{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:58:44Z","timestamp":1750309124098,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Dartmouth College and American University of Kuwait (Dartmouth-AUK) fellowship program"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1955805,CNS-1955228"],"award-info":[{"award-number":["CNS-1955805,CNS-1955228"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,26]]},"DOI":"10.1145\/3603216.3624956","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T01:38:42Z","timestamp":1700703522000},"page":"129-134","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5815-9055","authenticated-orcid":false,"given":"Denise","family":"Anthony","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6943-0684","authenticated-orcid":false,"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1189-7063","authenticated-orcid":false,"given":"Weijia","family":"He","sequence":"additional","affiliation":[{"name":"Dartmouth College, Hanover, NH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1355-4566","authenticated-orcid":false,"given":"Mounib","family":"Khanafer","sequence":"additional","affiliation":[{"name":"American University of Kuwait, Salmiya, Kuwait"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4826-6134","authenticated-orcid":false,"given":"Susan","family":"Landau","sequence":"additional","affiliation":[{"name":"Tufts University, Medford, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2701-2703","authenticated-orcid":false,"given":"Ravindra","family":"Mangar","sequence":"additional","affiliation":[{"name":"Dartmouth College, Hanover, NH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8294-9946","authenticated-orcid":false,"given":"Nathan","family":"Reitinger","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Information Technologies and International Development","author":"Ahmed Syed Ishtiaque","year":"2017","unstructured":"Syed Ishtiaque Ahmed, Shion Guha, Mohammad Rashidujjaman Rifat, Faysal Hossain Shezan, and Nicola Dell. Privacy vulnerabilities in the practices of repairing broken digital artifacts in bangladesh. Information Technologies and International Development, 2017."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502097"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581360"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0064"},{"key":"e_1_3_2_1_5_1","volume-title":"A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic. arXiv preprint arXiv:1705.06805","author":"Apthorpe Noah","year":"2017","unstructured":"Noah Apthorpe, Dillon Reisman, and Nick Feamster. A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic. arXiv preprint arXiv:1705.06805, 2017."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of CI Symposium","author":"Bernd Julia","year":"2019","unstructured":"Julia Bernd, Alisa Frik, Maritza Johnson, and Nathan Malkin. Smart home bystanders: Further complexifying a complex context. In Proceedings of CI Symposium, 2019."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of 30th ACM Conference on Computer and Communications Security (CCS'23)","author":"Bloom Cara","year":"2023","unstructured":"Cara Bloom, Stuart Shapiro, Benjamin Ballard, Shelby Slotter, Mark Paes, Julie McEwen, Ryan Xu, and Samantha Katcher. The panoptic privacy threat model. In Proceedings of 30th ACM Conference on Computer and Communications Security (CCS'23). ACM, 2023."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/0003122414530398"},{"key":"e_1_3_2_1_9_1","volume-title":"Big data surveillance: The case of policing. American sociological review, 82(5):977--1008","author":"Brayne Sarah","year":"2017","unstructured":"Sarah Brayne. Big data surveillance: The case of policing. American sociological review, 82(5):977--1008, 2017."},{"key":"e_1_3_2_1_10_1","first-page":"3347","volume-title":"Hassan Khan. No Privacy in the Electronics Repair Industry. In IEEE Symposium on Security and Privacy (SP)","author":"Ceci Jason","year":"2023","unstructured":"Jason Ceci, Jonah Stegman, and Hassan Khan. No Privacy in the Electronics Repair Industry. In IEEE Symposium on Security and Privacy (SP), pages 3347--3364, 2023."},{"key":"e_1_3_2_1_11_1","first-page":"793","article-title":"Privacy harms","volume":"102","author":"Citron Danielle Keats","year":"2022","unstructured":"Danielle Keats Citron and Daniel J Solove. Privacy harms. BUL Rev., 102:793, 2022.","journal-title":"BUL Rev."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0060"},{"volume-title":"Live Life Brilliantly, https:\/\/www.control4.com\/","year":"2023","key":"e_1_3_2_1_13_1","unstructured":"Control4. Live Life Brilliantly, https:\/\/www.control4.com\/, 2023."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Diane J. Cook. How Smart Is Your Home? 335(6076):1579--1581.","DOI":"10.1126\/science.1217640"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546155.3546640"},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"Vijay Sivaraman. Combining MUD Policies with SDN for IoT Intrusion Detection. In Proceedings of the 2018 Workshop on IoT Security and Privacy - IoT S&P '18","author":"Hamza Ayyoob","year":"2018","unstructured":"Ayyoob Hamza, Hassan Habibi Gharakheili, and Vijay Sivaraman. Combining MUD Policies with SDN for IoT Intrusion Detection. In Proceedings of the 2018 Workshop on IoT Security and Privacy - IoT S&P '18, pages 1--7. ACM Press, 2018."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229566"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00036"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139941"},{"key":"e_1_3_2_1_20_1","volume-title":"Manufacturer Usage Description Specification draft-ietf-opsawg-mud-22","author":"Lear Eliot","year":"2018","unstructured":"Eliot Lear, Ralph Droms, and Dan Romascanu. Manufacturer Usage Description Specification draft-ietf-opsawg-mud-22, 2018."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.40"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Anna Maria Mandalari Daniel J. Dubois Roman Kolcun Muhammad Talha Paracha Hamed Haddadi and David Choffnes. Blocking Without Breaking: Identification and Mitigation of Non-Essential IoT Traffic. 2021(4).","DOI":"10.2478\/popets-2021-0075"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301293.3302371"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519777"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502137"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546719"},{"key":"e_1_3_2_1_27_1","first-page":"779","volume-title":"Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp '15","author":"Lim Woo","year":"2015","unstructured":"Jong-bum Woo and Youn-kyung Lim. User experience in do-it-yourself-style smart homes. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp '15, pages 779--790, New York, New York, USA, 2015. ACM Press."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 22nd Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603216.3624956","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603216.3624956","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603216.3624956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:11Z","timestamp":1750286951000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603216.3624956"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":28,"alternative-id":["10.1145\/3603216.3624956","10.1145\/3603216"],"URL":"https:\/\/doi.org\/10.1145\/3603216.3624956","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}