{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:31:08Z","timestamp":1776889868578,"version":"3.51.2"},"reference-count":115,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T00:00:00Z","timestamp":1598745600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1564105"],"award-info":[{"award-number":["CNS-1564105"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-13-2-0045"],"award-info":[{"award-number":["W911NF-13-2-0045"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]},{"name":"University of Washington Tech Policy Lab and the MacArthur Foundation."}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2020,7,31]]},"abstract":"<jats:p>Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive\u2014new applications are being used in nearly every conceivable environment, which leads to the adoption of device-based interaction and automation. However, IoT has also raised issues about the security and privacy of these digitally augmented spaces. Program analysis is crucial in identifying those issues, yet the application and scope of program analysis in IoT remains largely unexplored by the technical community. In this article, we study privacy and security issues in IoT that require program-analysis techniques with an emphasis on identified attacks against these systems and defenses implemented so far. Based on a study of five IoT programming platforms, we identify the key insights that result from research efforts in both the program analysis and security communities and relate the efficacy of program-analysis techniques to security and privacy issues. We conclude by studying recent IoT analysis systems and exploring their implementations. Through these explorations, we highlight key challenges and opportunities in calibrating for the environments in which IoT systems will be used.<\/jats:p>","DOI":"10.1145\/3333501","type":"journal-article","created":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T12:47:00Z","timestamp":1567514820000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":93,"title":["Program Analysis of Commodity IoT Applications for Security and Privacy"],"prefix":"10.1145","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7362-8905","authenticated-orcid":false,"given":"Z. Berkay","family":"Celik","sequence":"first","affiliation":[{"name":"Penn State University"}]},{"given":"Earlence","family":"Fernandes","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Eric","family":"Pauley","sequence":"additional","affiliation":[{"name":"Penn State University, PA"}]},{"given":"Gang","family":"Tan","sequence":"additional","affiliation":[{"name":"Penn State University, PA"}]},{"given":"Patrick","family":"McDaniel","sequence":"additional","affiliation":[{"name":"Penn State University, PA"}]}],"member":"320","published-online":{"date-parts":[[2019,8,30]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"02741","article-title":"Peek-a-Boo: I see your smart home activities, even encrypted! Retrieved from","volume":"1808","author":"Acar Abbas","year":"2018","unstructured":"Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and A Selcuk Uluagac. 2018. Peek-a-Boo: I see your smart home activities, even encrypted! Retrieved from: Arxiv Preprint:1808.02741.","journal-title":"Arxiv Preprint"},{"key":"e_1_2_1_2_1","unstructured":"SmartThings Inc. 2018. Samsung SmartThings add a little smartness to your things. Retrieved from: https:\/\/www.smartthings.com\/."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389098"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/6448"},{"key":"e_1_2_1_5_1","volume-title":"IEEE Symposium on Security and Privacy (SP\u201919)","author":"Alrawi O.","unstructured":"O. Alrawi, C. Lever, M. Antonakakis, and F. Monrose. 2019. SoK: Security evaluation of home-based IoT deployments. In IEEE Symposium on Security and Privacy (SP\u201919)."},{"key":"e_1_2_1_6_1","unstructured":"Android Things. 2018. Retrieved from: https:\/\/developer.android.com\/things\/."},{"key":"e_1_2_1_7_1","unstructured":"IFTTT Santa Detector App. 2018. Retrieved from: https:\/\/ifttt.com\/applets\/170037p-santa-detector."},{"key":"e_1_2_1_8_1","unstructured":"Apple\u2019s HomeKit. 2018. Retrieved from: https:\/\/www.apple.com\/ios\/home\/."},{"key":"e_1_2_1_9_1","unstructured":"Apple\u2019s HomeKit App Market. 2018. Retrieved from: https:\/\/support.apple.com\/en-us\/HT204893."},{"key":"e_1_2_1_10_1","unstructured":"Android Things Official Apps. 2018. Retrieved from: https:\/\/github.com\/androidthings."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_2_1_12_1","volume-title":"Abbas Acar, and A. Selcuk Uluagac.","author":"Babun Leonardo","year":"2018","unstructured":"Leonardo Babun, Amit Kumar Sikder, Abbas Acar, and A. Selcuk Uluagac. 2018. IoTDots: A Digital Forensics Framework for Smart Environments. Retrieved from: arXiv:arXiv:1809.00745."