{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:27:22Z","timestamp":1773325642254,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) - SFB 1119 - 236615297"},{"DOI":"10.13039\/100014718","name":"National Science Foundation","doi-asserted-by":"publisher","award":["Awards: NSF-CAREER-CNS-1453647, NSF-1663051, NSF1718116"],"award-info":[{"award-number":["Awards: NSF-CAREER-CNS-1453647, NSF-1663051, NSF1718116"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Cyber Florida?s Capacity Building Program"},{"name":"EU LOCARD Project (agreement H2020-SU-SEC-2018-2019-2020- 8327351)"},{"name":"EU COLLABS Project (ICT-2019-2 GA 871518)"},{"name":"Cisco Systems under the IoT Crowdsense project, gift # 2019-197831 (3696)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,8]]},"DOI":"10.1145\/3395351.3399421","type":"proceedings-article","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T04:29:10Z","timestamp":1595392150000},"page":"207-218","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":188,"title":["Peek-a-boo"],"prefix":"10.1145","author":[{"given":"Abbas","family":"Acar","sequence":"first","affiliation":[{"name":"Florida International University"}]},{"given":"Hossein","family":"Fereidooni","sequence":"additional","affiliation":[{"name":"TU Darmstadt"}]},{"given":"Tigist","family":"Abera","sequence":"additional","affiliation":[{"name":"TU Darmstadt"}]},{"given":"Amit Kumar","family":"Sikder","sequence":"additional","affiliation":[{"name":"Florida International University"}]},{"given":"Markus","family":"Miettinen","sequence":"additional","affiliation":[{"name":"TU Darmstadt"}]},{"given":"Hidayet","family":"Aksu","sequence":"additional","affiliation":[{"name":"Florida International University"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"TU Darmstadt"}]},{"given":"Selcuk","family":"Uluagac","sequence":"additional","affiliation":[{"name":"Florida International University"}]}],"member":"320","published-online":{"date-parts":[[2020,7,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2974941"},{"key":"e_1_3_2_1_2_1","unstructured":"IoT Analytics. 2017. State of the Smart Home Market. https:\/\/iot-analytics.com\/wp\/wp-content\/uploads\/2017\/12\/StateofSmartHomeMarket2017-vf.pdf.  IoT Analytics. 2017. State of the Smart Home Market. https:\/\/iot-analytics.com\/wp\/wp-content\/uploads\/2017\/12\/StateofSmartHomeMarket2017-vf.pdf."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0040"},{"key":"e_1_3_2_1_4_1","unstructured":"Noah Apthorpe Dillon Reisman and Nick Feamster. 2017. A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic. arXiv preprint arXiv:1705.06805 (2017).  Noah Apthorpe Dillon Reisman and Nick Feamster. 2017. A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic. arXiv preprint arXiv:1705.06805 (2017)."},{"key":"e_1_3_2_1_5_1","unstructured":"Noah Apthorpe Dillon Reisman Srikanth Sundaresan Arvind Narayanan and Nick Feamster. 2017. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. arXiv preprint arXiv:1708.05044 (2017).  Noah Apthorpe Dillon Reisman Srikanth Sundaresan Arvind Narayanan and Nick Feamster. 2017. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. arXiv preprint arXiv:1708.05044 (2017)."},{"key":"e_1_3_2_1_6_1","unstructured":"Leonardo Babun Amit Kumar Sikder Abbas Acar and A Selcuk Uluagac. 2018. Iotdots: A digital forensics framework for smart environments. arXiv preprint arXiv:1809.00745 (2018).  Leonardo Babun Amit Kumar Sikder Abbas Acar and A Selcuk Uluagac. 2018. Iotdots: A digital forensics framework for smart environments. arXiv preprint arXiv:1809.00745 (2018)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Bruhadeshwar Bezawada Maalvika Bachani Jordan Peterson Hossein Shirazi Indrakshi Ray and Indrajit Ray. 2018. IoTSense: Behavioral Fingerprinting of IoT Devices. arXiv preprint arXiv:1804.03852 (2018).  Bruhadeshwar Bezawada Maalvika Bachani Jordan Peterson Hossein Shirazi Indrakshi Ray and Indrajit Ray. 2018. IoTSense: Behavioral Fingerprinting of IoT Devices. arXiv preprint arXiv:1804.03852 (2018).","DOI":"10.1145\/3266444.3266452"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.288"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354254"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_3_2_1_11_1","volume-title":"Sensitive Information Tracking in Commodity IoT. In USENIX Security Symposium","author":"Celik Z. Berkay"},{"key":"e_1_3_2_1_12_1","unstructured":"Maximilian Christ Nils Braun and Julius Neuffer. 2018. tsfresh. https:\/\/github.com\/blue-yonder\/tsfresh.  Maximilian Christ Nils Braun and Julius Neuffer. 