{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T18:02:00Z","timestamp":1774720920652,"version":"3.50.1"},"reference-count":51,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T00:00:00Z","timestamp":1592179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2020,6,15]]},"abstract":"<jats:p>The proliferation of smart home devices has created new opportunities for empirical research in ubiquitous computing, ranging from security and privacy to personal health. Yet, data from smart home deployments are hard to come by, and existing empirical studies of smart home devices typically involve only a small number of devices in lab settings. To contribute to data-driven smart home research, we crowdsource the largest known dataset of labeled network traffic from smart home devices from within real-world home networks. To do so, we developed and released IoT Inspector, an open-source tool that allows users to observe the traffic from smart home devices on their own home networks. Between April 10, 2019 and January 21, 2020, 5,404 users have installed IoT Inspector, allowing us to collect labeled network traffic from 54,094 smart home devices. At the time of publication, IoT Inspector is still gaining users and collecting data from more devices. We demonstrate how this data enables new research into smart homes through two case studies focused on security and privacy. First, we find that many device vendors, including Amazon and Google, use outdated TLS versions and send unencrypted traffic, sometimes to advertising and tracking services. Second, we discover that smart TVs from at least 10 vendors communicated with advertising and tracking services. Finally, we find widespread cross-border communications, sometimes unencrypted, between devices and Internet services that are located in countries with potentially poor privacy practices. To facilitate future reproducible research in smart homes, we will release the IoT Inspector data to the public.<\/jats:p>","DOI":"10.1145\/3397333","type":"journal-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T22:30:37Z","timestamp":1592260237000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":111,"title":["IoT Inspector"],"prefix":"10.1145","volume":"4","author":[{"given":"Danny Yuxing","family":"Huang","sequence":"first","affiliation":[{"name":"Princeton University"}]},{"given":"Noah","family":"Apthorpe","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Frank","family":"Li","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Gunes","family":"Acar","sequence":"additional","affiliation":[{"name":"imec-COSIC KU Leuven"}]},{"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"University of Chicago"}]}],"member":"320","published-online":{"date-parts":[[2020,6,15]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Understanding the Mirai Botnet,\" in USENIX Security Symposium","author":"Antonakakis M.","year":"2017","unstructured":"M. Antonakakis , T. April , M. Bailey , M. Bernhard , E. Bursztein , J. Cochran , Z. Durumeric , J. A. Halderman , L. Invernizzi , M. Kallitsis , D. Kumar , C. Lever , Z. Ma , J. Mason , D. Menscher , C. Seaman , N. Sullivan , K. Thomas , and Y. Zhou , \" Understanding the Mirai Botnet,\" in USENIX Security Symposium , 2017 . M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, Z. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, and Y. Zhou, \"Understanding the Mirai Botnet,\" in USENIX Security Symposium, 2017."