{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T18:52:25Z","timestamp":1769107945374,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100015089","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-16-1-2913, N00014-18-1-2037"],"award-info":[{"award-number":["N00014-16-1-2913, N00014-18-1-2037"]}],"id":[{"id":"10.13039\/100015089","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1613023, CNS-1703598, CNS-1763172, CNS-2006437, CNS-2007737, OAC-1740210, CNS-1703598, CCF-2006948, CCF-1837120"],"award-info":[{"award-number":["CNS-1613023, CNS-1703598, CNS-1763172, CNS-2006437, CNS-2007737, OAC-1740210, CNS-1703598, CCF-2006948, CCF-1837120"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409682","type":"proceedings-article","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:45:01Z","timestamp":1607647501000},"page":"1215-1227","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Understanding and automatically detecting conflicting interactions between smart home IoT applications"],"prefix":"10.1145","author":[{"given":"Rahmadi","family":"Trimananda","sequence":"first","affiliation":[{"name":"University of California at Irvine, USA"}]},{"given":"Seyed Amir Hossein","family":"Aqajari","sequence":"additional","affiliation":[{"name":"University of California at Irvine, USA"}]},{"given":"Jason","family":"Chuang","sequence":"additional","affiliation":[{"name":"University of California at Irvine, USA"}]},{"given":"Brian","family":"Demsky","sequence":"additional","affiliation":[{"name":"University of California at Irvine, USA"}]},{"given":"Guoqing Harry","family":"Xu","sequence":"additional","affiliation":[{"name":"University of California at Los Angeles, USA"}]},{"given":"Shan","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Chicago, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2013. Forgiving Security. https:\/\/github.com\/imbrianj\/forgiving_security\/blob\/ master\/forgiving_security.groovy.  2013. Forgiving Security. https:\/\/github.com\/imbrianj\/forgiving_security\/blob\/ master\/forgiving_security.groovy."},{"key":"e_1_3_2_2_2_1","unstructured":"2014. Auto Humidity Vent. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/jonathan-a\/auto-humidity-vent.src\/auto-humidity-vent.groovy.  2014. Auto Humidity Vent. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/jonathan-a\/auto-humidity-vent.src\/auto-humidity-vent.groovy."},{"key":"e_1_3_2_2_3_1","unstructured":"2014. Close The Valve. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/close-the-valve.src\/close-the-valve.groovy.  2014. Close The Valve. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/close-the-valve.src\/close-the-valve.groovy."},{"key":"e_1_3_2_2_4_1","unstructured":"2014. Hello Home Phrase Director. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/tslagle13\/hello-home-phrase-director.src\/hello-home-phrasedirector.groovy.  2014. Hello Home Phrase Director. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/tslagle13\/hello-home-phrase-director.src\/hello-home-phrasedirector.groovy."},{"key":"e_1_3_2_2_5_1","unstructured":"2014. Lock it at a specific time. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/user8798\/lock-it-at-a-specific-time.src\/lock-it-at-a-specifictime.groovy.  2014. Lock it at a specific time. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/user8798\/lock-it-at-a-specific-time.src\/lock-it-at-a-specifictime.groovy."},{"key":"e_1_3_2_2_6_1","unstructured":"2014. Sprayer Controller 2. https:\/\/github.com\/erocm123\/SmartThingsPublic1\/blob\/master\/smartapps\/sprayercontroller\/sprayer-controller-2.src\/sprayercontroller-2.groovy.  2014. Sprayer Controller 2. https:\/\/github.com\/erocm123\/SmartThingsPublic1\/blob\/master\/smartapps\/sprayercontroller\/sprayer-controller-2.src\/sprayercontroller-2.groovy."},{"key":"e_1_3_2_2_7_1","unstructured":"2015. Big Turn OFF. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/big-turn-of.src\/big-turn-of.groovy.  2015. Big Turn OFF. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/big-turn-of.src\/big-turn-of.groovy."},{"key":"e_1_3_2_2_8_1","unstructured":"2015. Big Turn ON. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/big-turn-on. src\/big-turn-on.groovy.  2015. Big Turn ON. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/big-turn-on. src\/big-turn-on.groovy."},{"key":"e_1_3_2_2_9_1","unstructured":"2015. Bon Voyage. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/bon-voyage.src\/bon-voyage.groovy.  2015. Bon Voyage. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/bon-voyage.src\/bon-voyage.groovy."},{"key":"e_1_3_2_2_10_1","unstructured":"2015. Good Night. