Discovery and Data Mining (KDD). AAAI Press , Portland, Oregon, 226--231. Martin Ester, Hans-Peter Kriegel, J\u00f6rg Sander, and Xiaowei Xu. 1996. A Density-based Algorithm for Discovering Clusters a Density-based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. http:\/\/dl.acm.org\/citation.cfm?id=3001460.3001507. In International Conference on Knowledge Discovery and Data Mining (KDD). AAAI Press, Portland, Oregon, 226--231."},{"key":"e_1_3_2_1_11_1","unstructured":"Ramon Fontes and Christian Rothenberg. 2018. Mininet-WiFi: Emulator for Software-Defined Wireless Networks. https:\/\/github.com\/intrig-unicamp\/mininet-wifi.  Ramon Fontes and Christian Rothenberg. 2018. Mininet-WiFi: Emulator for Software-Defined Wireless Networks. https:\/\/github.com\/intrig-unicamp\/mininet-wifi."},{"key":"e_1_3_2_1_12_1","unstructured":"Thomas Fox-Brewster. 2017. Here's How The CIA Allegedly Hacked Samsung Smart TVs - And How To Protect Yourself. https:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/03\/07\/cia-wikileaks-samsung-smart-tv-hack-security.  Thomas Fox-Brewster. 2017. Here's How The CIA Allegedly Hacked Samsung Smart TVs - And How To Protect Yourself. https:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/03\/07\/cia-wikileaks-samsung-smart-tv-hack-security."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3124087.3124093"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23051"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544023"},{"key":"e_1_3_2_1_17_1","volume-title":"Recent Trends in Network Security and Applications","author":"Mahalle Parikshit","unstructured":"Parikshit Mahalle , Sachin Babar , Neeli R. Prasad , and Ramjee Prasad . 2010. Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges . In Recent Trends in Network Security and Applications , Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, and Dhinaharan Nagamalai (Eds.). Springer Berlin Heidelberg , 430--439. Parikshit Mahalle, Sachin Babar, Neeli R. Prasad, and Ramjee Prasad. 2010. Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges. In Recent Trends in Network Security and Applications, Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, and Dhinaharan Nagamalai (Eds.). Springer Berlin Heidelberg, 430--439."},{"key":"e_1_3_2_1_18_1","volume-title":"IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. In International Conference on Distributed Computing Systems (ICDCS). IEEE, IEEE","author":"Miettinen M.","unstructured":"M. Miettinen , S. Marchal , I. Hafeez , N. Asokan , A. R. Sadeghi , and S. Tarkoma . 2017 . IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. In International Conference on Distributed Computing Systems (ICDCS). IEEE, IEEE , Atlanta, GA, 2177--2184. M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A. R. Sadeghi, and S. Tarkoma. 2017. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. In International Conference on Distributed Computing Systems (ICDCS). IEEE, IEEE, Atlanta, GA, 2177--2184."},{"key":"e_1_3_2_1_19_1","unstructured":"Brian Naylor. 2016. This Doll May Be Recording What Children Say Privacy Groups Charge. https:\/\/n.pr\/2i2FtfS.  Brian Naylor. 2016. This Doll May Be Recording What Children Say Privacy Groups Charge. https:\/\/n.pr\/2i2FtfS."},{"key":"e_1_3_2_1_20_1","unstructured":"Soraya Sarhaddi Nelson. 2017. Germany Bans 'My Friend Cayla' Doll Over Spying Concerns. https:\/\/n.pr\/2kRI5do.  Soraya Sarhaddi Nelson. 2017. Germany Bans 'My Friend Cayla' Doll Over Spying Concerns. https:\/\/n.pr\/2kRI5do."},{"key":"e_1_3_2_1_21_1","unstructured":"Lily Hay Newman. 2018. Turning an Echo Into a Spy Device Only Took Some Clever Coding. https:\/\/www.wired.com\/story\/amazon-echo-alexa-skill-spying.  Lily Hay Newman. 2018. Turning an Echo Into a Spy Device Only Took Some Clever Coding. https:\/\/www.wired.com\/story\/amazon-echo-alexa-skill-spying."},{"key":"e_1_3_2_1_22_1","volume-title":"N Asokan, and Ahmad-Reza Sadeghi.","author":"Nguyen Thien Duc","year":"2018","unstructured":"Thien Duc Nguyen , Samuel Marchal , Markus Miettinen , Minh Hoang Dang , N Asokan, and Ahmad-Reza Sadeghi. 2018 . D\u00cfoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices . https:\/\/arxiv.org\/pdf\/1804.07474.pdf. Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Minh Hoang Dang, N Asokan, and Ahmad-Reza Sadeghi. 2018. D\u00cfoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices. https:\/\/arxiv.org\/pdf\/1804.07474.pdf."},{"key":"e_1_3_2_1_23_1","unstructured":"Norton. 2018. Core Secure WiFi Router. https:\/\/us.norton.com\/core.  Norton. 2018. Core Secure WiFi Router. https:\/\/us.norton.com\/core."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185474"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319724"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140277.1140305"},{"key":"e_1_3_2_1_27_1","volume-title":"Symposium on Operating System Design and Implementation (OSDI). USENIX Association","author":"Olshefski David P.","unstructured":"David P. Olshefski , Jason Nieh , and Erich M. Nahum . 2004. ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams . In Symposium on Operating System Design and Implementation (OSDI). USENIX Association , San Francisco, California, 333--346. David P. Olshefski, Jason Nieh, and Erich M. Nahum. 