},{"issue":"1","key":"e_1_2_1_2_1","first-page":"978","volume":"6","author":"Chu G.","year":"2019","unstructured":"G. Chu , N. Apthorpe , and N. Feamster , \"Security and Privacy Analyses of Internet of Things Children's Toys,\" IEEE Internet of Things Journal , vol. 6 , no. 1 , pp. 978 -- 985 , 2019 . G. Chu, N. Apthorpe, and N. Feamster, \"Security and Privacy Analyses of Internet of Things Children's Toys,\" IEEE Internet of Things Journal, vol. 6, no. 1, pp. 978--985, 2019.","journal-title":"\"Security and Privacy Analyses of Internet of Things Children's Toys,\" IEEE Internet of Things Journal"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310073"},{"key":"e_1_2_1_4_1","volume-title":"Gartner Says 8.4 Billion Connected \"Things\" Will Be in Use","author":"van der Meulen Rob","year":"2017","unstructured":"Rob van der Meulen . ( 2017 ) Gartner Says 8.4 Billion Connected \"Things\" Will Be in Use in 2017, Up 31 Percent From 2016. [Online]. Available: https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016 Rob van der Meulen. (2017) Gartner Says 8.4 Billion Connected \"Things\" Will Be in Use in 2017, Up 31 Percent From 2016. [Online]. Available: https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016"},{"key":"e_1_2_1_5_1","volume-title":"All Things Considered: An Analysis of IoT Devices on Home Networks,\" in USENIX Security Symposium","author":"Kumar D.","year":"2019","unstructured":"D. Kumar , K. Shen , B. Case , D. Garg , G. Alperovich , D. Kuznetsov , R. Gupta , and Z. Durumeric , \" All Things Considered: An Analysis of IoT Devices on Home Networks,\" in USENIX Security Symposium , 2019 . D. Kumar, K. Shen, B. Case, D. Garg, G. Alperovich, D. Kuznetsov, R. Gupta, and Z. Durumeric, \"All Things Considered: An Analysis of IoT Devices on Home Networks,\" in USENIX Security Symposium, 2019."},{"key":"e_1_2_1_6_1","volume-title":"Keeping the smart home private with smart (er) iot traffic shaping,\" arXiv preprint arXiv:1812.00955","author":"Apthorpe N.","year":"2018","unstructured":"N. Apthorpe , D. Y. Huang , D. Reisman , A. Narayanan , and N. Feamster , \" Keeping the smart home private with smart (er) iot traffic shaping,\" arXiv preprint arXiv:1812.00955 , 2018 . N. Apthorpe, D. Y. Huang, D. Reisman, A. Narayanan, and N. Feamster, \"Keeping the smart home private with smart (er) iot traffic shaping,\" arXiv preprint arXiv:1812.00955, 2018."},{"key":"e_1_2_1_7_1","first-page":"7","volume-title":"ACM","author":"Wood D.","year":"2017","unstructured":"D. Wood , N. Apthorpe , and N. Feamster , \" Cleartext Data Transmissions in Consumer IoT Medical Devices,\" in Proceedings of the 2017 Workshop on Internet of Things Security and Privacy . ACM , 2017 , pp. 7 -- 12 . D. Wood, N. Apthorpe, and N. Feamster, \"Cleartext Data Transmissions in Consumer IoT Medical Devices,\" in Proceedings of the 2017 Workshop on Internet of Things Security and Privacy. ACM, 2017, pp. 7--12."},{"key":"e_1_2_1_8_1","volume-title":"A Testbed for Deploying Measurements and Applications in Broadband Access Networks,\" in USENIX Annual Technical Conference (ATC)","author":"Sundaresan S.","year":"2014","unstructured":"S. Sundaresan , S. Burnett , N. Feamster , and W. De Donato , \"BISmark : A Testbed for Deploying Measurements and Applications in Broadband Access Networks,\" in USENIX Annual Technical Conference (ATC) , 2014 . S. Sundaresan, S. Burnett, N. Feamster, and W. De Donato, \"BISmark: A Testbed for Deploying Measurements and Applications in Broadband Access Networks,\" in USENIX Annual Technical Conference (ATC), 2014."},{"key":"e_1_2_1_9_1","volume-title":"Information and Internet Policy","author":"Schmitt P.","year":"2018","unstructured":"P. Schmitt , F. Bronzino , R. Teixeira , T. Chattopadhyay , and N. Feamster , \" Enhancing transparency: Internet video quality inference from network traffic,\" Research Conference on Communications , Information and Internet Policy , 2018 . P. Schmitt, F. Bronzino, R. Teixeira, T. Chattopadhyay, and N. Feamster, \"Enhancing transparency: Internet video quality inference from network traffic,\" Research Conference on Communications, Information and Internet Policy, 2018."