{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:25:12Z","timestamp":1770225912312,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T00:00:00Z","timestamp":1592179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100014718","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1617627, PFI:BIC-1632051, CNS-1814551, and CNS-1815636"],"award-info":[{"award-number":["CNS-1617627, PFI:BIC-1632051, CNS-1814551, and CNS-1815636"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,15]]},"DOI":"10.1145\/3386901.3388941","type":"proceedings-article","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T01:27:30Z","timestamp":1591493250000},"page":"260-272","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["SecWIR"],"prefix":"10.1145","author":[{"given":"Xinyu","family":"Lei","sequence":"first","affiliation":[{"name":"Michigan State University"}]},{"given":"Guan-Hua","family":"Tu","sequence":"additional","affiliation":[{"name":"Michigan State University"}]},{"given":"Chi-Yu","family":"Li","sequence":"additional","affiliation":[{"name":"National Chiao Tung University, Hsinchu City, Taiwan"}]},{"given":"Tian","family":"Xie","sequence":"additional","affiliation":[{"name":"Michigan State University"}]},{"given":"Mi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Michigan State University"}]}],"member":"320","published-online":{"date-parts":[[2020,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/www.lifewire.com\/what-is-wpa2--818352","author":"An","year":"2017"},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/linode.com\/docs\/security\/firewalls\/control-network-traffic-with-iptables\/","author":"Control","year":"2018"},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/www.lifewire.com\/linux-top-command-2201163","author":"Linux","year":"2018"},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/openwrt.org\/","author":"Openwrt","year":"2018"},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/www.wi-fi.org\/discover-wi-fi\/security","author":"Wi","year":"2020"},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/bit.ly\/2o2pulx","author":"ActivityManager","year":"2018"},{"key":"e_1_3_2_1_7_1","volume-title":"Lorawan: Low power wide area network. https:\/\/lora-alliance.org\/about-lorawan","author":"Alliance L.","year":"2020"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2005.70"},{"key":"e_1_3_2_1_10_1","volume-title":"N. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. CoRR abs\/1708.05044","author":"Apthorpe N.","year":"2017"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CYBConf.2017.7985777"},{"key":"e_1_3_2_1_12_1","unstructured":"ASN1. A layman's guide to a subset of asn.1 ber and der. http:\/\/luca.ntop.org\/Teaching\/Appunti\/asn1.html 2018.  ASN1. A layman's guide to a subset of asn.1 ber and der. http:\/\/luca.ntop.org\/Teaching\/Appunti\/asn1.html 2018."},{"key":"e_1_3_2_1_13_1","volume-title":"A perfect crime? only time will only time will tell. https:\/\/media.blackhat.com\/eu-13\/briefings\/Beery\/bh-eu-13-a-perfect-crime-beery-wp.pdf","author":"Be'ery T.","year":"2013"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2850446"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2012.6263790"},{"key":"e_1_3_2_1_16_1","volume-title":"Mozilla ca certificate store in pem format. https:\/\/curl.haxx.se\/docs\/caextract.html","author":"Caextract","year":"2018"},{"key":"e_1_3_2_1_17_1","first-page":"1687","volume-title":"USENIX Security Symposium (USENIX Security)","author":"Celik Z. B.","year":"2018"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23326"},{"key":"e_1_3_2_1_19_1","unstructured":"Chawla B. K. Gupta O. and Sawhney B. A review on ipsec and ssl vpn.  Chawla B. K. Gupta O. and Sawhney B. A review on ipsec and ssl vpn."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23159"},{"key":"e_1_3_2_1_21_1","volume-title":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2011-3389","author":"Beast","year":"2011"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326083"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873600"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_2_1_25_1","unstructured":"Fruhlinger J. The mirai botnet explained: How teen scammers and cctv cameras almost brought down the internet. https:\/\/www.csoonline.com\/article\/3258748\/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html 2018.  Fruhlinger J. The mirai botnet explained: How teen scammers and cctv cameras almost brought down the internet. https:\/\/www.csoonline.com\/article\/3258748\/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html 2018."