2018. tsfresh. https:\/\/github.com\/blue-yonder\/tsfresh."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2478741"},{"key":"e_1_3_2_1_14_1","volume-title":"Inferring Activity From Smart Home Network Traffic. In Security and Privacy Workshops (SPW)","author":"Copos Bogdan","year":"2016"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4652-y"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873594"},{"key":"e_1_3_2_1_17_1","unstructured":"Christian de Looper. 2017. The 12 best smart home devices you need to live like the Jetsons. http:\/\/www.businessinsider.com\/best-smart-home.  Christian de Looper. 2017. The 12 best smart home devices you need to live like the Jetsons. http:\/\/www.businessinsider.com\/best-smart-home."},{"key":"e_1_3_2_1_18_1","unstructured":"Shuaike Dong Zhou Li Di Tang Jiongyi Chen Menghan Sun and Kehuan Zhang. 2019. Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks. arXiv preprint arXiv.1909.00104 (2019).  Shuaike Dong Zhou Li Di Tang Jiongyi Chen Menghan Sun and Kehuan Zhang. 2019. Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks. arXiv preprint arXiv.1909.00104 (2019)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Security Symposium.","author":"Kassem"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"David Formby and etal 2016. Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems.. In NDSS.  David Formby and et al. 2016. Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems.. In NDSS.","DOI":"10.14722\/ndss.2016.23142"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Jun Han Albert Jin Chung Manal Kumar Sinha Madhumitha Harishankar Shijia Pan Hae Young Noh Pei Zhang and Patrick Tague. 2018. Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types. In Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing using Different Sensor Types. IEEE 0.  Jun Han Albert Jin Chung Manal Kumar Sinha Madhumitha Harishankar Shijia Pan Hae Young Noh Pei Zhang and Patrick Tague. 2018. Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types. In Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing using Different Sensor Types. IEEE 0.","DOI":"10.1109\/SP.2018.00041"},{"key":"e_1_3_2_1_23_1","unstructured":"Mordor Intelligence. 2018. IoT Sensor Market Size-Segmented by Type (Pressure Sensor Temperature Sensor Proximity Sensor) End-user Industry (Healthcare Automotive Consumer Electronics) and Region - Growth Trends and Forecast (2018 - 2023). https:\/\/www.mordorintelligence.com\/industry-reports\/iot-sensor-market.  Mordor Intelligence. 2018. IoT Sensor Market Size-Segmented by Type (Pressure Sensor Temperature Sensor Proximity Sensor) End-user Industry (Healthcare Automotive Consumer Electronics) and Region - Growth Trends and Forecast (2018 - 2023). https:\/\/www.mordorintelligence.com\/industry-reports\/iot-sensor-market."},{"key":"e_1_3_2_1_24_1","volume-title":"2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, 7--12","author":"Junges Pierre-Marie","year":"2019"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524528"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"key":"e_1_3_2_1_27_1","unstructured":"Yair Meidan Michael Bohadana Asaf Shabtai Martin Ochoa Nils Ole Tippenhauer Juan Davis Guarnizo and Yuval Elovici. 2017. Detection of Unauthorized IoT Devices Using Machine Learning Techniques. arXiv preprint arXiv:1709.04647 (2017).  Yair Meidan Michael Bohadana Asaf Shabtai Martin Ochoa Nils Ole Tippenhauer Juan Davis Guarnizo and Yuval Elovici. 2017. Detection of Unauthorized IoT Devices Using Machine Learning Techniques. arXiv preprint arXiv:1709.04647 (2017)."},{"key":"e_1_3_2_1_28_1","volume-title":"Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 2177--2184","author":"Miettinen Markus","year":"2017"},{"key":"e_1_3_2_1_29_1","volume-title":"2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS). IEEE, 389--396","author":"Iqtidar Newaz AKM","year":"2019"},{"key":"e_1_3_2_1_30_1","unstructured":"Thien Duc Nguyen Samuel Marchal Markus Miettinen Minh Hoang Dang N Asokan and Ahmad-Reza Sadeghi. 2018. D\\\" IoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices. arXiv preprint arXiv:1804.07474 (2018).  Thien Duc Nguyen Samuel Marchal Markus Miettinen Minh Hoang Dang N Asokan and Ahmad-Reza Sadeghi. 2018. D\\\" IoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices. arXiv preprint arXiv:1804.07474 (2018)."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 140--150","author":"Connor TJ","year":"2019"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323409"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369033"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Ola Salman Imad H Elhajj Ali Chehab and Ayman Kayssi. 