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259056"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243841"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259052"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985995"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the International Conference on Financial Cryptography and Data Security.","author":"Carter Patrick","year":"2016","unstructured":"Patrick Carter, Collin Mulliner, Martina Lindorfer, William Robertson, and Engin Kirda. 2016. CuriousDroid: Automated user interface interaction for Android application analysis sandboxes. In Proceedings of the International Conference on Financial Cryptography and Data Security."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277329"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277355.3277370"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23326"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23159"},{"key":"e_1_2_1_23_1","first-page":"02125","article-title":"Cross-app threats in smart homes: Categorization, detection and handling. Retrieved from","volume":"1808","author":"Chi Haotian","year":"2018","unstructured":"Haotian Chi, Qiang Zeng, Xiaojiang Du, and Jiaping Yu. 2018. Cross-app threats in smart homes: Categorization, detection and handling. Retrieved from: Arxiv Preprint:1808.02125.","journal-title":"Arxiv Preprint"},{"key":"e_1_2_1_24_1","first-page":"07217","article-title":"Automated test input generation for Android: Are we there yet? Retrieved from","volume":"1503","author":"Choudhary Shauvik Roy","year":"2015","unstructured":"Shauvik Roy Choudhary, Alessandra Gorla, and Alessandro Orso. 2015. Automated test input generation for Android: Are we there yet? Retrieved from: Arxiv Preprint:1503.07217.","journal-title":"Arxiv Preprint"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/648063.747438"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSURV.2016.7486327"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2016.7568309"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398377"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243865"},{"key":"e_1_2_1_31_1","unstructured":"Android Sensor API Documentation. 2018. Retrieved from: https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_overview.html."},{"key":"e_1_2_1_32_1","unstructured":"Eclipse Kura Documentation. 2018. Retrieved from: http:\/\/eclipse.github.io\/kura\/."},{"key":"e_1_2_1_33_1","unstructured":"Google Fit Developer Documentation. 2018. Retrieved from: https:\/\/developers.google.com\/fit\/."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480361.2371419"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the Workshop on the Economics of Information Security (WEIS\u201917)","author":"Eireann Leverett","year":"2017","unstructured":"Leverett Eireann, Richard Clayton, and Ross Anderson. 2017. Standardisation and certification of the internet of things. In Proceedings of the Workshop on the Economics of Information Security (WEIS\u201917)."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the Workshop on Dynamic Analysis.","author":"Ernst Michael D.","year":"2003","unstructured":"Michael D. Ernst. 2003. Static and dynamic analysis: Synergy and duality. In Proceedings of the Workshop on Dynamic Analysis."},{"key":"e_1_2_1_38_1","unstructured":"UI\/Application Exerciser. 2018. Retrieved from: https:\/\/developer.android.com\/studio\/test\/monkey."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241136"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151346"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23119"},{"key":"e_1_2_1_43_1","volume-title":"Open Source Automation Software for Home","year":"2018","unstructured":"OpenHAB: Open Source Automation Software for Home. 2018. Retrieved from: https:\/\/www.openhab.org\/."},{"key":"e_1_2_1_44_1","unstructured":"SmartThings Community Forum for Third-party Apps. 2018. Retrieved from: https:\/\/community.smartthings.com\/."},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the IEEE International Conference on Computer Communications (INFOCOM\u201913)","author":"Gu B.","unstructured":"B. Gu, X. Li, G. Li, A. C. Champion, Z. Chen, F. Qin, and D. Xuan. 2013. D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM\u201913)."},{"key":"e_1_2_1_46_1","unstructured":"SmartThings Code Review Guidelines and Best Practices. 2018. Retrieved from: http:\/\/docs.smartthings.com\/en\/latest\/code-review-guidelines.html."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803226"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277223"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"e_1_2_1_50_1","unstructured":"IFTTT (if this then that). 2018. Retrieved from: https:\/\/ifttt.com\/."},{"key":"e_1_2_1_51_1","unstructured":"PTC Industrial IoT. 2018. Retrieved from: https:\/\/www.ptc.com\/en\/about."},{"key":"e_1_2_1_52_1","volume-title":"PTC. Accessed on","author":"Jablokow Alex","year":"2015","unstructured":"Alex Jablokow. 2015. How the IoT helps keep oil and gas pipelines safe, PTC. Accessed on Feb. 15, 2019 from https:\/\/www.ptc.com\/en\/product-lifecycle-report\/how-the-iot-helps-keep-oil-and-gas-pipelines-safe."