{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:40:13Z","timestamp":1766428813248,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,12]]},"DOI":"10.1145\/3597926.3598084","type":"proceedings-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:12:53Z","timestamp":1689279173000},"page":"639-651","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Security Checking of Trigger-Action-Programming Smart Home Integrations"],"prefix":"10.1145","author":[{"given":"Lei","family":"Bu","sequence":"first","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Qiuping","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Suwan","family":"Li","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Jinglin","family":"Dai","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Guangdong","family":"Bai","sequence":"additional","affiliation":[{"name":"University of Queensland, Australia"}]},{"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, China"}]},{"given":"Xuandong","family":"Li","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2013. Google Weave.  https:\/\/openweave.io\/ \t\t\t\t  2013. Google Weave.  https:\/\/openweave.io\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2017. IFTTT Applets Data Set.  https:\/\/www-users.cs.umn.edu\/ fengqian\/ifttt_measurement\/ \t\t\t\t  2017. IFTTT Applets Data Set.  https:\/\/www-users.cs.umn.edu\/ fengqian\/ifttt_measurement\/"},{"key":"e_1_3_2_1_3_1","unstructured":"2019. Managing Devices with AWS IoT.  https:\/\/docs.aws.amazon.com\/iot\/latest\/developerguide\/iot-thing-management.html \t\t\t\t  2019. Managing Devices with AWS IoT.  https:\/\/docs.aws.amazon.com\/iot\/latest\/developerguide\/iot-thing-management.html"},{"key":"e_1_3_2_1_4_1","unstructured":"2019. SmartThings Classic Documentation.  https:\/\/docs.smartthings.com\/en\/latest\/capabilities-reference.html \t\t\t\t  2019. SmartThings Classic Documentation.  https:\/\/docs.smartthings.com\/en\/latest\/capabilities-reference.html"},{"key":"e_1_3_2_1_5_1","unstructured":"2019. SmartThings Community.  https:\/\/github.com\/SmartThingsCommunity \t\t\t\t  2019. SmartThings Community.  https:\/\/github.com\/SmartThingsCommunity"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14478-3_42"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FMCAD.2008.ECP.13"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185501"},{"key":"e_1_3_2_1_9_1","volume-title":"Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium, USENIX Security 2018","author":"Celik Z. Berkay","year":"2018","unstructured":"Z. Berkay Celik , Leonardo Babun , Amit Kumar Sikder , Hidayet Aksu , Gang Tan , Patrick D. McDaniel , and A. Selcuk Uluagac . 2018 . Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium, USENIX Security 2018 , Baltimore, MD, USA , August 15-17, 2018 . USENIX Association, 1687\u20131704. Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, and A. Selcuk Uluagac. 2018. Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018. USENIX Association, 1687\u20131704."},{"key":"e_1_3_2_1_10_1","volume-title":"Soteria: Automated IoT Safety and Security Analysis. In 2018 USENIX Annual Technical Conference, USENIX ATC 2018","author":"Celik Z. Berkay","year":"2018","unstructured":"Z. Berkay Celik , Patrick D. McDaniel , and Gang Tan . 2018 . Soteria: Automated IoT Safety and Security Analysis. In 2018 USENIX Annual Technical Conference, USENIX ATC 2018 , Boston, MA, USA , July 11-13, 2018. USENIX Association, 147\u2013158. Z. Berkay Celik, Patrick D. McDaniel, and Gang Tan. 2018. Soteria: Automated IoT Safety and Security Analysis. In 2018 USENIX Annual Technical Conference, USENIX ATC 2018, Boston, MA, USA, July 11-13, 2018. USENIX Association, 147\u2013158."},{"key":"e_1_3_2_1_11_1","volume-title":"IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019","author":"Celik Z. Berkay","year":"2019","unstructured":"Z. Berkay Celik , Gang Tan , and Patrick D . McDaniel. 2019 . IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019 , San Diego, California, USA , February 24-27, 2019 . The Internet Society. Z. Berkay Celik, Gang Tan, and Patrick D. McDaniel. 2019. IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. The Internet Society."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050046"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0025774"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4627"},{"key":"e_1_3_2_1_15_1","unstructured":"Jason Croft Ratul Mahajan Matthew Caesar and Madan Musuvathi. 2015. Systematically Exploring the Behavior of Control Programs. In USENIX ATC. 165\u2013176. \t\t\t\t  Jason Croft Ratul Mahajan Matthew Caesar and Madan Musuvathi. 2015. Systematically Exploring the Behavior of Control Programs. In USENIX ATC. 165\u2013176."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398377"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243865"},{"key":"e_1_3_2_1_18_1","volume-title":"IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021","author":"Ding Wenbo","year":"2021","unstructured":"Wenbo Ding , Hongxin Hu , and Long Cheng . 2021 . IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021 , virtually, February 21-25, 2021. The Internet Society. Wenbo Ding, Hongxin Hu, and Long Cheng. 2021. IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21-25, 2021. The Internet Society."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2015.12"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2899758"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23051"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517968.2517976"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737095.2737115"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993422.2993426"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2960690"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464838"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464838"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS2018.2018.00011"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS2018.2018.00011"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131369"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.283"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2015.19"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860484"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2696031"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843717"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281440"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560644"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052709"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345662"},{"key":"e_1_3_2_1_46_1","volume-title":"Fear and Logging in the Internet of Things. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Wang Qi","year":"2018","unstructured":"Qi Wang , Wajih Ul Hassan , Adam Bates , and Carl A. Gunter . 2018 . Fear and Logging in the Internet of Things. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018 , San Diego, California, USA , February 18-21, 2018 . The Internet Society. Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl A. Gunter. 2018. Fear and Logging in the Internet of Things. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018. The Internet Society."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00043"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116374"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.58"}],"event":{"name":"ISSTA '23: 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"],"location":"Seattle WA USA","acronym":"ISSTA '23"},"container-title":["Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598084","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597926.3598084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:42Z","timestamp":1750182522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,12]]},"references-count":51,"alternative-id":["10.1145\/3597926.3598084","10.1145\/3597926"],"URL":"https:\/\/doi.org\/10.1145\/3597926.3598084","relation":{},"subject":[],"published":{"date-parts":[[2023,7,12]]},"assertion":[{"value":"2023-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}