{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T05:15:40Z","timestamp":1754111740305,"version":"3.41.0"},"reference-count":131,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872243"],"award-info":[{"award-number":["61872243"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2022,5,31]]},"abstract":"<jats:p>\n            Recent years have seen the rapid development and integration of the Internet of Things (IoT) and cloud computing. The market is providing various consumer-oriented smart IoT devices; the mainstream cloud service providers are building their software stacks to support IoT services. With this emerging trend even growing, the security of such smart IoT cloud systems has drawn much research attention in recent years. To better understand the emerging consumer-oriented smart IoT cloud systems for practical engineers and new researchers, this article presents a review of the most recent research efforts on\n            <jats:italic>existing, real, already deployed<\/jats:italic>\n            consumer-oriented IoT cloud applications in the past five years using typical case studies. Specifically, we first present a general model for the IoT cloud ecosystem. Then, using the model, we review and summarize recent, representative research works on emerging smart IoT cloud system security using 10 detailed case studies, with the aim that the case studies together provide insights into the insecurity of current emerging IoT cloud systems. We further present a systematic approach to conduct a security analysis for IoT cloud systems. Based on the proposed security analysis approach, we review and suggest potential security risk mitigation methods to protect IoT cloud systems. We also discuss future research challenges for the IoT cloud security area.\n          <\/jats:p>","DOI":"10.1145\/3447625","type":"journal-article","created":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T03:42:46Z","timestamp":1620099766000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["IoT Cloud Security Review"],"prefix":"10.1145","volume":"54","author":[{"given":"Fei","family":"Chen","sequence":"first","affiliation":[{"name":"Shenzhen University, Shenzhen, China"}]},{"given":"Duming","family":"Luo","sequence":"additional","affiliation":[{"name":"Shenzhen University, Shenzhen, China"}]},{"given":"Tao","family":"Xiang","sequence":"additional","affiliation":[{"name":"Chongqing University, Chongqing, China"}]},{"given":"Ping","family":"Chen","sequence":"additional","affiliation":[{"name":"Open Security Research, Inc., Shenzhen, China"}]},{"given":"Junfeng","family":"Fan","sequence":"additional","affiliation":[{"name":"Open Security Research, Inc., Shenzhen, China"}]},{"given":"Hong-Linh","family":"Truong","sequence":"additional","affiliation":[{"name":"Aalto University, Konemiehentie, Espoo, Finland"}]}],"member":"320","published-online":{"date-parts":[[2021,5,3]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700332"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2934468"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292499"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.002"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0983-9"},{"key":"e_1_2_1_6_1","first-page":"2018.0047","volume-title":"IET Conference Proceedings. Retrieved from DOI:https:\/\/doi.org\/10","author":"Alharbi Rana","year":"2018"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSPA48992.2020.9068693"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"e_1_2_1_10_1","unstructured":"Ross Anderson and Shailendra Fuloria. 2011. Smart meter security: A survey. Retrieved from https:\/\/www.cl.cam.ac.uk\/ rja14\/Papers\/JSAC-draft.pdf.  Ross Anderson and Shailendra Fuloria. 2011. Smart meter security: A survey. Retrieved from https:\/\/www.cl.cam.ac.uk\/ rja14\/Papers\/JSAC-draft.pdf."},{"volume-title":"A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic. arXiv preprint arXiv:1705.06805","year":"2017","author":"Apthorpe Noah","key":"e_1_2_1_11_1"},{"volume-title":"COPPA. In Proceedings of the USENIX Security Symposium. 123--140","year":"2019","author":"Apthorpe Noah","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991114"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2018.8301700"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11502760_3"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"volume-title":"Proceedings of the Systems and Information Engineering Design Symposium. IEEE, 147--152","author":"Bradley Cole","key":"e_1_2_1_18_1"},{"key":"e_1_2_1_19_1","first-page":"412","article-title":"System and methodology providing automation security analysis and network intrusion protection in an industrial environment","volume":"9","author":"Brandt David D.","year":"2016","journal-title":"US Patent"},{"key":"e_1_2_1_20_1","first-page":"4","article-title":"Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities","volume":"52","author":"Celik Z. Berkay","year":"2019","journal-title":"Comput. Surv."