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/good-night.src\/good-night.groovy.  2015. Good Night. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/good-night.src\/good-night.groovy."},{"key":"e_1_3_2_2_11_1","unstructured":"2015. Greetings Earthling. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/greetings-earthling.src\/greetings-earthling.groovy.  2015. Greetings Earthling. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/greetings-earthling.src\/greetings-earthling.groovy."},{"key":"e_1_3_2_2_12_1","unstructured":"2015. Keep Me Cozy. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/keep-me-cozy.src\/keep-me-cozy.groovy.  2015. Keep Me Cozy. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/keep-me-cozy.src\/keep-me-cozy.groovy."},{"key":"e_1_3_2_2_13_1","unstructured":"2015. Light Up the Night. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/light-up-the-night.src\/light-up-the-night.groovy.  2015. Light Up the Night. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/light-up-the-night.src\/light-up-the-night.groovy."},{"key":"e_1_3_2_2_14_1","unstructured":"2015. Lock It When I Leave. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/lock-it-when-i-leave.src\/lock-it-when-i-leave.groovy.  2015. Lock It When I Leave. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/lock-it-when-i-leave.src\/lock-it-when-i-leave.groovy."},{"key":"e_1_3_2_2_15_1","unstructured":"2015. Smart Security. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/master\/smartapps\/smartthings\/smart-security. src\/smart-security.groovy.  2015. Smart Security. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/master\/smartapps\/smartthings\/smart-security. src\/smart-security.groovy."},{"key":"e_1_3_2_2_16_1","unstructured":"2015. Turn On at Sunset. https:\/\/github.com\/SmartThingsCommunity\/Code\/ blob\/master\/smartapps\/sunrise-sunset\/turn-on-at-sunset.groovy.  2015. Turn On at Sunset. https:\/\/github.com\/SmartThingsCommunity\/Code\/ blob\/master\/smartapps\/sunrise-sunset\/turn-on-at-sunset.groovy."},{"key":"e_1_3_2_2_17_1","unstructured":"2016. Initial State Event Streamer. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/master\/smartapps\/initialstate-events\/ initial-stateevent-streamer.src\/initial-state-event-streamer.groovy.  2016. Initial State Event Streamer. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/master\/smartapps\/initialstate-events\/ initial-stateevent-streamer.src\/initial-state-event-streamer.groovy."},{"key":"e_1_3_2_2_18_1","unstructured":"2016. Understanding Illuminance: What's in a Lux? https:\/\/www.allaboutcircuits. com\/technical-articles\/understanding-illuminance-whats-in-a-lux\/.  2016. Understanding Illuminance: What's in a Lux? https:\/\/www.allaboutcircuits. com\/technical-articles\/understanding-illuminance-whats-in-a-lux\/."},{"key":"e_1_3_2_2_19_1","unstructured":"2017. InfluxDB Logger. https:\/\/github.com\/codersaur\/SmartThings\/blob\/master\/ smartapps\/influxdb-logger\/influxdb-logger.groovy.  2017. InfluxDB Logger. https:\/\/github.com\/codersaur\/SmartThings\/blob\/master\/ smartapps\/influxdb-logger\/influxdb-logger.groovy."},{"key":"e_1_3_2_2_20_1","unstructured":"2017. Thermostats. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/thermostats.src\/thermostats.groovy.  2017. Thermostats. https:\/\/github.com\/SmartThingsCommunity\/ SmartThingsPublic\/blob\/61b864535321a6f61cf5a77216f1e779bde68bd5\/ smartapps\/smartthings\/thermostats.src\/thermostats.groovy."},{"key":"e_1_3_2_2_21_1","unstructured":"2018. IFTTT. https:\/\/www.ifttt.com\/.  2018. IFTTT. https:\/\/www.ifttt.com\/."},{"key":"e_1_3_2_2_22_1","unstructured":"2018. Initial State. https:\/\/www.initialstate.com\/.  2018. Initial State. https:\/\/www.initialstate.com\/."},{"key":"e_1_3_2_2_23_1","unstructured":"2018. Neato (Connect). https:\/\/github.com\/alyc100\/SmartThingsPublic\/blob\/ master\/smartapps\/alyc100\/neato-connect.src\/neato-connect.groovy.  2018. Neato (Connect). https:\/\/github.com\/alyc100\/SmartThingsPublic\/blob\/ master\/smartapps\/alyc100\/neato-connect.src\/neato-connect.groovy."},{"key":"e_1_3_2_2_24_1","unstructured":"2019. SmartThings Groovy IDE. https:\/\/graph.api.smartthings.com\/.  2019. SmartThings Groovy IDE. https:\/\/graph.api.smartthings.com\/."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2528265.2528267"},{"key":"e_1_3_2_2_27_1","volume-title":"Detecting Dependences and Interactions in Feature-Oriented Design. In IEEE 21st International Symposium on Software Reliability Engineering (ISSRE). 