},{"key":"e_1_2_1_10_1","first-page":"327","volume-title":"Acquisitional rule-based engine for discovering internet-of-things devices,\" in USENIX Security Symposium","author":"Feng X.","year":"2018","unstructured":"X. Feng , Q. Li , H. Wang , and L. Sun , \" Acquisitional rule-based engine for discovering internet-of-things devices,\" in USENIX Security Symposium , 2018 , pp. 327 -- 341 . X. Feng, Q. Li, H. Wang, and L. Sun, \"Acquisitional rule-based engine for discovering internet-of-things devices,\" in USENIX Security Symposium, 2018, pp. 327--341."},{"key":"e_1_2_1_11_1","volume-title":"Kitsune: an ensemble of autoencoders for online network intrusion detection,\" Network and Distributed Systems Security Symposium (NDSS)","author":"Mirsky Y.","year":"2018","unstructured":"Y. Mirsky , T. Doitshman , Y. Elovici , and A. Shabtai , \" Kitsune: an ensemble of autoencoders for online network intrusion detection,\" Network and Distributed Systems Security Symposium (NDSS) , 2018 . Y. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, \"Kitsune: an ensemble of autoencoders for online network intrusion detection,\" Network and Distributed Systems Security Symposium (NDSS), 2018."},{"key":"e_1_2_1_12_1","first-page":"2177","volume-title":"June 2017","author":"Miettinen M.","unstructured":"M. Miettinen , S. Marchal , I. Hafeez , N. Asokan , A. Sadeghi , and S. Tarkoma , \" Iot sentinel: Automated device-type identification for security enforcement in iot,\" in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) , June 2017 , pp. 2177 -- 2184 . M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A. Sadeghi, and S. Tarkoma, \"Iot sentinel: Automated device-type identification for security enforcement in iot,\" in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), June 2017, pp. 2177--2184."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019878"},{"key":"e_1_2_1_14_1","first-page":"248","volume-title":"Ieee","author":"Deng J.","year":"2009","unstructured":"J. Deng , W. Dong , R. Socher , L.-J. Li , K. Li , and L. Fei-Fei , \" Imagenet: A large-scale hierarchical image database,\" in 2009 IEEE conference on computer vision and pattern recognition . Ieee , 2009 , pp. 248 -- 255 . J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. Fei-Fei, \"Imagenet: A large-scale hierarchical image database,\" in 2009 IEEE conference on computer vision and pattern recognition. Ieee, 2009, pp. 248--255."},{"key":"e_1_2_1_15_1","volume-title":"Why is My Internet Slow?: Making Network Speeds Visible,\" in SIGCHI Conference on Human Factors in Computing Systems (CHI)","author":"Chetty M.","year":"2011","unstructured":"M. Chetty , D. Haslem , A. Baird , U. Ofoha , B. Sumner , and R. Grinter , \" Why is My Internet Slow?: Making Network Speeds Visible,\" in SIGCHI Conference on Human Factors in Computing Systems (CHI) , 2011 . M. Chetty, D. Haslem, A. Baird, U. Ofoha, B. Sumner, and R. Grinter, \"Why is My Internet Slow?: Making Network Speeds Visible,\" in SIGCHI Conference on Human Factors in Computing Systems (CHI), 2011."},{"key":"e_1_2_1_16_1","volume-title":"Peeking Behind the NAT: An Empirical Study of Home Networks,\" in Internet Measurement Conference (IMC)","author":"Grover S.","year":"2013","unstructured":"S. Grover , M. S. Park , S. Sundaresan , S. Burnett , H. Kim , B. Ravi , and N. Feamster , \" Peeking Behind the NAT: An Empirical Study of Home Networks,\" in Internet Measurement Conference (IMC) , 2013 . S. Grover, M. S. Park, S. Sundaresan, S. Burnett, H. Kim, B. Ravi, and N. Feamster, \"Peeking Behind the NAT: An Empirical Study of Home Networks,\" in Internet Measurement Conference (IMC), 2013."