},{"volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC\u201918)","year":"2018","author":"Celik Z. Berkay","key":"e_1_2_1_21_1"},{"volume-title":"Proceedings of the Blackhat Conference.","year":"2014","author":"Cesare Silvio","key":"e_1_2_1_22_1"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2456027"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.164"},{"volume-title":"Proceedings of the 29th USENIX Security Symposium.","year":"2020","author":"Chen Yuxuan","key":"e_1_2_1_25_1"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2866423"},{"volume-title":"Proceedings of the IEEE 17th International Symposium on High Assurance Systems Engineering (HASE\u201916)","author":"Cleemput S.","key":"e_1_2_1_27_1"},{"volume-title":"Proceedings of the IEEE Security and Privacy Workshops (SPW\u201916)","author":"Copos B.","key":"e_1_2_1_28_1"},{"volume-title":"Vulnerability studies and security postures of IoT devices: A smart home case study","year":"2020","author":"Davis Brittany D.","key":"e_1_2_1_29_1"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398377"},{"volume-title":"Hacking lightbulbs: Security evaluation of the Philips hue personal wireless lighting system.","year":"2013","author":"Dhanjani N.","key":"e_1_2_1_31_1"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666623"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243865"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292674"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.024"},{"volume-title":"Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Comput. Commun. 140-141","year":"2019","author":"Domingo-Ferrer Josep","key":"e_1_2_1_36_1"},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Morris J. Dworkin. 2015. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. Federal Information Processing Standards (NIST FIPS) -- 202.  Morris J. Dworkin. 2015. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. Federal Information Processing Standards (NIST FIPS) -- 202.","DOI":"10.6028\/NIST.FIPS.202"},{"volume-title":"Proceedings of the 13th USENIX Conference on Usable Privacy and Security (SOUPS\u201917)","year":"2017","author":"Emami-Naeini Pardis","key":"e_1_2_1_38_1"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.036"},{"volume-title":"Juxhino Kavaja, Michele De Donno, and Nicola Dragoni.","year":"2020","author":"Favaretto Margherita","key":"e_1_2_1_40_1"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.43"},{"volume-title":"Maria Ganzha, Marcin Paprzycki, Miguel Montesinos, Antonio Liotta, and Miguel Llop.","year":"2018","author":"Fortino Giancarlo","key":"e_1_2_1_43_1"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.007"},{"volume-title":"Proceedings of the IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS\u201918)","author":"Gao C.","key":"e_1_2_1_45_1"},{"volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI\u201919)","year":"2019","author":"Geeng Christine","key":"e_1_2_1_46_1"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2015.7356560"},{"key":"e_1_2_1_48_1","first-page":"530","article-title":"Systems and methods for configuring baby monitor cameras to provide uniform data sets for analysis and to provide an advantageous view point of babies","volume":"9","author":"Glazer Assaf","year":"2016","journal-title":"US Patent"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2832849"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"volume-title":"Detecting compressed cleartext traffic from consumer Internet of Things devices. arXiv preprint arXiv:1805.02722","year":"2018","author":"Hahn Daniel","key":"e_1_2_1_52_1"},{"key":"e_1_2_1_53_1","first-page":"1","article-title":"A review of security in Internet of Things","volume":"108","author":"Harbi Yasmine","year":"2019","journal-title":"Wirel. Person. Commun."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2019.00091"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2573746"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277223"},{"key":"e_1_2_1_57_1","unstructured":"Kashmir Hill. 2014. Baby Monitor Hacker Still Terrorizing Babies And Their Parents. Retrieved from https:\/\/www.reshareworthy.com\/hacked-baby-monitor\/.  