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592434.1592438"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23051"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"e_1_2_1_56_1","volume-title":"Justin Lyon, and Rajiv Ranjan.","author":"Kecskemeti Gabor","year":"2017","unstructured":"Gabor Kecskemeti, Giuliano Casale, Devki Nandan Jha, Justin Lyon, and Rajiv Ranjan. 2017. Modelling and simulation challenges in internet of things. IEEE Cloud Comput. 4, 1 (2017)."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(15)30081-7"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.09.005"},{"key":"e_1_2_1_59_1","volume-title":"Proceedings of the Cetus Users and Compiler Infrastructure Workshop.","author":"Lam Patrick","year":"2011","unstructured":"Patrick Lam, Eric Bodden, Ondrej Lhot\u00e1k, and Laurie Hendren. 2011. The Soot Framework for Java program analysis: A retrospective. In Proceedings of the Cetus Users and Compiler Infrastructure Workshop."},{"key":"e_1_2_1_60_1","unstructured":"Chris Lattner. 2012. LLVM Compiler Infrastructure Project. The architecture of open source applications PTC. Accessed on Feb. 15 2019 from https:\/\/www.aosabook.org\/en\/llvm.html."},{"key":"e_1_2_1_61_1","volume-title":"Are we safe in the Internet of Things? International Organization for Standardization (September","author":"Lazarte Maria","year":"2016","unstructured":"Maria Lazarte. 2016. Are we safe in the Internet of Things? International Organization for Standardization (September 2016). Retrieved from: https:\/\/www.iso.org\/news\/2016\/09\/Ref2113.html."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/2830865.2830878"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078864"},{"key":"e_1_2_1_64_1","first-page":"04282","article-title":"Incentivized delivery network of IoT software updates based on trustless proof-of-distribution. Retrieved from","volume":"1805","author":"Leiba Oded","year":"2018","unstructured":"Oded Leiba, Yechiav Yitzchak, Ron Bitton, Asaf Nadler, and Asaf Shabtai. 2018. Incentivized delivery network of IoT software updates based on trustless proof-of-distribution. Retrieved from: Arxiv Preprint:1805.04282.","journal-title":"Arxiv Preprint"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765931.1765948"},{"key":"e_1_2_1_66_1","unstructured":"Watson Android libraries for Android application analysis. 2018. Retrieved from: https:\/\/github.com\/wala\/WALA."},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931054"},{"key":"e_1_2_1_68_1","unstructured":"IFTTT Platform Size Metrics. 2018. Retrieved from: https:\/\/platform.ifttt.com\/pricing."},{"key":"e_1_2_1_69_1","unstructured":"IoTBench A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps. 2018. Retrieved from: https:\/\/github.com\/IoTBench."},{"key":"e_1_2_1_70_1","unstructured":"Nicholas Nethercote. 2004. Dynamic Binary Analysis and Instrumentation. Technical Report. University of Cambridge Computer Laboratory."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281440"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.5555\/1965094"},{"key":"e_1_2_1_73_1","unstructured":"GroovyCodeVisitor An Implementation of the Groovy Visitor Patterns. 2018. Retrieved from: http:\/\/docs.groovy-lang.org\/docs."},{"key":"e_1_2_1_74_1","volume-title":"Proceedings of the USENIX LASER Workshop.","author":"Oluwafemi Temitope","year":"2013","unstructured":"Temitope Oluwafemi, Tadayoshi Kohno, Sidhant Gupta, and Shwetak Patel. 2013. Experimental security analyses of non-networked compact fluorescent lamps: A case study of home automation security. In Proceedings of the USENIX LASER Workshop."},{"key":"e_1_2_1_75_1","unstructured":"Mike Orcutt. 2016. Security experts warn congress that the internet of things could kill people. MIT Technol. Rev. (2016). Accessed on Feb. 15 2019 from https:\/\/www.technologyreview.com\/s\/603015\/security-experts-warn-congress-that-the-internet-of-things-could-kill-people."},{"key":"e_1_2_1_76_1","unstructured":"OpenHAB IoT App Market (Eclipse Market Place). 2018. Retrieved from: https:\/\/github.com\/openhab\/openhab1-addons\/wiki\/Samples-Rules."},{"key":"e_1_2_1_77_1","unstructured":"OpenHAB IoT App Market (Eclipse Market Place). 2018. Retrieved from: http:\/\/docs.openhab.org\/eclipseiotmarket."},{"key":"e_1_2_1_78_1","unstructured":"Microsoft Flow Automate processes and tasks. 2018. Retrieved from: https:\/\/flow.microsoft.com\/."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fcij.2017.02.001"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996358"},{"key":"e_1_2_1_82_1","unstructured":"SmartThings Official App Repository. 2018. Retrieved from: https:\/\/github.com\/SmartThingsCommunity."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"e_1_2_1_84_1","volume-title":"Proceedings of the IEEE European Symposium on Security and Privacy (Euro S8P\u201916)","author":"Ronen E.","unstructured":"E. Ronen and A. Shamir. 2016. Extended functionality attacks on IoT devices: The case of smart lights. In Proceedings of the IEEE European Symposium on Security and Privacy (Euro S8P\u201916)."},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"e_1_2_1_87_1","unstructured":"SmartThings Web service App Overview. 