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018438"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3010079.3012014"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568573"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2003.09.015"},{"key":"e_1_3_2_1_30_1","volume-title":"https:\/\/github.com\/HewlettPackard\/netperf","author":"Jones R.","year":"2018"},{"key":"e_1_3_2_1_31_1","first-page":"63","volume-title":"International Conference in Information Security and Digital Forensics (ISDF)","author":"Kavalaris S. P.","year":"2014"},{"key":"e_1_3_2_1_32_1","volume-title":"Best apps to control your router. https:\/\/www.komando.com\/apps\/368384\/best-apps-to-control-your-router\/all","author":"Komando","year":"2018"},{"key":"e_1_3_2_1_33_1","volume-title":"Network and Distributed Systems Symposium (NDSS)","author":"Kumar S.","year":"2019"},{"key":"e_1_3_2_1_34_1","volume-title":"Beast vs. crime attack. https:\/\/resources.infosecinstitute.com\/beast-vs-crime-attack\/#gref","author":"Mazerik R.","year":"2013"},{"key":"e_1_3_2_1_35_1","volume-title":"Delta dfcm-nnn40. https:\/\/os.mbed.com\/components\/Delta-DFCM-NNN40\/","author":"Mbed","year":"2018"},{"key":"e_1_3_2_1_36_1","volume-title":"IEEE International Conference on Distributed Computing Systems (ICDCS)","author":"Miettinen M.","year":"2017"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.80"},{"key":"e_1_3_2_1_38_1","unstructured":"Netgear. Readycloud at netgear. http:\/\/readycloud.netgear.com\/client\/en\/welcome.html 2020.  Netgear. Readycloud at netgear. http:\/\/readycloud.netgear.com\/client\/en\/welcome.html 2020."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899007.2899008"},{"key":"e_1_3_2_1_40_1","volume-title":"Package: openssl-util. https:\/\/openwrt.org\/packages\/pkgdata\/openssl-util","author":"Openwrt","year":"2018"},{"key":"e_1_3_2_1_41_1","volume-title":"Supported routers. https:\/\/openwrt.org\/toh\/start","author":"Openwrt","year":"2018"},{"key":"e_1_3_2_1_42_1","unstructured":"Paterson K. On the security of rc4 in tls and wpa. http:\/\/www.isg.rhul.ac.uk\/tls\/ 2013.  Paterson K. On the security of rc4 in tls and wpa. http:\/\/www.isg.rhul.ac.uk\/tls\/ 2013."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2277656"},{"key":"e_1_3_2_1_44_1","volume-title":"https:\/\/www.roe.ch\/SSLsplit","author":"Roethlisberger D.","year":"2018"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"e_1_3_2_1_46_1","volume-title":"Transport layer security (tls) session resumption without server-side state. https:\/\/tools.ietf.org\/html\/rfc5077","author":"Salowey J., Z. H. E. P.","year":"2008"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/11872153_32"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917622"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2016.7947781"},{"key":"e_1_3_2_1_50_1","unstructured":"SSLdump. Ssldump home page. http:\/\/ssldump.sourceforge.net\/ 2018.  SSLdump. Ssldump home page. http:\/\/ssldump.sourceforge.net\/ 2018."},{"key":"e_1_3_2_1_51_1","volume-title":"Unit shipments of wi-fi enabled smart home devices worldwide from 2016 to 2020 (in millions). https:\/\/bit.ly\/2EhpNj1","author":"Statista","year":"2016"},{"key":"e_1_3_2_1_52_1","first-page":"361","volume-title":"USENIX Security Symposium (USENIX Security)","author":"Tian Y.","year":"2017"},{"key":"e_1_3_2_1_53_1","volume-title":"Internet x. 509 public key infrastructure (pki) proxy certificate profile. Tech. rep","author":"Tuecke S.","year":"2004"},{"key":"e_1_3_2_1_54_1","volume-title":"Wi-fi installed base forecast to reach 17 billion by","author":"Weinschenk C.","year":"2030"},{"key":"e_1_3_2_1_55_1","volume-title":"Wolfssl memory usage. https:\/\/www.wolfssl.com\/docs\/benchmarks\/","author":"Wolfssl","year":"2018"},{"key":"e_1_3_2_1_56_1","unstructured":"Wong D. Downgrade attack on tls 1.3 and vulnerabilities in major tls libraries. https:\/\/www.nccgroup.trust\/us\/about-us\/newsroom-and-events\/blog\/2019\/february\/downgrade-attack-on-tls-1.3-and-vulnerabilities-in-major-tls-libraries\/ 2019.  Wong D. Downgrade attack on tls 1.3 and vulnerabilities in major tls libraries. https:\/\/www.nccgroup.trust\/us\/about-us\/newsroom-and-events\/blog\/2019\/february\/downgrade-attack-on-tls-1.3-and-vulnerabilities-in-major-tls-libraries\/ 2019."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSEW.2008.28"},{"key":"e_1_3_2_1_59_1","volume-title":"Understanding iot security through the data crystal ball: Where we are now and where we are going to be. arXiv preprint arXiv:1703.09809","author":"Zhang N.","year":"2017"},{"key":"e_1_3_2_1_60_1","volume-title":"http:\/\/www.g-sec.lu\/practicaltls.pdf","author":"Zoller T.","year":"2011"}],"event":{"name":"MobiSys '20: The 18th Annual International Conference on Mobile Systems, Applications, and Services","location":"Toronto Ontario Canada","acronym":"MobiSys '20","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386901.3388941","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3386901.3388941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:26Z","timestamp":1750199606000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386901.3388941"}},"subtitle":["securing smart home IoT communications via wi-fi routers with embedded intelligence"],"short-title":[],"issued":{"date-parts":[[2020,6,15]]},"references-count":60,"alternative-id":["10.1145\/3386901.3388941","10.1145\/3386901"],"URL":"https:\/\/doi.org\/10.1145\/3386901.3388941","relation":{},"subject":[],"published":{"date-parts":[[2020,6,15]]},"assertion":[{"value":"2020-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}