Kashmir Hill. 2014. Baby Monitor Hacker Still Terrorizing Babies And Their Parents. Retrieved from https:\/\/www.reshareworthy.com\/hacked-baby-monitor\/."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/22041451.2016.1266124"},{"volume-title":"Security vetting process of smart-home assistant applications: A first look and case studies. arXiv preprint arXiv:2001.04520","year":"2020","author":"Hu Hang","key":"e_1_2_1_60_1"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48674-1_20"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.03.005"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJITCA.2018.090172"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139941"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408793"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300031"},{"key":"e_1_2_1_68_1","unstructured":"Sylwia Kechiche. 2018. IoT: The next wave of connectivity and services. Retrieved from https:\/\/data.gsmaintelligence.com\/research\/research\/research-2018\/iot-the-next-wave-of-connectivity-and-services.  Sylwia Kechiche. 2018. IoT: The next wave of connectivity and services. Retrieved from https:\/\/data.gsmaintelligence.com\/research\/research\/research-2018\/iot-the-next-wave-of-connectivity-and-services."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.3390\/computers3010001"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375837"},{"volume-title":"Proceedings of 2nd International Conference on Advanced Computing and Software Engineering (ICACSE\u201919)","year":"2019","author":"Kumar Raj","key":"e_1_2_1_72_1"},{"volume-title":"Proceedings of the IEEE Global Communications Conference (GLOBECOM\u201917)","author":"Ling Z.","key":"e_1_2_1_73_1"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2707465"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948149"},{"key":"e_1_2_1_76_1","first-page":"3","article-title":"Light ears: Information leakage via smart lights","volume":"3","author":"Maiti Anindya","year":"2019","journal-title":"Proc. ACM Interact. Mob., Wear. Ubiq. Technol."},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3155921.3160640"},{"volume-title":"Proceedings of the 5th International Conference on Information Systems Security and Privacy. SciTePress.","year":"2019","author":"Agrafiotis Ioannis","key":"e_1_2_1_78_1"},{"volume-title":"\u201cperfectly secure","author":"Max J.","key":"e_1_2_1_79_1"},{"volume-title":"Proceedings of the Systems and Information Engineering Design Symposium. 132--137","author":"McAllister T. D.","key":"e_1_2_1_80_1"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2017.00009"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2019.8888125"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329842"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281440"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997469"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899007.2899008"},{"volume-title":"Proceedings of the 9th USENIX Conference on Offensive Technologies (WOOT\u201915)","year":"2015","author":"Pa Pa Yin Minn","key":"e_1_2_1_87_1"},{"key":"e_1_2_1_88_1","article-title":"A taxonomy and survey of IoT cloud applications","volume":"3","author":"Pflanzner T.","year":"2018","journal-title":"EAI Endor. Trans. Internet Things"},{"volume-title":"Cloud Infrastructures, Services, and IoT Systems for Smart Cities","author":"Puthal Deepak","key":"e_1_2_1_89_1"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745505"},{"volume-title":"Proceedings of the 25th USENIX Security Symposium. 963--978","year":"2016","author":"Reaves Bradley","key":"e_1_2_1_91_1"},{"key":"e_1_2_1_92_1","doi-asserted-by":"crossref","unstructured":"M. Dworkin E. Barker J. Nechvatal J. Foti L. Bassham E. Roback and J. Dray. 2001. Advanced encryption standard (AES). Federal Inf. Process. Stds. (NIST FIPS). National Institute of Standards and Technology Gaithersburg MD [online]. https:\/\/doi.org\/10.6028\/NIST.FIPS.197 (Accessed April 13 2021).  M. Dworkin E. Barker J. Nechvatal J. Foti L. Bassham E. Roback and J. Dray. 2001. Advanced encryption standard (AES). Federal Inf. Process. Stds. (NIST FIPS). National Institute of Standards and Technology Gaithersburg MD [online]. https:\/\/doi.org\/10.6028\/NIST.FIPS.197 (Accessed April 13 2021).","DOI":"10.6028\/NIST.FIPS.197"},{"volume-title":"Proceedings of the IEEE European Symposium on Security and Privacy. 