{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:07:45Z","timestamp":1759032465166,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["OIA-1936968"],"award-info":[{"award-number":["OIA-1936968"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Saudi Arabian Cultural Mission"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3375723","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"259-270","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Attacking and Protecting Tunneled Traffic of Smart Home Devices"],"prefix":"10.1145","author":[{"given":"Ahmed","family":"Alshehri","sequence":"first","affiliation":[{"name":"Colorado School of Mines, Golden, CO, USA"}]},{"given":"Jacob","family":"Granley","sequence":"additional","affiliation":[{"name":"Colorado School of Mines, Golden, CO, USA"}]},{"given":"Chuan","family":"Yue","sequence":"additional","affiliation":[{"name":"Colorado School of Mines, Golden, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Peek-a-boo: I see your smart home activities, even encrypted! In arXiv preprint arXiv:1808.02741","author":"Acar A.","year":"2018","unstructured":"Acar, A., Fereidooni, H., Abera, T., Sikder, A. K., Miettinen, M., Aksu, H., and Uluagac, A. S. Peek-a-boo: I see your smart home activities, even encrypted! In arXiv preprint arXiv:1808.02741 (2018)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0040"},{"key":"e_1_3_2_1_3_1","volume-title":"CoRR, abs\/1708.05044","author":"Apthorpe N.","year":"2017","unstructured":"Apthorpe, N., Reisman, D., Sundaresan, S., Narayanan, A., and Feamster, N. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. In CoRR, abs\/1708.05044, 2017 (2017)."},{"volume-title":"Random forests","author":"Breiman L.","key":"e_1_3_2_1_4_1","unstructured":"Breiman, L. Random forests. vol. 45."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings on Privacy Enhancing Technologies","author":"Cherubin G.","year":"2017","unstructured":"Cherubin, G. Bayes, not na\u00efve: Security bounds on website fingerprinting defenses. In Proceedings on Privacy Enhancing Technologies (2017)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.48"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229567"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"e_1_3_2_1_11_1","volume-title":"Advances in Cryptology","author":"Dwork C.","year":"2006","unstructured":"Dwork, C., Kenthapadi, K., Mcsherry, F., Mironov, I., and Naor, M. Our data, ourselves: Privacy via distributed noise generation. In Advances in Cryptology (2006)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536466"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2018.00026"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314148.3314352"},{"key":"e_1_3_2_1_18_1","volume-title":"Differential private noise adding mechanism and its application on consensus. In arXiv:1611.08936v2","author":"He J.","year":"2017","unstructured":"He, J., and Cai, L. Differential private noise adding mechanism and its application on consensus. In arXiv:1611.08936v2 (2017)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM.2017.8256018"},{"key":"e_1_3_2_1_21_1","volume-title":"In 28th USENIX Security Symposium","author":"Kumar D.","year":"2019","unstructured":"Kumar, D., Shen, K., Case, B., Garg, D., Alperovich, G., Kuznetsov, D., and Durumeric, Z. All things considered: an analysis of iot devices on home networks. In In 28th USENIX Security Symposium (2019)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2799820"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1980.1163351"},{"issue":"2","key":"e_1_3_2_1_24_1","first-page":"1206","volume":"5","author":"Marchal S.","year":"2019","unstructured":"Marchal, S., Miettinen, M., Nguyen, T. D., Sadeghi, A. R., and Asokan, N. Audi: Toward autonomous iot device-type identification using periodic communication. IEEE Journal on Selected Areas in Communications 5(2), 1206--1217 (2019).","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of 35th IEEE Symposium onSecurity and Privacy Workshops (SPW)","author":"McKinney W.","year":"2011","unstructured":"McKinney, W. pandas: a foundational python library for data analysis and statistics. python for high performance and scientific computing. In Proceedings of 35th IEEE Symposium onSecurity and Privacy Workshops (SPW) (2011)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019878"},{"key":"e_1_3_2_1_27_1","volume-title":"In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","author":"Miettinen M.","year":"2017","unstructured":"Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A. R., and Tarkoma, S. Iot sentinel: Automated device-type identification for security enforcement in iot. In In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (2017)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116438"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0027"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243820"},{"key":"e_1_3_2_1_32_1","unstructured":"Differential Privacy Overview - Apple. https:\/\/tools.ietf.org\/html\/rfc2460."},{"key":"e_1_3_2_1_33_1","unstructured":"TCP Dump. http:\/\/www.tcpdump.org\/manpages\/tcpdump.1.html."},{"key":"e_1_3_2_1_34_1","unstructured":"Wireshark. https:\/\/www.wireshark.org\/cacetech.html."},{"key":"e_1_3_2_1_35_1","unstructured":"Internet Protocol Version 6 (IPv6) Specification 1998. https:\/\/tools.ietf.org\/html\/rfc2460."},{"key":"e_1_3_2_1_36_1","unstructured":"There is No Place Like [ A Connected ] Home 2017. https:\/\/www.mckinsey.com\/spContent\/connected_homes\/index.html."},{"key":"e_1_3_2_1_37_1","unstructured":"Net neutrality dies on June 11th 2018. https:\/\/www.theverge.com\/2018\/5\/10\/17338978\/net-neutrality-end-date-fcc."},{"key":"e_1_3_2_1_38_1","unstructured":"The 14 biggest announcements from Amazon's surprise hardware event 2018. https:\/\/www.theverge.com\/2018\/9\/20\/17883242\/amazon-alexa-event-2018-news-recap-echo-auto-dot-sub-link-auto-microwave."},{"key":"e_1_3_2_1_39_1","unstructured":"The Connected Home Market 2018. https:\/\/www.mckinsey.com\/spcontent\/connected_homes\/pdf\/mckinsey_connectedhome.pdf."},{"key":"e_1_3_2_1_40_1","unstructured":"The General Data Protection Regulation 2018. https:\/\/eugdpr.org\/."}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"New Orleans LA USA","acronym":"CODASPY '20"},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375723","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3374664.3375723","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375723","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375723"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":40,"alternative-id":["10.1145\/3374664.3375723","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3375723","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}