},{"key":"e_1_2_1_17_1","volume-title":"Netalyzr: Illuminating the Edge Network,\" in ACM Internet Measurement Conference (IMC)","author":"Kreibich C.","year":"2010","unstructured":"C. Kreibich , N. Weaver , B. Nechaev , and V. Paxson , \" Netalyzr: Illuminating the Edge Network,\" in ACM Internet Measurement Conference (IMC) , 2010 . C. Kreibich, N. Weaver, B. Nechaev, and V. Paxson, \"Netalyzr: Illuminating the Edge Network,\" in ACM Internet Measurement Conference (IMC), 2010."},{"key":"e_1_2_1_18_1","volume-title":"Probe and Pray: Using UPnP for Home Network Measurements,\" in International Conference on Passive and Active Measurement (PAM)","author":"DiCioccio L.","year":"2012","unstructured":"L. DiCioccio , R. Teixeira , M. May , and C. Kreibich , \" Probe and Pray: Using UPnP for Home Network Measurements,\" in International Conference on Passive and Active Measurement (PAM) , 2012 . L. DiCioccio, R. Teixeira, M. May, and C. Kreibich, \"Probe and Pray: Using UPnP for Home Network Measurements,\" in International Conference on Passive and Active Measurement (PAM), 2012."},{"key":"e_1_2_1_19_1","volume-title":"Measuring Home Networks with HomeNet Profiler,\" in International Conference on Passive and Active Measurement (PAM)","author":"DiCioccio L.","year":"2013","unstructured":"L. DiCioccio , R. Teixeira , and C. Rosenberg , \" Measuring Home Networks with HomeNet Profiler,\" in International Conference on Passive and Active Measurement (PAM) , 2013 . L. DiCioccio, R. Teixeira, and C. Rosenberg, \"Measuring Home Networks with HomeNet Profiler,\" in International Conference on Passive and Active Measurement (PAM), 2013."},{"key":"e_1_2_1_20_1","author":"Shasha S.","year":"2018","unstructured":"S. Shasha , M. Mahmoud , M. Mannan , and A. Youssef , \"Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys,\" IEEE Internet of Things Journal , 2018 . S. Shasha, M. Mahmoud, M. Mannan, and A. Youssef, \"Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys,\" IEEE Internet of Things Journal, 2018.","journal-title":"\"Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys,\" IEEE Internet of Things Journal"},{"key":"e_1_2_1_21_1","volume-title":"Web-based Attacks to Discover and Control Local IoT Devices,\" in ACM SIGCOMM Workshop on IoT Security and Privacy (IoT S&P)","author":"Acar G.","year":"2018","unstructured":"G. Acar , D. Huang , F. Li , A. Narayanan , and N. Feamster , \" Web-based Attacks to Discover and Control Local IoT Devices,\" in ACM SIGCOMM Workshop on IoT Security and Privacy (IoT S&P) , 2018 . G. Acar, D. Huang, F. Li, A. Narayanan, and N. Feamster, \"Web-based Attacks to Discover and Control Local IoT Devices,\" in ACM SIGCOMM Workshop on IoT Security and Privacy (IoT S&P), 2018."},{"key":"e_1_2_1_22_1","unstructured":"IEEE. Organizationally unique identifier. [Online]. Available: http:\/\/standards-oui.ieee.org\/oui.txt  IEEE. Organizationally unique identifier. [Online]. Available: http:\/\/standards-oui.ieee.org\/oui.txt"},{"key":"e_1_2_1_23_1","unstructured":"Netdisco. Netdisco. [Online]. Available: https:\/\/github.com\/home-assistant\/netdisco  Netdisco. Netdisco. [Online]. Available: https:\/\/github.com\/home-assistant\/netdisco"},{"key":"e_1_2_1_24_1","unstructured":"Debian. Arpspoof - intercept packets on a switched lan. [Online]. Available: https:\/\/manpages.debian.org\/jessie\/dsniff\/arpspoof.8.en.html  Debian. Arpspoof - intercept packets on a