161-170","author":"Apel Sven","year":"2010","unstructured":"Sven Apel , Wolfgang Scholz , Christian Lengauer , and Christian K\u00e4stner . 2010 . Detecting Dependences and Interactions in Feature-Oriented Design. In IEEE 21st International Symposium on Software Reliability Engineering (ISSRE). 161-170 . Sven Apel, Wolfgang Scholz, Christian Lengauer, and Christian K\u00e4stner. 2010. Detecting Dependences and Interactions in Feature-Oriented Design. In IEEE 21st International Symposium on Software Reliability Engineering (ISSRE). 161-170."},{"key":"e_1_3_2_2_28_1","article-title":"Feature-interaction Detection Based on Feature-based Specifications","volume":"57","author":"Apel Sven","year":"2013","unstructured":"Sven Apel , Alexander Von Rhein , Thomas Th\u00fcM, and Christian K\u00e4Stner . 2013 . Feature-interaction Detection Based on Feature-based Specifications . Computer Networks: The International Journal of Computer and Telecommunications Networking 57 , 12 ( August 2013 ), 2399-2409. Sven Apel, Alexander Von Rhein, Thomas Th\u00fcM, and Christian K\u00e4Stner. 2013. Feature-interaction Detection Based on Feature-based Specifications. Computer Networks: The International Journal of Computer and Telecommunications Networking 57, 12 ( August 2013 ), 2399-2409.","journal-title":"Computer Networks: The International Journal of Computer and Telecommunications Networking"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.53"},{"key":"e_1_3_2_2_30_1","volume-title":"Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities. arXiv preprint arXiv","author":"Celik Z Berkay","year":"1809","unstructured":"Z Berkay Celik , Earlence Fernandes , Eric Pauley , Gang Tan , and Patrick McDaniel . 2018. Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities. arXiv preprint arXiv : 1809 . 06962 ( 2018 ). Z Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan, and Patrick McDaniel. 2018. Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities. arXiv preprint arXiv: 1809. 06962 ( 2018 )."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814303"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053004"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"Mufy Calder Mario Kolberg Evan H Magill and Stephan Reif-Marganiec. 2003. Feature interaction: a critical review and considered forecast. Computer Networks 41 1 ( 2003 ) 115-141.  Mufy Calder Mario Kolberg Evan H Magill and Stephan Reif-Marganiec. 2003. Feature interaction: a critical review and considered forecast. Computer Networks 41 1 ( 2003 ) 115-141.","DOI":"10.1016\/S1389-1286(02)00352-3"},{"key":"e_1_3_2_2_34_1","volume-title":"Pham Van Hau, and Tuan Nguyen","author":"Cam Nguyen Tan","year":"2016","unstructured":"Nguyen Tan Cam , Pham Van Hau, and Tuan Nguyen . 2016 . Android security analysis based on inter-application relationships. In Information Science and Applications (ICISA) 2016. Springer , 689-700. Nguyen Tan Cam, Pham Van Hau, and Tuan Nguyen. 2016. Android security analysis based on inter-application relationships. In Information Science and Applications (ICISA) 2016. Springer, 689-700."},{"key":"e_1_3_2_2_35_1","volume-title":"Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Celik Z Berkay","unstructured":"Z Berkay Celik , Leonardo Babun , Amit Kumar Sikder , Hidayet Aksu , Gang Tan , Patrick McDaniel , and A Selcuk Uluagac . [n.d.]. Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association. Z Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A Selcuk Uluagac. [n.d.]. Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association."},{"key":"e_1_3_2_2_36_1","volume-title":"Soteria: Automated IoT Safety and Security Analysis. In 2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Celik Z Berkay","year":"2018","unstructured":"Z Berkay Celik , Patrick McDaniel , and Gang Tan . 2018 . Soteria: Automated IoT Safety and Security Analysis. In 2018 USENIX Annual Technical Conference (USENIX ATC 18) . USENIX Association. Z Berkay Celik, Patrick McDaniel, and Gang Tan. 2018. Soteria: Automated IoT Safety and Security Analysis. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). USENIX Association."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/277651.277696"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945468"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_2_2_40_1","first-page":"531","volume-title":"FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Fernandes Earlence","year":"2016","unstructured":"Earlence Fernandes , Justin Paupore , Amir Rahmati , Daniel Simionato , Mauro Conti , and Atul Prakash . 2016 . FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX , 531 - 548 . https:\/\/www.usenix. org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/fernandes Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, and Atul Prakash. 