2017. Retrieved from: http:\/\/docs.smartthings.com\/en\/latest\/smartapp-web-services-developers-guide\/overview.html."},{"key":"e_1_2_1_88_1","unstructured":"M. Sharir and A. Pnueli. 1981. Two Approaches to Inter-procedural Dataflow Analysis. Computer Science Department New York University."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"e_1_2_1_90_1","unstructured":"SmartThings Official Developer Documentation. 2018. Retrieved from: http:\/\/docs.smartthings.com."},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277206"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.5555\/2554511.2554523"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052709"},{"key":"e_1_2_1_94_1","volume-title":"How the internet of things could be fatal. Retrieved from: CNBC (March","author":"Taylor Harriet","year":"2016","unstructured":"Harriet Taylor. 2016. How the internet of things could be fatal. Retrieved from: CNBC (March 2016). https:\/\/www.cnbc.com\/2016\/03\/04\/how-the-internet-of-things-could-be-fatal.html."},{"key":"e_1_2_1_95_1","volume-title":"How the 450 providers stack up","author":"Comparison T Platform","year":"2018","unstructured":"IoT Platform Comparison: How the 450 providers stack up. 2018. Retrieved from: https:\/\/iot-analytics.com\/iot-platform-comparison-how-providers-stack-up\/."},{"key":"e_1_2_1_96_1","unstructured":"The Internet of Things with AWS. 2018. Retrieved from: https:\/\/aws.amazon.com\/iot\/."},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241219"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.5555\/781995.782008"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.5555\/3154630.3154673"},{"key":"e_1_2_1_100_1","unstructured":"G. Veerendra. 2016. Hacking Internet of Things (IoT): A Case Study on DTH Vulnerabilities. Technical Report. SecPod."},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666630"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23282"},{"key":"e_1_2_1_103_1","volume-title":"Stranger hacks into baby monitor and screams at child. Time Magazine (April","author":"Waxman Olivia","year":"2014","unstructured":"Olivia Waxman. 2014. Stranger hacks into baby monitor and screams at child. Time Magazine (April 2014)."},{"key":"e_1_2_1_104_1","unstructured":"SmartThings web-based simulator for testing SmartThings apps with virtual devices. 2018. Retrieved from: https:\/\/goo.gl\/rfTB7e."},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.5555\/800078.802557"},{"key":"e_1_2_1_106_1","unstructured":"Zapier Automate Workflows. 2018. Retrieved from: https:\/\/zapier.com\/."},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.5555\/2691365.2691450"},{"key":"e_1_2_1_108_1","article-title":"A health-IoT platform based on the integration of intelligent packaging, unobtrusive bio-sensor, and intelligent medicine box","volume":"10","author":"Yang Geng","year":"2014","unstructured":"Geng Yang, Li Xie, Matti M\u00e4ntysalo, Xiaolin Zhou, Zhibo Pang, Li Da Xu, Sharon Kao-Walter, Qiang Chen, and Li-Rong Zheng. 2014. A health-IoT platform based on the integration of intelligent packaging, unobtrusive bio-sensor, and intelligent medicine box. IEEE Trans. Industr. Inform. 10, 4 (2014).","journal-title":"IEEE Trans. Industr. Inform."},{"key":"e_1_2_1_109_1","unstructured":"Apiant Connect your apps automate your business. 2018. Retrieved from: https:\/\/apiant.com\/."},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"e_1_2_1_113_1","first-page":"09809","article-title":"Understanding IoT security through the data crystal ball: Where we are now and where we are going to be. Retrieved from","volume":"1703","author":"Zhang Nan","year":"2017","unstructured":"Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian et al. 2017. Understanding IoT security through the data crystal ball: Where we are now and where we are going to be. Retrieved from: Arxiv Preprint:1703.09809.","journal-title":"Arxiv Preprint"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/1945023.1945039"},{"key":"e_1_2_1_115_1","volume-title":"Oscar Garcia Morchon, and Klaus Wehrle","author":"Ziegeldorf Jan Henrik","year":"2014","unstructured":"Jan Henrik Ziegeldorf, Oscar Garcia Morchon, and Klaus Wehrle. 2014. Privacy in the Internet of Things: Threats and challenges. Sec. Commun. Netw. (2014)."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3333501","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3333501","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3333501","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T13:25:31Z","timestamp":1750857931000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3333501"}},"subtitle":["Challenges and Opportunities"],"short-title":[],"issued":{"date-parts":[[2019,8,30]]},"references-count":115,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,7,31]]}},"alternative-id":["10.1145\/3333501"],"URL":"https:\/\/doi.org\/10.1145\/3333501","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,30]]},"assertion":[{"value":"2018-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-05-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-08-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}