switched lan. [Online]. Available: https:\/\/manpages.debian.org\/jessie\/dsniff\/arpspoof.8.en.html"},{"key":"e_1_2_1_25_1","unstructured":"inverse.ca. Fingerbank. [Online]. Available: https:\/\/fingerbank.org\/  inverse.ca. Fingerbank. [Online]. Available: https:\/\/fingerbank.org\/"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018602.2018609"},{"key":"e_1_2_1_27_1","unstructured":"F. Security. Farsight security passive dns faq. [Online]. Available: https:\/\/www.farsightsecurity.com\/technical\/passive-dns\/passive-dns-faq\/  F. Security. Farsight security passive dns faq. [Online]. Available: https:\/\/www.farsightsecurity.com\/technical\/passive-dns\/passive-dns-faq\/"},{"issue":"0","key":"e_1_2_1_28_1","volume":"9","author":"Libert T.","year":"2015","unstructured":"T. Libert , \" Exposing the invisible web: An analysis of third-party http requests on 1 million websites,\" International Journal of Communication , vol. 9 , no. 0 , 2015 . [Online]. Available: https:\/\/ijoc.org\/index.php\/ijoc\/article\/view\/3646 T. Libert, \"Exposing the invisible web: An analysis of third-party http requests on 1 million websites,\" International Journal of Communication, vol. 9, no. 0, 2015. [Online]. Available: https:\/\/ijoc.org\/index.php\/ijoc\/article\/view\/3646","journal-title":"International Journal of Communication"},{"key":"e_1_2_1_29_1","volume-title":"Disconnect tracking protection. [Online]. Available: https:\/\/github.com\/disconnectme\/disconnect-tracking-protection\/","year":"2019","unstructured":"DisconnectMe. ( 2019 ) Disconnect tracking protection. [Online]. Available: https:\/\/github.com\/disconnectme\/disconnect-tracking-protection\/ DisconnectMe. (2019) Disconnect tracking protection. [Online]. Available: https:\/\/github.com\/disconnectme\/disconnect-tracking-protection\/"},{"key":"e_1_2_1_30_1","volume-title":"Spy on your smart home with this open source research tool. [Online]. Available: https:\/\/techcrunch.com\/2019\/04\/13\/spy-on-your-smart-home-with-this-open-source-research-tool\/","author":"Lomas N.","year":"2019","unstructured":"N. Lomas . ( 2019 ) Spy on your smart home with this open source research tool. [Online]. Available: https:\/\/techcrunch.com\/2019\/04\/13\/spy-on-your-smart-home-with-this-open-source-research-tool\/ N. Lomas. (2019) Spy on your smart home with this open source research tool. [Online]. Available: https:\/\/techcrunch.com\/2019\/04\/13\/spy-on-your-smart-home-with-this-open-source-research-tool\/"},{"key":"e_1_2_1_31_1","volume-title":"You watch tv. your tv watches back. [Online]. Available: https:\/\/www.washingtonpost.com\/technology\/2019\/09\/18\/you-watch-tv-your-tv-watches-back\/","author":"Fowler G. A.","year":"2019","unstructured":"G. A. Fowler . ( 2019 ) You watch tv. your tv watches back. [Online]. Available: https:\/\/www.washingtonpost.com\/technology\/2019\/09\/18\/you-watch-tv-your-tv-watches-back\/ G. A. Fowler. (2019) You watch tv. your tv watches back. [Online]. Available: https:\/\/www.washingtonpost.com\/technology\/2019\/09\/18\/you-watch-tv-your-tv-watches-back\/"},{"key":"e_1_2_1_32_1","volume-title":"This simple tool will reveal the secret life of your smart home. [Online]. Available: https:\/\/gizmodo.com\/this-simple-tool-will-reveal-the-secret-life-of-your-sm-1832264323","author":"Hill K.","year":"2019","unstructured":"K. Hill . ( 2019 ) This simple tool will reveal the secret life of your smart home. [Online]. Available: https:\/\/gizmodo.com\/this-simple-tool-will-reveal-the-secret-life-of-your-sm-1832264323 K. Hill. (2019) This simple tool will reveal the secret life of your smart home. [Online]. Available: