{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T12:58:23Z","timestamp":1761569903638,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","funder":[{"name":"National Key R&D Program of China","award":["Grant No.2022YFB4501803"],"award-info":[{"award-number":["Grant No.2022YFB4501803"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,20]]},"DOI":"10.1145\/3755881.3755922","type":"proceedings-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:46:17Z","timestamp":1761565577000},"page":"545-557","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["EnvGuard: Guaranteeing Environment-Centric Safety and Security Properties in Web of Things System"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2264-5729","authenticated-orcid":false,"given":"Bingkun","family":"Sun","sequence":"first","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3380-6811","authenticated-orcid":false,"given":"Jialin","family":"Ren","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7295-3808","authenticated-orcid":false,"given":"Juntao","family":"Luo","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8107-0590","authenticated-orcid":false,"given":"Liwei","family":"Shen","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1475-7281","authenticated-orcid":false,"given":"Yongqiang","family":"Lu","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1343-2162","authenticated-orcid":false,"given":"Qicai","family":"Chen","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1193-0696","authenticated-orcid":false,"given":"Zhen","family":"Dong","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3376-2581","authenticated-orcid":false,"given":"Xin","family":"Peng","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","unstructured":"Mohannad\u00a0J. Alhanahnah Clay Stevens Bocheng Chen Qiben Yan and Hamid Bagheri. 2023. IoTCom: Dissecting Interaction Threats in IoT Systems. IEEE Transactions on Software Engineering 49 4 (2023) 1523\u20131539. 10.1109\/TSE.2022.3179294","DOI":"10.1109\/TSE.2022.3179294"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"Imran Ashraf Yousaf\u00a0Bin Zikria Soojung Hur and Yongwan Park. 2020. A Comprehensive Analysis of Magnetic Field Based Indoor Positioning With Smartphones: Opportunities Challenges and Practical Limitations. IEEE Access 8 (2020) 228548\u2013228571. 10.1109\/ACCESS.2020.3046288","DOI":"10.1109\/ACCESS.2020.3046288"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"Marco Autili Lars Grunske Markus Lumpe Patrizio Pelliccione and Antony Tang. 2015. Aligning Qualitative Real-Time and Probabilistic Property Specification Patterns Using a Structured English Grammar. IEEE Transactions on Software Engineering 41 7 (2015) 620\u2013638. 10.1109\/TSE.2015.2398877","DOI":"10.1109\/TSE.2015.2398877"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Lei Bu Wen Xiong Chieh-Jan\u00a0Mike Liang Shi Han D. Zhang Shan Lin and Xuandong Li. 2018. Systematically Ensuring the Confidence of Real-Time Home Automation IoT Systems. ACM Transactions on Cyber-Physical Systems 51 1 (2018) 1 \u2013 23. 10.1145\/3185501","DOI":"10.1145\/3185501"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598084"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"Z.\u00a0Berkay Celik Gang Tan and Patrick Mcdaniel. 2019. IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. Proceedings 2019 Network and Distributed System Security Symposium (2019). 10.14722\/NDSS.2019.23326","DOI":"10.14722\/NDSS.2019.23326"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/SCC49832.2020.00049"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS49710.2020.00036"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","unstructured":"Sanket\u00a0Sharad Chaudhari Kiran\u00a0Suresh Bhole and Santosh Rane. 2023. An application of IIoT framework in system design performance monitoring and control for industrial process heater. International Journal on Interactive Design and Manufacturing (2023). 10.1007\/s12008-023-01235-6","DOI":"10.1007\/s12008-023-01235-6"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS47876.2019.00151"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.5555\/3620237.3620325"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00056"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0058022"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"Edmund\u00a0M. Clarke E.\u00a0Allen Emerson and A.\u00a0Prasad Sistla. 1986. Automatic verification of finite-state concurrent systems using temporal logic specifications. ACM Trans. Program. Lang. Syst. 8 2 (1986) 244\u2013263. 10.1145\/5397.5399","DOI":"10.1145\/5397.5399"},{"key":"e_1_3_3_1_17_2","first-page":"165","volume-title":"USENIX Annual Technical Conference","author":"Croft Jason","year":"2015","unstructured":"Jason Croft, Ratul Mahajan, Matthew\u00a0C. Caesar, and Madan Musuvathi. 2015. Systematically Exploring the Behavior of Control Programs. In USENIX Annual Technical Conference. 165\u2013176. https:\/\/www.usenix.org\/conference\/atc15\/technical-session\/presentation\/croft"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","unstructured":"Wenbo Ding Hongxin Hu and Long Cheng. 