2016. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 531-548. https:\/\/www.usenix. org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/fernandes"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964023"},{"key":"e_1_3_2_2_42_1","unstructured":"The Apache Software Foundation. 2003-2018. The Apache Groovy programming language. http:\/\/groovy-lang.org\/.  The Apache Software Foundation. 2003-2018. The Apache Groovy programming language. http:\/\/groovy-lang.org\/."},{"key":"e_1_3_2_2_43_1","unstructured":"Google. 2018. Android Things website. https:\/\/developer.android.com\/things\/.  Google. 2018. Android Things website. https:\/\/developer.android.com\/things\/."},{"key":"e_1_3_2_2_44_1","volume-title":"LinkFlow: Eficient Large-Scale Inter-app Privacy Leakage Detection. In International Conference on Security and Privacy in Communication Systems. Springer, 291-311","author":"He Yi","year":"2017","unstructured":"Yi He , Qi Li , and Kun Sun . 2017 . LinkFlow: Eficient Large-Scale Inter-app Privacy Leakage Detection. In International Conference on Security and Privacy in Communication Systems. Springer, 291-311 . Yi He, Qi Li, and Kun Sun. 2017. LinkFlow: Eficient Large-Scale Inter-app Privacy Leakage Detection. In International Conference on Security and Privacy in Communication Systems. Springer, 291-311."},{"key":"e_1_3_2_2_45_1","volume-title":"The SPIN model checker: Primer and reference manual","author":"Holzmann Gerard J","unstructured":"Gerard J Holzmann . [n.d.]. The SPIN model checker: Primer and reference manual . Vol. 1003 . Gerard J Holzmann. [n.d.]. The SPIN model checker: Primer and reference manual. Vol. 1003."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594330"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173173"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.729683"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.36"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2008.158"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18467-8_34"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316482.3326350"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009857"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360322.3360837"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.35"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594311"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843717"},{"key":"e_1_3_2_2_59_1","volume-title":"Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security (PLAS). 97-102","author":"Nandi Chandrakana","unstructured":"Chandrakana Nandi and Michael D. Ernst . 2016. Automatic Trigger Generation for Rule-based Smart Homes . In Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security (PLAS). 97-102 . Chandrakana Nandi and Michael D. Ernst. 2016. Automatic Trigger Generation for Rule-based Smart Homes. In Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security (PLAS). 97-102."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133850.3133860"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281440"},{"key":"e_1_3_2_2_62_1","unstructured":"openHAB. 2018. openHAB website. https:\/\/www.openhab.org\/.  openHAB. 2018. openHAB website. https:\/\/www.openhab.org\/."},{"key":"e_1_3_2_2_63_1","first-page":"1","article-title":"Pairwise Feature-interaction Testing for SPLs: Potentials and Limitations. In Proceedings of the 15th International Software Product Line Conference (SPLC)","volume":"6","author":"Oster Sebastian","year":"2011","unstructured":"Sebastian Oster , Marius Zink , Malte Lochau , and Mark Grechanik . 2011 . Pairwise Feature-interaction Testing for SPLs: Potentials and Limitations. In Proceedings of the 15th International Software Product Line Conference (SPLC) . Article 6 , 6 : 1 - 6 :8 pages. Sebastian Oster, Marius Zink, Malte Lochau, and Mark Grechanik. 2011. Pairwise Feature-interaction Testing for SPLs: Potentials and Limitations. In Proceedings of the 15th International Software Product Line Conference (SPLC). Article 6, 6 : 1-6 :8 pages.","journal-title":"Article"},{"key":"e_1_3_2_2_64_1","unstructured":"Yves Racine. 2014. FireCO2Alarm SmartApp. https:\/\/github.com\/yracine\/devicetype.myecobee\/blob\/master\/smartapps\/FireCO2Alarm.src\/FireCO2Alarm. groovy.  Yves Racine. 2014. FireCO2Alarm SmartApp. https:\/\/github.com\/yracine\/devicetype.myecobee\/blob\/master\/smartapps\/FireCO2Alarm.src\/FireCO2Alarm. groovy."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1865875.1865882"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509538"},{"key":"e_1_3_2_2_67_1","unstructured":"Chris Sader. 