https:\/\/gizmodo.com\/this-simple-tool-will-reveal-the-secret-life-of-your-sm-1832264323"},{"key":"e_1_2_1_33_1","volume-title":"it's time for us to watch them': App lets you spy on alexa and the rest of your smart devices. [Online]. Available: https:\/\/www.cbc.ca\/news\/technology\/pringle-smart-home-privacy-1.5109347","author":"Pringle R.","year":"2019","unstructured":"R. Pringle . ( 2019 ) ' it's time for us to watch them': App lets you spy on alexa and the rest of your smart devices. [Online]. Available: https:\/\/www.cbc.ca\/news\/technology\/pringle-smart-home-privacy-1.5109347 R. Pringle. (2019) 'it's time for us to watch them': App lets you spy on alexa and the rest of your smart devices. [Online]. Available: https:\/\/www.cbc.ca\/news\/technology\/pringle-smart-home-privacy-1.5109347"},{"key":"e_1_2_1_34_1","volume-title":"Your smart tv is watching you. [Online]. Available: https:\/\/www.sciencefriday.com\/segments\/smart-tv-roku-spying\/","author":"Flatow I.","year":"2019","unstructured":"I. Flatow . ( 2019 ) Your smart tv is watching you. [Online]. Available: https:\/\/www.sciencefriday.com\/segments\/smart-tv-roku-spying\/ I. Flatow. (2019) Your smart tv is watching you. [Online]. Available: https:\/\/www.sciencefriday.com\/segments\/smart-tv-roku-spying\/"},{"key":"e_1_2_1_35_1","volume-title":"Message Queuing Telemetry Transport. [Online]. Available: http:\/\/mqtt.org\/","author":"MQTT.","year":"2019","unstructured":"MQTT. ( 2019 ) Message Queuing Telemetry Transport. [Online]. Available: http:\/\/mqtt.org\/ MQTT. (2019) Message Queuing Telemetry Transport. [Online]. Available: http:\/\/mqtt.org\/"},{"key":"e_1_2_1_36_1","volume-title":"ESNI: A Privacy-Protecting Upgrade to HTTPS. [Online]. Available: https:\/\/www.eff.org\/deeplinks\/2018\/09\/esni-privacy-protecting-upgrade-https","author":"Schoen Seth","year":"2019","unstructured":"Seth Schoen . ( 2019 ) ESNI: A Privacy-Protecting Upgrade to HTTPS. [Online]. Available: https:\/\/www.eff.org\/deeplinks\/2018\/09\/esni-privacy-protecting-upgrade-https Seth Schoen. (2019) ESNI: A Privacy-Protecting Upgrade to HTTPS. [Online]. Available: https:\/\/www.eff.org\/deeplinks\/2018\/09\/esni-privacy-protecting-upgrade-https"},{"key":"e_1_2_1_37_1","volume-title":"A milestone for Chrome security: marking HTTP as \"not secure\". [Online]. Available: https:\/\/www.blog.google\/products\/chrome\/milestone-chrome-security-marking-http-not-secure\/","author":"Schechter Emily","year":"2018","unstructured":"Emily Schechter . ( 2018 ) A milestone for Chrome security: marking HTTP as \"not secure\". [Online]. Available: https:\/\/www.blog.google\/products\/chrome\/milestone-chrome-security-marking-http-not-secure\/ Emily Schechter. (2018) A milestone for Chrome security: marking HTTP as \"not secure\". [Online]. Available: https:\/\/www.blog.google\/products\/chrome\/milestone-chrome-security-marking-http-not-secure\/"},{"key":"e_1_2_1_38_1","unstructured":"Marissa Wood. (2019) Today's Firefox Blocks Third-Party Tracking Cookies and Cryptomining by Default - The Mozilla Blog. [Online]. Available: https:\/\/blog.mozilla.org\/blog\/2019\/09\/03\/todays-firefox-blocks-third-party-tracking-cookies-and-cryptomining-by-default  Marissa Wood. (2019) Today's Firefox Blocks Third-Party Tracking Cookies and Cryptomining by Default - The Mozilla Blog. [Online]. Available: https:\/\/blog.mozilla.org\/blog\/2019\/09\/03\/todays-firefox-blocks-third-party-tracking-cookies-and-cryptomining-by-default"},{"key":"e_1_2_1_39_1","volume-title":"CCS '19","author":"Moghaddam H. Mohajeri","year":"2019","unstructured":"H. Mohajeri Moghaddam , G. Acar , B. Burgess , A. Mathur , D. Y. Huang , N. Feamster , E. W. Felten , P. Mittal , and A. Narayanan , \" Watching you watch: The tracking ecosystem of over-the-top tv streaming devices,\" in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, ser . CCS '19 . ACM, 2019 . H. Mohajeri Moghaddam, G. Acar, B. Burgess, A. Mathur, D. Y. Huang, N. Feamster, E. W. Felten, P. Mittal, and A. Narayanan, \"Watching you watch: The tracking ecosystem of over-the-top tv streaming devices,\" in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS '19. ACM, 2019."