2019. A machine learning based framework for IoT device identification and abnormal traffic detection. Transactions on Emerging Telecommunications Technologies (2019) e3743.  Ola Salman Imad H Elhajj Ali Chehab and Ayman Kayssi. 2019. A machine learning based framework for IoT device identification and abnormal traffic detection. Transactions on Emerging Telecommunications Technologies (2019) e3743.","DOI":"10.1002\/ett.3743"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622243"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2018.8301744"},{"key":"e_1_3_2_1_38_1","unstructured":"Amit Kumar Sikder Hidayet Aksu and A Selcuk Uluagac. 2017. 6thsense: A context-aware sensor-based attack detector for smart devices. In USENIX Security.  Amit Kumar Sikder Hidayet Aksu and A Selcuk Uluagac. 2017. 6thsense: A context-aware sensor-based attack detector for smart devices. In USENIX Security."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Amit Kumar Sikder Hidayet Aksu and A Selcuk Uluagac. 2019. A context-aware framework for detecting sensor-based threats on smart devices. IEEE Transactions on Mobile Computing (2019).  Amit Kumar Sikder Hidayet Aksu and A Selcuk Uluagac. 2019. A context-aware framework for detecting sensor-based threats on smart devices. IEEE Transactions on Mobile Computing (2019).","DOI":"10.1109\/TMC.2019.2893253"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359840"},{"key":"e_1_3_2_1_41_1","unstructured":"Amit Kumar Sikder Leonardo Babun Z Berkay Celik Abbas Acar Hidayet Aksu Patrick McDaniel Engin Kirda and A Selcuk Uluagac. 2019. Multi-User Multi-Device-Aware Access Control System for Smart Home. arXiv preprint arXiv:1911.10186 (2019).  Amit Kumar Sikder Leonardo Babun Z Berkay Celik Abbas Acar Hidayet Aksu Patrick McDaniel Engin Kirda and A Selcuk Uluagac. 2019. Multi-User Multi-Device-Aware Access Control System for Smart Home. arXiv preprint arXiv:1911.10186 (2019)."},{"key":"e_1_3_2_1_42_1","unstructured":"Amit Kumar Sikder Giuseppe Petracca Hidayet Aksu Trent Jaeger and A Selcuk Uluagac. 2018. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications. arXiv preprint arXiv:1802.02041 (2018).  Amit Kumar Sikder Giuseppe Petracca Hidayet Aksu Trent Jaeger and A Selcuk Uluagac. 2018. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications. arXiv preprint arXiv:1802.02041 (2018)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409663"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462099"},{"key":"e_1_3_2_1_45_1","volume-title":"Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on. IEEE, 19--30","author":"Sun Qixiang","year":"2002"},{"key":"e_1_3_2_1_46_1","volume-title":"EU GDPR: Privacy for connected medical devices. https:\/\/blog.nordicsemi.com\/getconnected\/eu-gdpr-privacy-for-connected-medical-devices.","author":"S\u00c3\u00ffderholm Thomas","year":"2017"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Rahmadi Trimananda Janus Varmarken Athina Markopoulou and Brian Demsky. 2019. PingPong: Packet-Level Signatures for Smart Home Device Events. arXiv preprint arXiv:1907.11797 (2019).  Rahmadi Trimananda Janus Varmarken Athina Markopoulou and Brian Demsky. 2019. PingPong: Packet-Level Signatures for Smart Home Device Events. arXiv preprint arXiv:1907.11797 (2019).","DOI":"10.14722\/ndss.2020.24097"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/2885167.2885173"},{"key":"e_1_3_2_1_49_1","first-page":"2745","article-title":"On inferring application protocol behaviors in encrypted network traffic","author":"Wright Charles V","year":"2006","journal-title":"Journal of Machine Learning Research 7"}],"event":{"name":"WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Linz Austria","acronym":"WiSec '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395351.3399421","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395351.3399421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:34Z","timestamp":1750199914000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395351.3399421"}},"subtitle":["i see your smart home activities, even encrypted!"],"short-title":[],"issued":{"date-parts":[[2020,7,8]]},"references-count":49,"alternative-id":["10.1145\/3395351.3399421","10.1145\/3395351"],"URL":"https:\/\/doi.org\/10.1145\/3395351.3399421","relation":{},"subject":[],"published":{"date-parts":[[2020,7,8]]},"assertion":[{"value":"2020-07-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}