2013. Auto Lock Door SmartApp. https:\/\/github.com\/smartthingsusers\/smartapp.auto-lock-door\/blob\/master\/auto-lock-door.smartapp.groovy.  Chris Sader. 2013. Auto Lock Door SmartApp. https:\/\/github.com\/smartthingsusers\/smartapp.auto-lock-door\/blob\/master\/auto-lock-door.smartapp.groovy."},{"key":"e_1_3_2_2_68_1","unstructured":"SmartThings. 2018. SmartThings Public GitHub Repo. https:\/\/github.com\/ SmartThingsCommunity\/SmartThingsPublic.  SmartThings. 2018. SmartThings Public GitHub Repo. https:\/\/github.com\/ SmartThingsCommunity\/SmartThingsPublic."},{"key":"e_1_3_2_2_69_1","unstructured":"Samsung SmartThings. 2018. Samsung SmartThings website. http:\/\/www. smartthings.com.  Samsung SmartThings. 2018. Samsung SmartThings website. http:\/\/www. smartthings.com."},{"key":"e_1_3_2_2_70_1","first-page":"361","volume-title":"Proceedings of the 26th USENIX Conference on Security Symposium (Vancouver, BC, Canada) ( SEC'17). USENIX Association","author":"Tian Yuan","year":"2017","unstructured":"Yuan Tian , Nan Zhang , Yueh-Hsun Lin , XiaoFeng Wang , Blase Ur , XianZheng Guo , and Patrick Tague . 2017 . Smartauth: User-centered Authorization for the Internet of Things . In Proceedings of the 26th USENIX Conference on Security Symposium (Vancouver, BC, Canada) ( SEC'17). USENIX Association , Berkeley, CA, USA , 361 - 378 . http:\/\/dl.acm.org\/citation.cfm?id= 3241189. 3241219 Yuan Tian, Nan Zhang, Yueh-Hsun Lin, XiaoFeng Wang, Blase Ur, XianZheng Guo, and Patrick Tague. 2017. Smartauth: User-centered Authorization for the Internet of Things. In Proceedings of the 26th USENIX Conference on Security Symposium (Vancouver, BC, Canada) ( SEC'17). USENIX Association, Berkeley, CA, USA, 361-378. http:\/\/dl.acm.org\/citation.cfm?id= 3241189. 3241219"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.3866497"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.3866499"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.3866491"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.37"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2166772"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2010.17"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"crossref","unstructured":"William Visser Klaus Havelund Guillaume Brat SeungJuun Park and Flavio Lerda. 2003. Model checking programs. 10 (April 2003 ) 203-232. Issue 2.  William Visser Klaus Havelund Guillaume Brat SeungJuun Park and Flavio Lerda. 2003. Model checking programs. 10 (April 2003 ) 203-232. Issue 2.","DOI":"10.1023\/A:1022920129859"},{"key":"e_1_3_2_2_78_1","volume-title":"Magill","author":"Wilson Michael","year":"2008","unstructured":"Michael Wilson , Mario Kolberg , and Evan H . Magill . 2008 . Considering side efects in service interactions in home automation-an online approach. Feature Interactions in Software and Communication Systems IX ( 2008 ), 172-187. Michael Wilson, Mario Kolberg, and Evan H. Magill. 2008. Considering side efects in service interactions in home automation-an online approach. Feature Interactions in Software and Communication Systems IX ( 2008 ), 172-187."},{"key":"e_1_3_2_2_79_1","volume-title":"Contextaware wireless sensor networks for assisted living and residential monitoring","author":"Wood Anthony D","year":"2008","unstructured":"Anthony D Wood , John A Stankovic , Gilles Virone , Leo Selavo , Zhimin He , Qiuhua Cao , Thao Doan , Yafeng Wu , Lei Fang , and Radu Stoleru . 2008. Contextaware wireless sensor networks for assisted living and residential monitoring . IEEE network 22, 4 ( 2008 ). Anthony D Wood, John A Stankovic, Gilles Virone, Leo Selavo, Zhimin He, Qiuhua Cao, Thao Doan, Yafeng Wu, Lei Fang, and Radu Stoleru. 2008. Contextaware wireless sensor networks for assisted living and residential monitoring. IEEE network 22, 4 ( 2008 )."},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.5555\/2821404.2821413"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025617"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2854038.2854063"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243820"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409682","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409682","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:39Z","timestamp":1750203879000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409682"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":82,"alternative-id":["10.1145\/3368089.3409682","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409682","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}