},{"key":"e_1_2_1_40_1","volume-title":"The security impact of https interception.\" in NDSS","author":"Durumeric Z.","year":"2017","unstructured":"Z. Durumeric , Z. Ma , D. Springall , R. Barnes , N. Sullivan , E. Bursztein , M. Bailey , J. A. Halderman , and V. Paxson , \" The security impact of https interception.\" in NDSS , 2017 . Z. Durumeric, Z. Ma, D. Springall, R. Barnes, N. Sullivan, E. Bursztein, M. Bailey, J. A. Halderman, and V. Paxson, \"The security impact of https interception.\" in NDSS, 2017."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143400"},{"key":"e_1_2_1_42_1","volume-title":"SoK: Security Evaluation of Home-Based IoT Deployments,\" in IEEE Symposium on Security and Privacy (S&P)","author":"Alrawi O.","year":"2019","unstructured":"O. Alrawi , C. Lever , M. Antonakakis , and F. Monrose , \" SoK: Security Evaluation of Home-Based IoT Deployments,\" in IEEE Symposium on Security and Privacy (S&P) , 2019 . O. Alrawi, C. Lever, M. Antonakakis, and F. Monrose, \"SoK: Security Evaluation of Home-Based IoT Deployments,\" in IEEE Symposium on Security and Privacy (S&P), 2019."},{"key":"e_1_2_1_43_1","doi-asserted-by":"crossref","unstructured":"K. McKay and D. Cooper. (2019 Aug) Guidelines for the Selection Configuration and Use of Transport Layer Security (TLS) Implementations.  K. McKay and D. Cooper. (2019 Aug) Guidelines for the Selection Configuration and Use of Transport Layer Security (TLS) Implementations.","DOI":"10.6028\/NIST.SP.800-52r2"},{"key":"e_1_2_1_44_1","volume-title":"Issue 436391: Add info on end of life of SSLVersionFallbackMin & SSLVersionMin policy in documentation. [Online]. Available: https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=436391","author":"Bugs Chromium","year":"2014","unstructured":"Chromium Bugs . ( 2014 ) Issue 436391: Add info on end of life of SSLVersionFallbackMin & SSLVersionMin policy in documentation. [Online]. Available: https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=436391 Chromium Bugs. (2014) Issue 436391: Add info on end of life of SSLVersionFallbackMin & SSLVersionMin policy in documentation. [Online]. Available: https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=436391"},{"key":"e_1_2_1_45_1","volume-title":"This poodle bites: exploiting the ssl 3.0 fallback,\" Security Advisory","author":"M\u00f6ller B.","year":"2014","unstructured":"B. M\u00f6ller , T. Duong , and K. Kotowicz , \" This poodle bites: exploiting the ssl 3.0 fallback,\" Security Advisory , 2014 . B. M\u00f6ller, T. Duong, and K. Kotowicz, \"This poodle bites: exploiting the ssl 3.0 fallback,\" Security Advisory, 2014."},{"key":"e_1_2_1_46_1","first-page":"1388","volume-title":"ACM","author":"Englehardt S.","year":"2016","unstructured":"S. Englehardt and A. Narayanan , \" Online tracking: A 1-million-site measurement and analysis,\" in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security . ACM , 2016 , pp. 1388 -- 1401 . S. Englehardt and A. Narayanan, \"Online tracking: A 1-million-site measurement and analysis,\" in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016, pp. 1388--1401."