2021. IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery. Proceedings 2021 Network and Distributed System Security Symposium (2021). 10.14722\/NDSS.2021.24368","DOI":"10.14722\/NDSS.2021.24368"},{"key":"e_1_3_3_1_19_2","unstructured":"Wei Dou Domenico Bianculli and Lionel\u00a0Claude Briand. 2014. A Model-Driven Approach to Offline Trace Checking of Temporal Properties with OCL. https:\/\/api.semanticscholar.org\/CorpusID:59980463"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-13188-2_9"},{"volume-title":"EnvGuard-2024","year":"2024","key":"e_1_3_3_1_21_2","unstructured":"EnvGuard. 2024. EnvGuard-2024. https:\/\/envguard-2024.github.io"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","unstructured":"Rosa Falotico and Piero Quatto. 2015. Fleiss\u2019 kappa statistic without paradoxes. Quality & Quantity 49 (2015) 463\u2013470. 10.1007\/s11135-014-0003-1","DOI":"10.1007\/s11135-014-0003-1"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_3_1_24_2","first-page":"4223","volume-title":"30th USENIX Security Symposium","author":"Fu Chenglong","year":"2021","unstructured":"Chenglong Fu, Qiang Zeng, and Xiaojiang Du. 2021. HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes. In 30th USENIX Security Symposium. 4223\u20134240. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/fu-chenglong"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44585-4_6"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19157-2_5"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","unstructured":"Badis Hammi Sherali Zeadally Rida Khatoun and Jamel Nebhen. 2022. Survey on smart homes: Vulnerabilities risks and countermeasures. Computers & Security 117 C (2022) 102677. 10.1016\/j.cose.2022.102677","DOI":"10.1016\/j.cose.2022.102677"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","unstructured":"Kai-Hsiang Hsu Yu-Hsi Chiang and Hsu-Chun Hsiao. 2019. SafeChain: Securing Trigger-Action Programming From Attack Chains. IEEE Transactions on Information Forensics and Security 14 10 (2019) 2607\u20132622. 10.1109\/TIFS.2019.2899758","DOI":"10.1109\/TIFS.2019.2899758"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS53863.2021.00048"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","unstructured":"Hamada Ibrhim Hesham Hassan and Emad Nabil. 2021. A conflicts\u2019 classification for IoT-based services: a comparative survey. PeerJ Computer Science 7 (2021). 10.7717\/peerj-cs.480","DOI":"10.7717\/peerj-cs.480"},{"volume-title":"IFTTT","year":"2022","key":"e_1_3_3_1_31_2","unstructured":"IFTTT. 2022. IFTTT. https:\/\/ifttt.com\/"},{"key":"e_1_3_3_1_32_2","unstructured":"Azure IoT. 2023. . Retrieved March 2 2024 from https:\/\/docs.microsoft.com\/azure\/iot-hub\/iot-hub-devguide-device-twins"},{"key":"e_1_3_3_1_33_2","volume-title":"AWS IoT","author":"IoT AWS","year":"2023","unstructured":"AWS IoT. 2023. AWS IoT. https:\/\/aws.amazon.com\/cn\/iot\/"},{"volume-title":"jensenhughes","year":"2025","key":"e_1_3_3_1_34_2","unstructured":"JensenHughes. 2025. jensenhughes. https:\/\/www.jensenhughes.com\/"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.14722\/NDSS.2017.23051"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/2993422.2993426"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/2737095.2737115"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","unstructured":"Liu Liu Bofeng Li Sisi Zlatanova and Peter van Oosterom. 2021. Indoor navigation supported by the Industry Foundation Classes (IFC): A survey. Automation in Construction 121 (2021) 103436. 10.1016\/j.autcon.2020.103436","DOI":"10.1016\/j.autcon.2020.103436"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","unstructured":"Junyu Lu Laurence\u00a0T. Yang Bing Guo Qiang Li Hong Su and Gongliang Li. 2023. Enhancing IoT Data and Semantic Interoperability Based on Entity Tree Embedding Under an Edge\u2013Cloud Framework. IEEE Internet of Things Journal 10 4 (2023) 3322\u20133338. 10.1109\/JIOT.2022.3192259","DOI":"10.1109\/JIOT.2022.3192259"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025193"},{"key":"e_1_3_3_1_41_2","unstructured":"Tony Mason and Doug Brown. 1992. Lex & Yacc. https:\/\/api.semanticscholar.org\/CorpusID:196108182"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","unstructured":"Ammar Mazhar Ahsan Tanveer Muhammad Izhan and Mohammad Zayan\u00a0Tariq Khan. 2023. Robust Control Approaches and Trajectory Planning Strategies for Industrial Robotic Manipulators in the Era of Industry 4.0: A Comprehensive Review. Engineering Proceedings 56 1 (2023). 10.3390\/ASEC2023-15330","DOI":"10.3390\/ASEC2023-15330"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","unstructured":"Sirajum Munir and John\u00a0A. Stankovic. 2014. DepSys: Dependency aware integration of cyber-physical systems for smart homes. 2014 ACM\/IEEE International Conference on Cyber-Physical Systems (2014) 127\u2013138. 10.1109\/ICCPS.2014.6843717","DOI":"10.1109\/ICCPS.2014.6843717"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281440"},{"volume-title":"ChatGPT","year":"2024","key":"e_1_3_3_1_45_2","unstructured":"OpenAI. 