{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:22:58Z","timestamp":1773325378715,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ONR","award":["N00014-20-1-279"],"award-info":[{"award-number":["N00014-20-1-279"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,9]]},"DOI":"10.1145\/3474718.3474727","type":"proceedings-article","created":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T16:42:08Z","timestamp":1631032928000},"page":"49-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Towards Labeling On-Demand IoT Traffic"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Campos","sequence":"first","affiliation":[{"name":"Florida Institute of Technology, United States of America"}]},{"given":"TJ","family":"OConnor","sequence":"additional","affiliation":[{"name":"Florida Institute of Technology, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2021,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399421"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00184"},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon Web Services. 2021. Cloud Object Storage | Store & Retrieve Data Anywhere | Amazon Simple Storage Service (S3). https:\/\/aws.amazon.com\/s3\/  Amazon Web Services. 2021. Cloud Object Storage | Store & Retrieve Data Anywhere | Amazon Simple Storage Service (S3). https:\/\/aws.amazon.com\/s3\/"},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX Security","author":"Antonakakis Manos","unstructured":"Manos Antonakakis , Tim April , Michael Bailey , Matt Bernhard , Elie Bursztein , Jaime Cochran , Zakir Durumeric , J\u00a0Alex Halderman , Luca Invernizzi , Michalis Kallitsis , 2017. Understanding the mirai botnet . In USENIX Security . USENIX , Vancouver, Canada , 1093\u20131110. Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J\u00a0Alex Halderman, Luca Invernizzi, Michalis Kallitsis, 2017. Understanding the mirai botnet. In USENIX Security. USENIX, Vancouver, Canada, 1093\u20131110."},{"key":"e_1_3_2_1_5_1","unstructured":"Dell Cameron and Dhruv Mehrotra. 2021. Ring\u2019s Neighbors Data Let Us Map Amazon\u2019s Home Surveillance Network. https:\/\/gizmodo.com\/ring-s-hidden-data-let-us-map-amazons-sprawling-home-su-1840312279  Dell Cameron and Dhruv Mehrotra. 2021. Ring\u2019s Neighbors Data Let Us Map Amazon\u2019s Home Surveillance Network. https:\/\/gizmodo.com\/ring-s-hidden-data-let-us-map-amazons-sprawling-home-su-1840312279"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318216.3363379"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2012.38"},{"key":"e_1_3_2_1_8_1","unstructured":"Erin Dooley. 2021. ADT Technician Pleads Guilty to Hacking Home Security Footage. https:\/\/www.justice.gov\/usao-ndtx\/pr\/adt-technician-pleads-guilty-hacking-home-security-footage  Erin Dooley. 2021. ADT Technician Pleads Guilty to Hacking Home Security Footage. https:\/\/www.justice.gov\/usao-ndtx\/pr\/adt-technician-pleads-guilty-hacking-home-security-footage"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_3_2_1_10_1","unstructured":"Jason Kelley and\u00a0Matthew Guariglia. 2020. Amazon Ring Must End Its Dangerous Partnerships With Police. https:\/\/www.eff.org\/deeplinks\/2020\/06\/amazon-ring-must-end-its-dangerous-partnerships-police  Jason Kelley and\u00a0Matthew Guariglia. 2020. Amazon Ring Must End Its Dangerous Partnerships With Police. https:\/\/www.eff.org\/deeplinks\/2020\/06\/amazon-ring-must-end-its-dangerous-partnerships-police"},{"key":"e_1_3_2_1_11_1","volume-title":"Selective Forwarding Attack on IoT Home Security Kits. In European Symposium on Research in Computer Security","author":"Hariri Ali","year":"2019","unstructured":"Ali Hariri , Nicolas Giannelos , and Budi Arief . 2019 . Selective Forwarding Attack on IoT Home Security Kits. In European Symposium on Research in Computer Security . Springer, Luxembourg, September, 360\u2013373. Ali Hariri, Nicolas Giannelos, and Budi Arief. 2019. Selective Forwarding Attack on IoT Home Security Kits. In European Symposium on Research in Computer Security. Springer, Luxembourg, September, 360\u2013373."},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX Security","author":"He Weijia","unstructured":"Weijia He , Maximilian Golla , Roshni Padhi , Jordan Ofek , Markus D\u00fcrmuth , Earlence Fernandes , and Blase Ur. 2018. Rethinking access control and authentication for the home internet of things (iot) . In USENIX Security . USENIX , Baltimore, MD , 255\u2013272. Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus D\u00fcrmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking access control and authentication for the home internet of things (iot). In USENIX Security. USENIX, Baltimore, MD, 255\u2013272."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397333"},{"key":"e_1_3_2_1_14_1","volume-title":"Never Ending Story: Authentication and Access Control Design Flaws in Shared IoT Devices. In Security and Privacy Workshops (SPW). IEEE","author":"Janes Blake","year":"2020","unstructured":"Blake Janes , Heather Crawford , and TJ O Connor . 2020 . Never Ending Story: Authentication and Access Control Design Flaws in Shared IoT Devices. In Security and Privacy Workshops (SPW). IEEE , San Francisco, CA, 104\u2013109. Blake Janes, Heather Crawford, and TJ OConnor. 2020. Never Ending Story: Authentication and Access Control Design Flaws in Shared IoT Devices. In Security and Privacy Workshops (SPW). IEEE, San Francisco, CA, 104\u2013109."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_2_1_16_1","unstructured":"Knud Lueth. 2020. State of the IoT 2020: 12 billion IoT connections surpassing non-IoT for the first time. https:\/\/iot-analytics.com\/state-of-the-iot-2020-12-billion-iot-connections-surpassing-non-iot-for-the-first-time\/  Knud Lueth. 2020. State of the IoT 2020: 12 billion IoT connections surpassing non-IoT for the first time. https:\/\/iot-analytics.com\/state-of-the-iot-2020-12-billion-iot-connections-surpassing-non-iot-for-the-first-time\/"},{"key":"e_1_3_2_1_17_1","volume-title":"International Conference on Distributed Computing Systems (ICDCS). IEEE","author":"Miettinen Markus","year":"2017","unstructured":"Markus Miettinen , Samuel Marchal , Ibbad Hafeez , N Asokan , Ahmad-Reza Sadeghi , and Sasu Tarkoma . 2017 . Iot sentinel: Automated device-type identification for security enforcement in iot . In International Conference on Distributed Computing Systems (ICDCS). IEEE , Atlanta, GA, 2177\u20132184. Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N Asokan, Ahmad-Reza Sadeghi, and Sasu Tarkoma. 2017. Iot sentinel: Automated device-type identification for security enforcement in iot. In International Conference on Distributed Computing Systems (ICDCS). IEEE, Atlanta, GA, 2177\u20132184."},{"key":"e_1_3_2_1_18_1","first-page":"1063","volume-title":"IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT. In International Conference on Distributed Computing Systems (ICDCS). IEEE","author":"Miettinen M.","year":"2017","unstructured":"M. Miettinen , S. Marchal , I. Hafeez , T. Frassetto , N. Asokan , A. Sadeghi , and S. Tarkoma . 2017 . IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT. In International Conference on Distributed Computing Systems (ICDCS). IEEE , Atlanta, GA, 2511\u20132514. https:\/\/doi.org\/10.1109\/ICDCS. 2017 .284 ISSN: 1063 - 6927 . M. Miettinen, S. Marchal, I. Hafeez, T. Frassetto, N. Asokan, A. Sadeghi, and S. Tarkoma. 2017. IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT. In International Conference on Distributed Computing Systems (ICDCS). IEEE, Atlanta, GA, 2511\u20132514. https:\/\/doi.org\/10.1109\/ICDCS.2017.284 ISSN: 1063-6927."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329857"},{"key":"e_1_3_2_1_20_1","volume-title":"Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things. In ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). ACM","author":"Connor TJ","year":"2019","unstructured":"TJ O Connor , William Enck , and Bradley. Reaves. 2019 . Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things. In ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). ACM , Miami,FL, 140\u2013150. TJ OConnor, William Enck, and Bradley. Reaves. 2019. Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things. In ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). ACM, Miami,FL, 140\u2013150."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323409"},{"key":"e_1_3_2_1_22_1","unstructured":"A Parmisano S Garcia and MJ Erquiaga. 2020. A Labeled Dataset with Malicious and Benign IoT Network Traffic.  A Parmisano S Garcia and MJ Erquiaga. 2020. A Labeled Dataset with Malicious and Benign IoT Network Traffic."},{"key":"e_1_3_2_1_23_1","unstructured":"Kari Paul. 2020. Dozens sue Amazon\u015b Ring after camera hack leads to threats and racial slurs. http:\/\/www.theguardian.com\/technology\/2020\/dec\/23\/amazon-ring-camera-hack-lawsuit-threats Section: Technology.  Kari Paul. 2020. Dozens sue Amazon\u015b Ring after camera hack leads to threats and racial slurs. http:\/\/www.theguardian.com\/technology\/2020\/dec\/23\/amazon-ring-camera-hack-lawsuit-threats Section: Technology."