{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:28:29Z","timestamp":1773844109406,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3323413","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"215-220","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Hestia"],"prefix":"10.1145","author":[{"given":"Sanket","family":"Goutam","sequence":"first","affiliation":[{"name":"North Carolina State University"}]},{"given":"William","family":"Enck","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Bradley","family":"Reaves","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229568"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"e_1_3_2_1_3_1","volume-title":"Understanding the Mirai Botnet. In USENIX Security Symposium.","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis , Tim April , Michael Bailey , Matt Bernhard , Elie Bursztein , Jaime Cochran , Zakir Durumeric , J. Alex Halderman , Luca Invernizzi , Michalis Kallitsis , Deepak Kumar , Chaz Lever , Zane Ma , Joshua Mason , Damian Menscher , Chad Seaman , Nick Sullivan , Kurt Thomas , and Yi Zhou . 2017 . Understanding the Mirai Botnet. In USENIX Security Symposium. Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In USENIX Security Symposium."},{"key":"e_1_3_2_1_4_1","volume-title":"Standardizing IoT Network Security Policy Enforcement. In Workshop on Decentralized IoT Security and Standards (DISS)","volume":"2018","author":"Barrera David","year":"2018","unstructured":"David Barrera , Ian Molloy , and Heqing Huang . 2018 . Standardizing IoT Network Security Policy Enforcement. In Workshop on Decentralized IoT Security and Standards (DISS) , Vol. 2018 . 6. David Barrera, Ian Molloy, and Heqing Huang. 2018. Standardizing IoT Network Security Policy Enforcement. In Workshop on Decentralized IoT Security and Standards (DISS), Vol. 2018. 6."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266452"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098251"},{"key":"e_1_3_2_1_7_1","volume-title":"Abusing the internet of things: Blackouts, freakouts, and stakeouts","author":"Dhanjani Nitesh","unstructured":"Nitesh Dhanjani . 2015. Abusing the internet of things: Blackouts, freakouts, and stakeouts . O'Reilly Media, Inc. Nitesh Dhanjani. 2015. Abusing the internet of things: Blackouts, freakouts, and stakeouts. O'Reilly Media, Inc."},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved","author":"Dickson Ben","year":"2019","unstructured":"Ben Dickson . 2019 . More Smart home devices vulnerable, McAfee researchers find . Retrieved March 15, 2019 from https:\/\/www.dailydot.com\/debug\/smart-home-mcafee-attacks Ben Dickson. 2019. More Smart home devices vulnerable, McAfee researchers find. Retrieved March 15, 2019 from https:\/\/www.dailydot.com\/debug\/smart-home-mcafee-attacks"},{"key":"e_1_3_2_1_9_1","volume-title":"What are the current projection features for f-secure sense? Retrieved","year":"2019","unstructured":"F-Secure. 2018. What are the current projection features for f-secure sense? Retrieved January 5, 2019 from https:\/\/community.f-secure.com\/t5\/F-Secure-SENSE\/What-are-the-current-security\/ta-p\/82972 F-Secure. 2018. What are the current projection features for f-secure sense? Retrieved January 5, 2019 from https:\/\/community.f-secure.com\/t5\/F-Secure-SENSE\/What-are-the-current-security\/ta-p\/82972"},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved","author":"Greenberg Andy","year":"2017","unstructured":"Andy Greenberg . 2017 . Hack Brief: 'Devil's Ivy' vulnerability could afflict millions of IoT devices . Retrieved March 15, 2019 from https:\/\/www.wired.com\/story\/devils-ivy-iot-vulnerability\/ Andy Greenberg. 2017. Hack Brief: 'Devil's Ivy' vulnerability could afflict millions of IoT devices. Retrieved March 15, 2019 from https:\/\/www.wired.com\/story\/devils-ivy-iot-vulnerability\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3124087.3124093"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2959071"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS).","author":"Jia Yunhan Jack","year":"2017","unstructured":"Yunhan Jack Jia , Qi Alfred Chen , Shiqi Wang , Amir Rahmati , Earlence Fernandes , Zhuoqing Morley Mao , Atul Prakash , and Shanghai JiaoTong Unviersity . 2017 . ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms .. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS). Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash, and Shanghai JiaoTong Unviersity. 2017. ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Eliot Lear Ralph Droms and Dan Romascanu. 2018. Manufacturer Usage Description Specification. Internet-Draft. IETF Secretariat. http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-opsawg-mud-25.txt  Eliot Lear Ralph Droms and Dan Romascanu. 2018. Manufacturer Usage Description Specification. Internet-Draft. IETF Secretariat. http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-opsawg-mud-25.txt","DOI":"10.17487\/RFC8520"},{"key":"e_1_3_2_1_15_1","volume-title":"Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 2177--2184","author":"Miettinen Markus","year":"2017","unstructured":"Markus Miettinen , Samuel Marchal , Ibbad Hafeez , N Asokan , Ahmad-Reza Sadeghi , and Sasu Tarkoma . 2017 . IoT Sentinel: Automated device-type identification for security enforcement in IoT . In Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 2177--2184 . Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N Asokan, Ahmad-Reza Sadeghi, and Sasu Tarkoma. 2017. IoT Sentinel: Automated device-type identification for security enforcement in IoT. In Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 2177--2184."},{"key":"e_1_3_2_1_16_1","volume-title":"Retrieved","author":"Newman Lily Hay","year":"2018","unstructured":"Lily Hay Newman . 2018 . An Elaborate Hack Shows How Much Damage IoT Bugs Can Do . Retrieved March 15, 2019 from https:\/\/www.wired.com\/story\/elaborate-hack-shows-damage-iot-bugs-can-do\/ Lily Hay Newman. 2018. An Elaborate Hack Shows How Much Damage IoT Bugs Can Do. Retrieved March 15, 2019 from https:\/\/www.wired.com\/story\/elaborate-hack-shows-damage-iot-bugs-can-do\/"},{"key":"e_1_3_2_1_17_1","volume-title":"Belkin Netcam HD UPnP Command Injection - Github. Retrieved","year":"2019","unstructured":"phikshun. 2018. Belkin Netcam HD UPnP Command Injection - Github. Retrieved January 5, 2019 from https:\/\/gist.github.com\/phikshun\/9984624 phikshun. 2018. Belkin Netcam HD UPnP Command Injection - Github. Retrieved January 5, 2019 from https:\/\/gist.github.com\/phikshun\/9984624"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243817"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939925"},{"key":"e_1_3_2_1_21_1","volume-title":"SmartHome Market penetration in US. Retrieved","year":"2019","unstructured":"Statista. 2018. SmartHome Market penetration in US. Retrieved January 2, 2019 from https:\/\/www.statista.com\/outlook\/279\/109\/smart-home\/united-states Statista. 2018. SmartHome Market penetration in US. Retrieved January 2, 2019 from https:\/\/www.statista.com\/outlook\/279\/109\/smart-home\/united-states"},{"key":"e_1_3_2_1_22_1","volume-title":"Retrieved","author":"Wei Wang","year":"2018","unstructured":"Wang Wei . 2018 . Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer . Retrieved March 16, 2019 from https:\/\/thehackernews.com\/2018\/04\/iot-hacking-thermometer.html Wang Wei. 2018. Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer. Retrieved March 16, 2019 from https:\/\/thehackernews.com\/2018\/04\/iot-hacking-thermometer.html"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Miami Florida","acronym":"WiSec '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323413","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3323413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323413"}},"subtitle":["simple least privilege network policies for smart homes"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":23,"alternative-id":["10.1145\/3317549.3323413","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3323413","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}