},{"key":"e_1_2_1_47_1","volume-title":"Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem","author":"Razaghpanah A.","year":"2018","unstructured":"A. Razaghpanah , R. Nithyanand , N. Vallina-Rodriguez , S. Sundaresan , M. Allman , C. Kreibich , and P. Gill , \" Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem ,\" 2018 . A. Razaghpanah, R. Nithyanand, N. Vallina-Rodriguez, S. Sundaresan, M. Allman, C. Kreibich, and P. Gill, \"Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem,\" 2018."},{"key":"e_1_2_1_48_1","volume-title":"Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping,\" in Proceedings on Privacy Enhancing Technologies Symposium (PETS)","author":"Apthorpe N.","year":"2019","unstructured":"N. Apthorpe , D. Y. Huang , D. Reisman , A. Narayanan , and N. Feamster , \" Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping,\" in Proceedings on Privacy Enhancing Technologies Symposium (PETS) , 2019 . N. Apthorpe, D. Y. Huang, D. Reisman, A. Narayanan, and N. Feamster, \"Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping,\" in Proceedings on Privacy Enhancing Technologies Symposium (PETS), 2019."},{"key":"e_1_2_1_49_1","first-page":"506","volume-title":"ACM","author":"Meidan Y.","year":"2017","unstructured":"Y. Meidan , M. Bohadana , A. Shabtai , J. D. Guarnizo , M. Ochoa , N. O. Tippenhauer , and Y. Elovici , \" Profiliot: a machine learning approach for iot device identification based on network traffic analysis,\" in Proceedings of the symposium on applied computing . ACM , 2017 , pp. 506 -- 509 . Y. Meidan, M. Bohadana, A. Shabtai, J. D. Guarnizo, M. Ochoa, N. O. Tippenhauer, and Y. Elovici, \"Profiliot: a machine learning approach for iot device identification based on network traffic analysis,\" in Proceedings of the symposium on applied computing. ACM, 2017, pp. 506--509."},{"key":"e_1_2_1_50_1","first-page":"106","volume-title":"ACM","author":"Ortiz J.","year":"2019","unstructured":"J. Ortiz , C. Crawford , and F. Le , \" DeviceMien: network device behavior modeling for identifying unknown IoT devices,\" in Proceedings of the International Conference on Internet of Things Design and Implementation . ACM , 2019 , pp. 106 -- 117 . J. Ortiz, C. Crawford, and F. Le, \"DeviceMien: network device behavior modeling for identifying unknown IoT devices,\" in Proceedings of the International Conference on Internet of Things Design and Implementation. ACM, 2019, pp. 106--117."},{"key":"e_1_2_1_51_1","first-page":"2177","volume-title":"IEEE","author":"Miettinen M.","year":"2017","unstructured":"M. Miettinen , S. Marchal , I. Hafeez , N. Asokan , A.-R. Sadeghi , and S. Tarkoma , \" Iot sentinel: Automated device-type identification for security enforcement in iot,\" in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) . IEEE , 2017 , pp. 2177 -- 2184 . M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A.-R. Sadeghi, and S. Tarkoma, \"Iot sentinel: Automated device-type identification for security enforcement in iot,\" in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017, pp. 2177--2184."}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397333","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3397333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:47Z","timestamp":1750201967000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397333"}},"subtitle":["Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale"],"short-title":[],"issued":{"date-parts":[[2020,6,15]]},"references-count":51,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6,15]]}},"alternative-id":["10.1145\/3397333"],"URL":"https:\/\/doi.org\/10.1145\/3397333","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,15]]},"assertion":[{"value":"2020-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}