{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T23:10:40Z","timestamp":1765667440806,"version":"3.41.0"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1950171"],"award-info":[{"award-number":["CNS-1950171"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. ACM Manag. Data"],"published-print":{"date-parts":[[2023,5,26]]},"abstract":"<jats:p>The interactions among automation configuration rule data have led to undesired and insecure issues in smart homes, which are known as interactive threats. Most existing solutions use program analysis to identify interactive threats among automation rules, which is not suitable for closed-source platforms. Meanwhile, security policy-based solutions suffer from low detection accuracy because the pre-defined security policies in a single platform can hardly cover diverse interactive threat types across heterogeneous platforms. In this paper, we propose Glint, the first graph learning-based system for interactive threat detection in smart homes. We design a multi-scale graph representation learning model, called ITGNN, for both homogeneous and heterogeneous interaction graph pattern learning. To facilitate graph learning, we build large interaction graph training datasets by multi-domain data fusion from five different platforms. Moreover, Glint detects drifting samples with contrastive learning and improves the generalization ability with transfer learning across heterogeneous platforms. Our evaluation shows that Glint achieves 95.5% accuracy in detecting interactive threats across the five platforms. Besides, we examine a set of user-designed blueprints in the Home Assistant platform and reveal four new types of real-world interactive threats, called \"action block\", \"action ablation\", \"trigger intake\", and \"condition duplicate\", which are cross-platform interactive threats captured by Glint.<\/jats:p>","DOI":"10.1145\/3588956","type":"journal-article","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T17:42:05Z","timestamp":1685468525000},"page":"1-27","source":"Crossref","is-referenced-by-count":6,"title":["Graph Learning for Interactive Threat Detection in Heterogeneous Smart Home Rule Data"],"prefix":"10.1145","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9353-9042","authenticated-orcid":false,"given":"Guangjing","family":"Wang","sequence":"first","affiliation":[{"name":"Michigan State University, East Lansing, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2325-2847","authenticated-orcid":false,"given":"Nikolay","family":"Ivanov","sequence":"additional","affiliation":[{"name":"Michigan State University, East Lansing, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0471-7063","authenticated-orcid":false,"given":"Bocheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Michigan State University, East Lansing, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7517-8888","authenticated-orcid":false,"given":"Qi","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign, Champaign, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4255-4592","authenticated-orcid":false,"given":"ThanhVu","family":"Nguyen","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6272-7668","authenticated-orcid":false,"given":"Qiben","family":"Yan","sequence":"additional","affiliation":[{"name":"Michigan State University, East Lansing, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,5,30]]},"reference":[{"key":"e_1_2_2_1_1","volume-title":"Kevin RB Butler, and Joseph Wilson","author":"Abdullah Hadi","year":"2019","unstructured":"Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin RB Butler, and Joseph Wilson. 2019. Practical hidden voice attacks against speech and speaker recognition systems. arXiv preprint arXiv:1904.05734 (2019)."},{"key":"e_1_2_2_2_1","volume-title":"IoTCOM: Dissecting Interaction Threats in IoT Systems","author":"Alhanahnah Mohannad","year":"2022","unstructured":"Mohannad Alhanahnah, Clay Stevens, Bocheng Chen, Qiben Yan, and Hamid Bagheri. 2022. IoTCOM: Dissecting Interaction Threats in IoT Systems. IEEE Transactions on Software Engineering (2022)."},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.1992.10475879"},{"key":"e_1_2_2_4_1","unstructured":"Amazon. 2022. Amazon Alexa Skills. https:\/\/www.amazon.com\/alexa-skills\/b?ie=UTF8&node=13727921011."},{"key":"e_1_2_2_5_1","unstructured":"Home Assistant. 2022. Home Assistant. https:\/\/www.home-assistant.io\/."},{"key":"e_1_2_2_6_1","unstructured":"Steven Bird Ewan Klein and Edward Loper. 2009. Natural language processing with Python: analyzing text with the natural language toolkit. \" O'Reilly Media.\"."},{"key":"e_1_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Z Berkay Celik Gang Tan and Patrick D McDaniel. 2019. IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT.. In NDSS.","DOI":"10.14722\/ndss.2019.23326"},{"key":"e_1_2_2_8_1","volume-title":"Noah Constant, Mario Guajardo-Cespedes, Steve Yuan, Chris Tar, et al.","author":"Cer Daniel","year":"2018","unstructured":"Daniel Cer, Yinfei Yang, Sheng-yi Kong, Nan Hua, Nicole Limtiaco, Rhomni St John, Noah Constant, Mario Guajardo-Cespedes, Steve Yuan, Chris Tar, et al. 2018. Universal sentence encoder. arXiv preprint arXiv:1803.11175 (2018)."