{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:27:33Z","timestamp":1771702053030,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2204785, CNS-2205868"],"award-info":[{"award-number":["CNS-2204785, CNS-2205868"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607225","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"46-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2072-3005","authenticated-orcid":false,"given":"Xuening","family":"Xu","sequence":"first","affiliation":[{"name":"Stevens Institute of Technology, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6555-9858","authenticated-orcid":false,"given":"Chenglong","family":"Fu","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4235-9671","authenticated-orcid":false,"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. Amazon Alexa. https:\/\/developer.amazon.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2023. Constrained Application Protocol. https:\/\/en.wikipedia.org\/wiki\/Constrained_Application_Protocol."},{"key":"e_1_3_2_1_3_1","unstructured":"2023. Eclipse Mosquitto - An open source MQTT broker.https:\/\/mosquitto.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2023. GoControl HUSBZB-1 USB Stick.https:\/\/www.gocontrol.com\/detail.php?productId=6."},{"key":"e_1_3_2_1_5_1","unstructured":"2023. Google Cloud Free Program. https:\/\/cloud.google.com\/free\/docs\/gcp-free-tier\/#compute."},{"key":"e_1_3_2_1_6_1","unstructured":"2023. Home Assistant \u2013 Open source home automation that puts local control and privacy first. https:\/\/www.home-assistant.io\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2023. Homebridge \u2013 Bringing HomeKit support where there is none. https:\/\/homebridge.io\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2023. HomKit. https:\/\/developer.apple.com\/homekit\/."},{"key":"e_1_3_2_1_9_1","unstructured":"2023. IFTTT - Every thing works better together.https:\/\/ifttt.com\/."},{"key":"e_1_3_2_1_10_1","unstructured":"2023. ioBroker \u2013 Automate your life. https:\/\/www.iobroker.net\/."},{"key":"e_1_3_2_1_11_1","unstructured":"2023. openHAB \u2013 an open-source platform for empowering home automa-tion. https:\/\/www.openhab.org\/."},{"key":"e_1_3_2_1_12_1","unstructured":"2023. OpenWrt. https:\/\/openwrt.org\/."},{"key":"e_1_3_2_1_13_1","unstructured":"2023. QUIC. https:\/\/en.wikipedia.org\/wiki\/QUIC."},{"key":"e_1_3_2_1_14_1","unstructured":"2023. SmartThings. https:\/\/www.smartthings.com\/."},{"key":"e_1_3_2_1_15_1","unstructured":"2023. SONOFF ZigBee 3.0 - a universal Zigbee USB stick."},{"key":"e_1_3_2_1_16_1","unstructured":"2023. Z-Wave JS UI - Fully configurable Zwave to MQTT Gateway and Control Panel.https:\/\/github.com\/zwave-js\/zwave-js-ui."},{"key":"e_1_3_2_1_17_1","unstructured":"2023. Zigbee2MQTT - Zigbee to MQTT bridge get rid of your proprietary Zigbee bridges.https:\/\/www.zigbee2mqtt.io\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399421"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-011-0340-4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354254"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3506859"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05284-2_2"},{"key":"e_1_3_2_1_23_1","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Celik Z\u00a0Berkay","year":"2018","unstructured":"Z\u00a0Berkay Celik, Patrick McDaniel, and Gang Tan. 2018. Soteria: Automated { IoT} Safety and Security Analysis. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). 147\u2013158."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Z\u00a0Berkay Celik Gang Tan and Patrick\u00a0D McDaniel. 2019. IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT.. In NDSS.","DOI":"10.14722\/ndss.2019.23326"},{"key":"e_1_3_2_1_25_1","volume-title":"Delay Wreaks Havoc on Your Smart Home: Delay-based: Automation Interference Attacks. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 1575\u20131575","author":"Chi Haotian","year":"2022","unstructured":"Haotian Chi, Chenglong Fu, Qiang Zeng, and Xiaojiang Du. 2022. Delay Wreaks Havoc on Your Smart Home: Delay-based: Automation Interference Attacks. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 1575\u20131575."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00056"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00062"},{"key":"e_1_3_2_1_28_1","volume-title":"Intel SGX explained. Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX explained. Cryptology ePrint Archive (2016)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4652-y"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2018.8598138"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24368"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6684-z"},{"key":"e_1_3_2_1_33_1","unstructured":"Nick Farina. [n. d.]. homebridge-dummy. https:\/\/www.npmjs.com\/package\/homebridge-dummy. (Accessed on 10\/10\/2022)."},{"key":"e_1_3_2_1_34_1","volume-title":"Internet of things security research: A rehash of old ideas or new intellectual challenges?IEEE Security & Privacy 15, 4","author":"Fernandes Earlence","year":"2017","unstructured":"Earlence Fernandes, Amir Rahmati, Kevin Eykholt, and Atul Prakash. 