3--12","author":"Ronen E.","key":"e_1_2_1_93_1"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.13"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWR.2018.8387234"},{"volume-title":"Proceedings of the 6th International Conference on Mobile Software Engineering and Systems (MOBILESoft\u201919)","author":"Schmeidl Florian","key":"e_1_2_1_96_1"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/2886012"},{"key":"e_1_2_1_98_1","doi-asserted-by":"crossref","unstructured":"J. Schuette and G. S. Brost. 2018. LUCON: Data flow control for message-based IoT systems. In Proceedings of the 17th IEEE International Conference on Trust Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE\u201918). 289--299.  J. Schuette and G. S. Brost. 2018. LUCON: Data flow control for message-based IoT systems. In Proceedings of the 17th IEEE International Conference on Trust Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE\u201918). 289--299.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00052"},{"volume-title":"Proceedings of the 20th International Conference on Advanced Communication Technology. IEEE, 172--177","year":"2018","author":"Seralathan Yogeesh","key":"e_1_2_1_99_1"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.003"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.027"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2460333"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939925"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"e_1_2_1_106_1","unstructured":"Inc. Somerset Recon. 2016. Hello Barbie Initial Security Analysis. Retrieved from https:\/\/static1.squarespace.com\/static\/543effd8e4b095fba39dfe59\/t\/56a66d424bf1187ad34383b2\/1453747529070\/HelloBarbieSecurityAnalysis.pdf.  Inc. Somerset Recon. 2016. Hello Barbie Initial Security Analysis. Retrieved from https:\/\/static1.squarespace.com\/static\/543effd8e4b095fba39dfe59\/t\/56a66d424bf1187ad34383b2\/1453747529070\/HelloBarbieSecurityAnalysis.pdf."},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2016.7561070"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2962586"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03213-1"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2015.7288421"},{"volume-title":"PARBAC: Priority-attribute based RBAC model for Azure IoT cloud","year":"2020","author":"Thakare Abhijeet","key":"e_1_2_1_112_1"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2015.23"},{"volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201919)","year":"2019","author":"Tu Yazhou","key":"e_1_2_1_114_1"},{"volume-title":"Proceedings of the Workshop on Internet of Things Security and Privacy (IoTS&P\u2019\u201917)","author":"Valente Junia","key":"e_1_2_1_115_1"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2017.7991968"},{"volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201919)","author":"Wang Qi","key":"e_1_2_1_117_1"},{"key":"e_1_2_1_118_1","unstructured":"Wikipedia. 2020. Amazon Alexa. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Amazon_Alexa.  Wikipedia. 2020. Amazon Alexa. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Amazon_Alexa."},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139939"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76481-8_4"},{"volume-title":"Internet protocol cameras with no password protection: An empirical investigation","author":"Xu Haitao","key":"e_1_2_1_122_1"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322431.3325107"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2019.8766420"},{"volume-title":"Proceedings of the 13th USENIX Conference on Usable Privacy and Security (SOUPS\u201917)","year":"2017","author":"Zeng Eric","key":"e_1_2_1_126_1"},{"volume-title":"Proceedings of the USENIX Security Symposium. 159--176","year":"2019","author":"Zeng Eric","key":"e_1_2_1_127_1"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00016"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243820"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23525"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.5555\/3361338.3361417"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447625","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:09Z","timestamp":1750200069000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447625"}},"subtitle":["A Case Study Approach Using Emerging Consumer-oriented Applications"],"short-title":[],"issued":{"date-parts":[[2021,5,3]]},"references-count":131,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,5,31]]}},"alternative-id":["10.1145\/3447625"],"URL":"https:\/\/doi.org\/10.1145\/3447625","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"type":"print","value":"0360-0300"},{"type":"electronic","value":"1557-7341"}],"subject":[],"published":{"date-parts":[[2021,5,3]]},"assertion":[{"value":"2019-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}