2004. ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams. In Symposium on Operating System Design and Implementation (OSDI). USENIX Association, San Francisco, California, 333--346."},{"key":"e_1_3_2_1_28_1","volume-title":"IoTPOT: Analysing the Rise of IoT Compromises. In Conference on Offensive Technologies (WOOT). USENIX Association, Washington, D.C., 9--9.","author":"Pa Pa Yin Minn","year":"2015","unstructured":"Yin Minn Pa Pa , Shogo Suzuki , Katsunari Yoshioka , Tsutomu Matsumoto , Takahiro Kasama , and Christian Rossow . 2015 . IoTPOT: Analysing the Rise of IoT Compromises. In Conference on Offensive Technologies (WOOT). USENIX Association, Washington, D.C., 9--9. Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, and Christian Rossow. 2015. IoTPOT: Analysing the Rise of IoT Compromises. In Conference on Offensive Technologies (WOOT). USENIX Association, Washington, D.C., 9--9."},{"key":"e_1_3_2_1_29_1","volume-title":"Scikit-learn: Machine Learning in Python. In J. Mach. Learn. Res.","author":"Pedregosa Fabian","year":"2011","unstructured":"Fabian Pedregosa , Ga\u00ebl Varoquaux , Alexandre Gramfort , Vincent Michel , Bertrand Thirion , Olivier Grisel , Mathieu Blondel , Peter Prettenhofer , Ron Weiss , Vincent Dubourg , Jake Vanderplas , Alexandre Passos , David Cournapeau , Matthieu Brucher , Matthieu Perrot , and Edouard Duchesnay . 2011 . Scikit-learn: Machine Learning in Python. In J. Mach. Learn. Res. , Vol. 12 . JMLR. org, 2825--2830. Fabian Pedregosa, Ga\u00ebl Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, Jake Vanderplas, Alexandre Passos, David Cournapeau, Matthieu Brucher, Matthieu Perrot, and Edouard Duchesnay. 2011. Scikit-learn: Machine Learning in Python. In J. Mach. Learn. Res., Vol. 12. JMLR.org, 2825--2830."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"e_1_3_2_1_31_1","unstructured":"Helen Rebecca Schindler Jonathan Cave Neil Robinson Veronika Horvath Petal Hackett Salil Gunashekar Maarten Botterman Simon Forge and Hans Graux. 2012. Examining Europe's Policy Options to Foster Development of the 'Internet of Things'. http:\/\/www.rand.org\/pubs\/research_reports\/RR356.html.  Helen Rebecca Schindler Jonathan Cave Neil Robinson Veronika Horvath Petal Hackett Salil Gunashekar Maarten Botterman Simon Forge and Hans Graux. 2012. Examining Europe's Policy Options to Foster Development of the 'Internet of Things'. http:\/\/www.rand.org\/pubs\/research_reports\/RR356.html."},{"key":"e_1_3_2_1_32_1","volume-title":"Conference on Computer Communications Workshops (INFOCOM WKSHPS). 559--564","author":"Sivanathan A.","unstructured":"A. Sivanathan , D. Sherratt , H. H. Gharakheili , A. Radford , C. Wijenayake , A. Vishwanath , and V. Sivaraman . 2017. Characterizing and classifying IoT traffic in smart cities and campuses . In Conference on Computer Communications Workshops (INFOCOM WKSHPS). 559--564 . A. Sivanathan, D. Sherratt, H. H. Gharakheili, A. Radford, C. Wijenayake, A. Vishwanath, and V. Sivaraman. 2017. Characterizing and classifying IoT traffic in smart cities and campuses. In Conference on Computer Communications Workshops (INFOCOM WKSHPS). 559--564."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939925"},{"key":"e_1_3_2_1_34_1","unstructured":"ubomir Stroetmann and Tobias Esser. 2017. Reverse Engineering the TP-Link HS110. https:\/\/www.softscheck.com\/en\/reverse-engineering-tp-link-hs110\/.  ubomir Stroetmann and Tobias Esser. 2017. Reverse Engineering the TP-Link HS110. https:\/\/www.softscheck.com\/en\/reverse-engineering-tp-link-hs110\/."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01645-5_6"},{"key":"e_1_3_2_1_36_1","volume-title":"Omnia: More than just a router. https:\/\/omnia.turris.cz\/en\/.","year":"2019","unstructured":"Turris. 2019 . Omnia: More than just a router. https:\/\/omnia.turris.cz\/en\/. Turris. 2019. Omnia: More than just a router. https:\/\/omnia.turris.cz\/en\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858556"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243820"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"X. Zhang R. Adhikari M. Pipattanasomporn M. Kuzlu and S. Rahman. 2016. Deploying IoT devices to make buildings smart: Performance evaluation and deployment experience. In World Forum on Internet of Things (WF-IoT). IEEE 530--535.  X. Zhang R. Adhikari M. Pipattanasomporn M. Kuzlu and S. Rahman. 2016. Deploying IoT devices to make buildings smart: Performance evaluation and deployment experience. In World Forum on Internet of Things (WF-IoT). IEEE 530--535.","DOI":"10.1109\/WF-IoT.2016.7845464"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Miami Florida","acronym":"WiSec '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323409","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3323409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323409"}},"subtitle":["behavior transparency and control for smart home IoT devices"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":40,"alternative-id":["10.1145\/3317549.3323409","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3323409","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}