2024. ChatGPT. https:\/\/platform.openai.com\/docs\/models\/gpt-4-turbo-and-gpt-4"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"publisher","unstructured":"Shantanu Pal and Zahra Jadidi. 2021. Analysis of Security Issues and Countermeasures for the Industrial Internet of Things. Applied Sciences 11 20 (2021). 10.3390\/app11209393","DOI":"10.3390\/app11209393"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"publisher","unstructured":"Seula Park Kiyun Yu and Jiyoung Kim. 2020. Data Model for IndoorGML Extension to Support Indoor Navigation of People with Mobility Disabilities. ISPRS International Journal of Geo-Information 9 2 (2020). 10.3390\/ijgi9020066","DOI":"10.3390\/ijgi9020066"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid51090.2021.00063"},{"volume-title":"SecurityWeek","year":"2025","key":"e_1_3_3_1_49_2","unstructured":"SecurityWeek. 2025. SecurityWeek. https:\/\/www.securityweek.com\/"},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2019.8936266"},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41540-6_17"},{"key":"e_1_3_3_1_52_2","unstructured":"Statista. 2020. Smart office market size worldwide - forecast comparison from 2016 to 2027. https:\/\/www.statista.com\/statistics\/996084\/smart-office-market-size-worldwide\/"},{"key":"e_1_3_3_1_53_2","unstructured":"Strategy. 2022. Consumer spending on WoT devices worldwide from 2019 to 2027. https:\/\/www.statista.com\/statistics\/873607\/worldwide-smart-home-annual-device-sales\/"},{"key":"e_1_3_3_1_54_2","doi-asserted-by":"publisher","unstructured":"M.\u00a0V. Suhas Sanjib Sinha N. Mariyappa H. Anitha and Karunakar\u00a0A. Kotegar. 2024. Enhancing Precision in Medical Imaging: A 3D CNN Approach for Fiducial Point Detection in MRI Data. IEEE Access 12 (2024) 52086\u201352096. 10.1109\/ACCESS.2024.3385573","DOI":"10.1109\/ACCESS.2024.3385573"},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583293"},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313150.3313228"},{"key":"e_1_3_3_1_57_2","first-page":"361","volume-title":"USENIX Security Symposium","author":"Tian Yuan","year":"2017","unstructured":"Yuan Tian, Nan Zhang, Yue-Hsun Lin, Xiaofeng Wang, Blase Ur, Xianzheng Guo, and Patrick Tague. 2017. SmartAuth: User-Centered Authorization for the Internet of Things. In USENIX Security Symposium. 361\u2013378. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/tian"},{"volume-title":"Web of Things","year":"2023","key":"e_1_3_3_1_58_2","unstructured":"W3C. 2023. Web of Things. https:\/\/www.w3.org\/ecosystems\/web-of-things\/"},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345662"},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345662"},{"key":"e_1_3_3_1_61_2","doi-asserted-by":"publisher","unstructured":"Ding Xiao Qianyu Wang Ming Cai Zhaohui Zhu and Weiming Zhao. 2020. A3ID: An Automatic and Interpretable Implicit Interference Detection Method for Smart Home via Knowledge Graph. IEEE Internet of Things Journal 7 3 (2020) 2197\u20132211. 10.1109\/JIOT.2019.2959063","DOI":"10.1109\/JIOT.2019.2959063"},{"key":"e_1_3_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/SEsCPS.2015.14"},{"key":"e_1_3_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3494115"},{"key":"e_1_3_3_1_64_2","doi-asserted-by":"publisher","unstructured":"Yinbo Yu and Jiajia Liu. 2021. TAPInspector: Safety and Liveness Verification of Concurrent Trigger-Action IoT Systems. IEEE Transactions on Information Forensics and Security 17 (2021) 3773\u20133788. 10.1109\/TIFS.2022.3214084","DOI":"10.1109\/TIFS.2022.3214084"},{"key":"e_1_3_3_1_65_2","unstructured":"Zapier. 2023. . https:\/\/help.zapier.com\/"},{"key":"e_1_3_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS60048.2023.00017"},{"key":"e_1_3_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00043"},{"key":"e_1_3_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/SOLI.2018.8476769"},{"key":"e_1_3_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops53856.2022.9767531"},{"key":"e_1_3_3_1_70_2","first-page":"147","volume-title":"USENIX Security Symposium","author":"\u00c7elik Berkay","year":"2018","unstructured":"Berkay \u00c7elik, Leonardo Babun, Amit\u00a0Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick Mcdaniel, and Arif\u00a0Selcuk Uluagac. 2018. Soteria: Automated IoT safety and security analysis. In USENIX Security Symposium. 147\u2013158. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/celik"}],"event":{"name":"Internetware 2025: the 16th International Conference on Internetware","sponsor":["SIGSOFT ACM Special Interest Group on Artificial Intelligence"],"location":"Trondheim Norway","acronym":"Internetware 2025"},"container-title":["Proceedings of the 16th International Conference on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3755881.3755922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:47:32Z","timestamp":1761565652000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3755881.3755922"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":69,"alternative-id":["10.1145\/3755881.3755922","10.1145\/3755881"],"URL":"https:\/\/doi.org\/10.1145\/3755881.3755922","relation":{},"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}