},{"key":"e_1_2_2_9_1","volume-title":"Delay Wreaks Havoc on Your Smart Home: Delay-based: Automation Interference Attacks. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 1575--1575","author":"Chi Haotian","year":"2022","unstructured":"Haotian Chi, Chenglong Fu, Qiang Zeng, and Xiaojiang Du. 2022. Delay Wreaks Havoc on Your Smart Home: Delay-based: Automation Interference Attacks. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 1575--1575."},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243865"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24368"},{"key":"e_1_2_2_12_1","volume-title":"Jos\u00e9 MF Moura, and Soummya Kar","author":"Du Jian","year":"2017","unstructured":"Jian Du, Shanghang Zhang, Guanhang Wu, Jos\u00e9 MF Moura, and Soummya Kar. 2017b. Topology adaptive graph convolutional networks. arXiv preprint arXiv:1710.10370 (2017)."},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_2_2_14_1","volume-title":"30th USENIX Security Symposium.","author":"Fu Chenglong","year":"2021","unstructured":"Chenglong Fu, Qiang Zeng, and Xiaojiang Du. 2021. Hawatcher: Semantics-aware anomaly detection for appified smart homes. In 30th USENIX Security Symposium."},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380297"},{"key":"e_1_2_2_16_1","volume-title":"A survey on concept drift adaptation. ACM computing surveys (CSUR)","author":"Gama Jo","year":"2014","unstructured":"Jo ao Gama, Indr.e vZ liobait.e, Albert Bifet, Mykola Pechenizkiy, and Abdelhamid Bouchachia. 2014. A survey on concept drift adaptation. ACM computing surveys (CSUR), Vol. 46, 4 (2014), 1--37."},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00912"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2805830"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013878"},{"key":"e_1_2_2_20_1","unstructured":"IFTTT. 2022. IFTTT Applets. https:\/\/ifttt.com\/explore\/."},{"key":"e_1_2_2_21_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906406"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2013.03.013"},{"key":"e_1_2_2_24_1","first-page":"14093","article-title":"Graph cross networks with vertex infomax pooling","volume":"33","author":"Li Maosen","year":"2020","unstructured":"Maosen Li, Siheng Chen, Ya Zhang, and Ivor Tsang. 2020. Graph cross networks with vertex infomax pooling. Advances in Neural Information Processing Systems, Vol. 33 (2020), 14093--14105.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_2_25_1","volume-title":"Kai Ming Ting, and Zhi-Hua Zhou","author":"Liu Fei Tony","year":"2008","unstructured":"Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In 2008 eighth ieee international conference on data mining. IEEE, 413--422."},{"key":"e_1_2_2_26_1","volume-title":"Parameterized explainer for graph neural network. Advances in neural information processing systems","author":"Luo Dongsheng","year":"2020","unstructured":"Dongsheng Luo, Wei Cheng, Dongkuan Xu, Wenchao Yu, Bo Zong, Haifeng Chen, and Xiang Zhang. 2020. Parameterized explainer for graph neural network. Advances in neural information processing systems, Vol. 33 (2020), 19620--19631."},{"key":"e_1_2_2_27_1","unstructured":"OpenAI et al. 2023. GPT-4 Technical Report. arXiv preprint arXiv:2303.08774 (2023)."},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_2_2_29_1","doi-asserted-by":"crossref","unstructured":"John Platt et al. 1999. Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods. Advances in large margin classifiers Vol. 10 3 (1999) 61--74.","DOI":"10.7551\/mitpress\/1113.003.0008"},{"key":"e_1_2_2_30_1","volume-title":"2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 569--573","author":"Thomas","year":"2016","unstructured":"Thomas Pr\"atzlich, Jonathan Driedger, and Meinard M\u00fcller. 2016. Memory-restricted multiscale dynamic time warping. In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 569--573."},{"key":"e_1_2_2_31_1","volume-title":"Advances in Neural Information Processing Systems","volume":"33","author":"Ruiz Luana","year":"2020","unstructured":"Luana Ruiz, Luiz Chamon, and Alejandro Ribeiro. 2020. Graphon neural networks and the transferability of graph neural networks. Advances in Neural Information Processing Systems, Vol. 33 (2020)."},{"key":"e_1_2_2_32_1","volume-title":"Estimating the support of a high-dimensional distribution. Neural computation","author":"Sch\u00f6lkopf Bernhard","year":"2001","unstructured":"Bernhard Sch\u00f6lkopf, John C Platt, John Shawe-Taylor, Alex J Smola, and Robert C Williamson. 2001. Estimating the support of a high-dimensional distribution. Neural computation, Vol. 13, 7 (2001), 1443--1471."},{"key":"e_1_2_2_33_1","unstructured":"Scrapy. 2022. Web Crawling Framework. https:\/\/scrapy.org\/."},{"key":"e_1_2_2_34_1","unstructured":"SmartThings. 