2017. Internet of things security research: A rehash of old ideas or new intellectual challenges?IEEE Security & Privacy 15, 4 (2017), 79\u201384."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00050"},{"key":"e_1_3_2_1_36_1","volume-title":"HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Fu Chenglong","year":"2021","unstructured":"Chenglong Fu, Qiang Zeng, and Xiaojiang Du. 2021. HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes. In 30th USENIX Security Symposium (USENIX Security 21). 4223\u20134240."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0528-1"},{"key":"e_1_3_2_1_38_1","unstructured":"Gigamon. 2016. Understanding network taps \u2013 the first step to visibility. https:\/\/www.gigamon.com\/resources\/resource-library\/white-paper\/understanding-network-taps-first-step-to-visibility.html."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00038"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC48278.2020.9217236"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397333"},{"key":"e_1_3_2_1_42_1","volume-title":"ASD: ARP Spoofing Detector Using OpenWrt. Security and Communication Networks 2022","author":"Jeong Yeonseon","year":"2022","unstructured":"Yeonseon Jeong, Hyunghoon Kim, and Hyo\u00a0Jin Jo. 2022. ASD: ARP Spoofing Detector Using OpenWrt. Security and Communication Networks 2022 (2022)."},{"key":"e_1_3_2_1_43_1","volume-title":"NDSS, Vol.\u00a02.","author":"Jia Yunhan\u00a0Jack","unstructured":"Yunhan\u00a0Jack Jia, Qi\u00a0Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing\u00a0Morley Mao, Atul Prakash, and SJ Unviersity. 2017. ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.. In NDSS, Vol.\u00a02. San Diego, 2\u20132."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.155"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3019812"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095237"},{"key":"e_1_3_2_1_47_1","unstructured":"Christoph Mayer. [n. d.]. XArp. http:\/\/www.xarp.net\/. (Accessed on 09\/20\/2022)."},{"key":"e_1_3_2_1_48_1","volume-title":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2177\u20132184","author":"Miettinen Markus","year":"2017","unstructured":"Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N Asokan, Ahmad-Reza Sadeghi, and Sasu Tarkoma. 2017. Iot sentinel: Automated device-type identification for security enforcement in iot. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2177\u20132184."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627788.2627798"},{"key":"e_1_3_2_1_50_1","unstructured":"Andrea\u00a0Di Pasquale. 2016. ArpON. https:\/\/arpon.sourceforge.io\/. (Accessed on 09\/20\/2022)."},{"key":"e_1_3_2_1_51_1","volume-title":"Denial of service attacks in wireless networks: The case of jammers","author":"Pelechrinis Konstantinos","year":"2010","unstructured":"Konstantinos Pelechrinis, Marios Iliofotou, and Srikanth\u00a0V Krishnamurthy. 2010. Denial of service attacks in wireless networks: The case of jammers. IEEE Communications surveys & tutorials 13, 2 (2010), 245\u2013257."},{"key":"e_1_3_2_1_52_1","unstructured":"Alan Reed. 2017. ARP-Defense. https:\/\/github.com\/aarreedd\/ARP-Defense. (Accessed on 09\/20\/2022)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622243"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359840"},{"key":"e_1_3_2_1_55_1","volume-title":"d.]. Smart home device penetration in the U.S","year":"2021","unstructured":"Statista. [n. d.]. Smart home device penetration in the U.S. 2021. https:\/\/www.statista.com\/statistics\/1247351\/smart-home-device-us-household-penetration\/. (Accessed on 12\/01\/2022)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19214777"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24097"},{"key":"e_1_3_2_1_58_1","unstructured":"VERACODE. 2021. ARP Spoofing. https:\/\/www.veracode.com\/security\/arp-spoofing."},{"key":"e_1_3_2_1_59_1","volume-title":"An introduction to arp spoofing. Node99 [Online Document]","author":"Whalen Sean","year":"2001","unstructured":"Sean Whalen. 2001. An introduction to arp spoofing. Node99 [Online Document] (2001)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.013"},{"key":"e_1_3_2_1_61_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Yu Lingjing","year":"2020","unstructured":"Lingjing Yu, Bo Luo, Jun Ma, Zhaoyu Zhou, and Qingyun Liu. 2020. You Are What You Broadcast: Identification of Mobile and { IoT} Devices from (Public){ WiFi}. In 29th USENIX Security Symposium (USENIX Security 20). 55\u201372."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243820"}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Hong Kong China","acronym":"RAID 2023"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607225","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607225","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:35Z","timestamp":1750178255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607225"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":62,"alternative-id":["10.1145\/3607199.3607225","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607225","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}