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00037"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"e_1_3_2_1_26_1","volume-title":"Internet of Things: SMART 2012\/0053","author":"Schindler Helen\u00a0Rebecca","year":"2013","unstructured":"Helen\u00a0Rebecca Schindler , Jonathan Cave , Neil Robinson , Veronika Horvath , Petal Hackett , Salil Gunashekar , Maarten Botterman , Simon Forge , and Hans Graux . 2013 . Europe\u2019s policy options for a dynamic and trustworthy development of the Internet of Things: SMART 2012\/0053 . RAND Corporation, Santa Monica, CA. https:\/\/doi.org\/10.7249\/RR356 Helen\u00a0Rebecca Schindler, Jonathan Cave, Neil Robinson, Veronika Horvath, Petal Hackett, Salil Gunashekar, Maarten Botterman, Simon Forge, and Hans Graux. 2013. Europe\u2019s policy options for a dynamic and trustworthy development of the Internet of Things: SMART 2012\/0053. RAND Corporation, Santa Monica, CA. https:\/\/doi.org\/10.7249\/RR356"},{"key":"e_1_3_2_1_27_1","first-page":"1","article-title":"HANZO: Collaborative Network Defense for Connected Things. In 2018 Principles, Systems and Applications of IP Telecommunications (IPTComm). IEEE","author":"Singh Aman","year":"2018","unstructured":"Aman Singh , Shashank Murali , Lalka Rieger , Ruoyu Li , Stefan Hommes , Radu State , Gaston Ormazabal , and Henning Schulzrinne . 2018 . HANZO: Collaborative Network Defense for Connected Things. In 2018 Principles, Systems and Applications of IP Telecommunications (IPTComm). IEEE , Chicago , IL , 1 \u2013 8 . Aman Singh, Shashank Murali, Lalka Rieger, Ruoyu Li, Stefan Hommes, Radu State, Gaston Ormazabal, and Henning Schulzrinne. 2018. HANZO: Collaborative Network Defense for Connected Things. In 2018 Principles, Systems and Applications of IP Telecommunications (IPTComm). IEEE, Chicago, IL, 1\u20138.","journal-title":"Chicago"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Vijay Sivaraman Hassan\u00a0Habibi Gharakheili Clinton Fernandes Narelle Clark and Tanya Karliychuk. 2018. Smart IoT devices in the home: Security and privacy implications. 71\u201379\u00a0pages.  Vijay Sivaraman Hassan\u00a0Habibi Gharakheili Clinton Fernandes Narelle Clark and Tanya Karliychuk. 2018. Smart IoT devices in the home: Security and privacy implications. 71\u201379\u00a0pages.","DOI":"10.1109\/MTS.2018.2826079"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2855563"},{"key":"e_1_3_2_1_31_1","volume-title":"Packet-Level Signatures for Smart Home Devices. In Network and Distributed Systems Security Symposium. Internet Society","author":"Trimananda Rahmadi","year":"2020","unstructured":"Rahmadi Trimananda , Janus Varmarken , Athina Markopoulou , and Brian Demsky . 2020 . Packet-Level Signatures for Smart Home Devices. In Network and Distributed Systems Security Symposium. Internet Society , San Diego, CA, 1\u201318. Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, and Brian Demsky. 2020. Packet-Level Signatures for Smart Home Devices. In Network and Distributed Systems Security Symposium. Internet Society, San Diego, CA, 1\u201318."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399357"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2019.8669423"},{"key":"e_1_3_2_1_34_1","unstructured":"Bin Yuan Yan Jia Luyi Xing Dongfang Zhao XiaoFeng Wang and Yuqing Zhang. 2020. Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation. In USENIX Security. USENIX Virtual Event 1183\u20131200.  Bin Yuan Yan Jia Luyi Xing Dongfang Zhao XiaoFeng Wang and Yuqing Zhang. 2020. Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation. In USENIX Security. USENIX Virtual Event 1183\u20131200."}],"event":{"name":"CSET '21: Cyber Security Experimentation and Test Workshop","location":"Virtual CA USA","acronym":"CSET '21"},"container-title":["Cyber Security Experimentation and Test Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474718.3474727","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474718.3474727","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474718.3474727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:46Z","timestamp":1750191106000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474718.3474727"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":34,"alternative-id":["10.1145\/3474718.3474727","10.1145\/3474718"],"URL":"https:\/\/doi.org\/10.1145\/3474718.3474727","relation":{},"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"2021-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}