2022. SmartThings Developer. https:\/\/smartthings.developer.samsung.com\/docs\/api-ref\/capabilities.html."},{"key":"e_1_2_2_35_1","unstructured":"Spacy. 2022. Industrial-Strength Natural Language Processing. https:\/\/spacy.io\/."},{"key":"e_1_2_2_36_1","volume-title":"International Conference on Learning Representations.","author":"Sun Fan-Yun","year":"2020","unstructured":"Fan-Yun Sun, Jordon Hoffman, Vikas Verma, and Jian Tang. 2020. InfoGraph: Unsupervised and Semi-supervised Graph-Level Representation Learning via Mutual Information Maximization. In International Conference on Learning Representations."},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052709"},{"key":"e_1_2_2_38_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Tian Yuan","year":"2017","unstructured":"Yuan Tian, Nan Zhang, Yueh-Hsun Lin, XiaoFeng Wang, Blase Ur, Xianzheng Guo, and Patrick Tague. 2017. Smartauth: User-centered authorization for the internet of things. In 26th USENIX Security Symposium (USENIX Security 17)."},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409682"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858556"},{"key":"e_1_2_2_41_1","volume-title":"Federated IoT Interaction Vulnerability Analysis. In 2023 IEEE 39th International Conference on Data Engineering (ICDE). IEEE.","author":"Wang Guangjing","year":"2023","unstructured":"Guangjing Wang, Hanqing Guo, Anran Li, Xiaorui Liu, and Qiben Yan. 2023. Federated IoT Interaction Vulnerability Analysis. In 2023 IEEE 39th International Conference on Data Engineering (ICDE). IEEE."},{"key":"e_1_2_2_42_1","volume-title":"Highly-Performant Package for Graph Neural Networks. arXiv preprint arXiv:1909.01315","author":"Wang Minjie","year":"2019","unstructured":"Minjie Wang, Da Zheng, Zihao Ye, Quan Gan, Mufei Li, Xiang Song, Jinjing Zhou, Chao Ma, Lingfan Yu, Yu Gai, Tianjun Xiao, Tong He, George Karypis, Jinyang Li, and Zheng Zhang. 2019b. Deep Graph Library: A Graph-Centric, Highly-Performant Package for Graph Neural Networks. arXiv preprint arXiv:1909.01315 (2019)."},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345662"},{"key":"e_1_2_2_44_1","volume-title":"The lack of a priori distinctions between learning algorithms. Neural computation","author":"Wolpert David H","year":"1996","unstructured":"David H Wolpert. 1996. The lack of a priori distinctions between learning algorithms. Neural computation, Vol. 8, 7 (1996), 1341--1390."},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3076021"},{"key":"e_1_2_2_46_1","volume-title":"How powerful are graph neural networks? arXiv preprint arXiv:1810.00826","author":"Xu Keyulu","year":"2018","unstructured":"Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. 2018. How powerful are graph neural networks? arXiv preprint arXiv:1810.00826 (2018)."},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00130"},{"key":"e_1_2_2_48_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Yang Limin","year":"2021","unstructured":"Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, and Gang Wang. 2021b. $$CADE$$: Detecting and explaining concept drift samples for security applications. In 30th USENIX Security Symposium (USENIX Security 21). 2327--2344."},{"key":"e_1_2_2_49_1","volume-title":"How transferable are features in deep neural networks? arXiv preprint arXiv:1411.1792","author":"Yosinski Jason","year":"2014","unstructured":"Jason Yosinski, Jeff Clune, Yoshua Bengio, and Hod Lipson. 2014. How transferable are features in deep neural networks? arXiv preprint arXiv:1411.1792 (2014)."},{"key":"e_1_2_2_50_1","volume-title":"International Conference on Machine Learning. PMLR, 12241--12252","author":"Yuan Hao","year":"2021","unstructured":"Hao Yuan, Haiyang Yu, Jie Wang, Kang Li, and Shuiwang Ji. 2021. On explainability of graph neural networks via subgraph explorations. In International Conference on Machine Learning. PMLR, 12241--12252."},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16600"},{"key":"e_1_2_2_53_1","doi-asserted-by":"crossref","unstructured":"Ce Zhou Qian Li Chen Li Jun Yu Yixin Liu Guangjing Wang Kai Zhang Cheng Ji Qiben Yan Lifang He et al. 2023. A comprehensive survey on pretrained foundation models: A history from bert to chatgpt. arXiv preprint arXiv:2302.09419 (2023).","DOI":"10.1007\/s13042-024-02443-6"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS49365.2020.9212954"}],"container-title":["Proceedings of the ACM on Management of Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3588956","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3588956","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3588956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:38Z","timestamp":1750178858000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3588956"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,5,26]]}},"alternative-id":["10.1145\/3588956"],"URL":"https:\/\/doi.org\/10.1145\/3588956","relation":{},"ISSN":["2836-6573"],"issn-type":[{"type":"electronic","value":"2836-6573"}],"subject":[],"published":{"date-parts":[[2023,5,26]]}}}