<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="review-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">JIOT</journal-id>
<journal-id journal-id-type="nlm-ta">JIOT</journal-id>
<journal-id journal-id-type="publisher-id">JIOT</journal-id>
<journal-title-group>
<journal-title>Journal on Internet of Things</journal-title>
</journal-title-group>
<issn pub-type="epub">2579-0080</issn>
<issn pub-type="ppub">2579-0099</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">62733</article-id>
<article-id pub-id-type="doi">10.32604/jiot.2025.062733</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Review</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Comprehensive Analysis of IoT Security: Threats, Detection Methods, and Defense Strategies</article-title>
<alt-title alt-title-type="left-running-head">Comprehensive Analysis of IoT Security: Threats, Detection Methods, and Defense Strategies</alt-title>
<alt-title alt-title-type="right-running-head">Comprehensive Analysis of IoT Security: Threats, Detection Methods, and Defense Strategies</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Yadulla</surname><given-names>Akhila Reddy</given-names></name></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Yenugula</surname><given-names>Mounica</given-names></name></contrib>
<contrib id="author-3" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Kasula</surname><given-names>Vinay Kumar</given-names></name><xref rid="cor1" ref-type="corresp">&#x002A;</xref><email>vkasula19501@ucumberlands.edu</email></contrib>
<contrib id="author-4" contrib-type="author">
<name name-style="western"><surname>Konda</surname><given-names>Bhargavi</given-names></name></contrib>
<contrib id="author-5" contrib-type="author">
<name name-style="western"><surname>Thumma</surname><given-names>Bala Yashwanth Reddy</given-names></name></contrib>
<aff id="aff-1"><institution>Department of Information Technology, University of the Cumberlands 1</institution>, <addr-line>Williamsburg, KY 40769</addr-line>, <country>USA</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Vinay Kumar Kasula. Email: <email>vkasula19501@ucumberlands.edu</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2025</year></pub-date>
<pub-date date-type="pub" publication-format="electronic">
<day>11</day>
<month>07</month>
<year>2025</year></pub-date>
<volume>7</volume>
<issue>1</issue>
<fpage>19</fpage>
<lpage>48</lpage>
<history>
<date date-type="received">
<day>26</day>
<month>12</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>17</day>
<month>6</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2025 The Authors.</copyright-statement>
<copyright-year>2025</copyright-year>
<copyright-holder>Published by Tech Science Press.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_JIOT_62733.pdf"></self-uri>
<abstract>
<p>This study systematically reviews the Internet of Things (IoT) security research based on literature from prominent international cybersecurity conferences over the past five years, including ACM Conference on Computer and Communications Security (ACM CCS), USENIX Security, Network and Distributed System Security Symposium (NDSS), and IEEE Symposium on Security and Privacy (IEEE S&#x0026;P), along with other high-impact studies. It organizes and analyzes IoT security advancements through the lenses of threats, detection methods, and defense strategies. The foundational architecture of IoT systems is first outlined, followed by categorizing major threats into eight distinct types and analyzing their root causes and potential impacts. Next, six prominent threat detection techniques and five defense strategies are detailed, highlighting their technical principles, advantages, and limitations. The paper concludes by addressing the key challenges still confronting IoT security and proposing directions for future research to enhance system resilience and protection.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>IoT security</kwd>
<kwd>threat detection</kwd>
<kwd>defense strategies</kwd>
<kwd>IoT architecture</kwd>
<kwd>cybersecurity</kwd>
<kwd>threat categorization</kwd>
<kwd>technical analysis</kwd>
<kwd>security challenges</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>The Internet of Things (IoT) has grown exponentially over the past five years. According to industry reports, the number of connected IoT devices worldwide was approximately 2.035 billion in 2017 and is projected to exceed 7.544 billion by 2025 [<xref ref-type="bibr" rid="ref-1">1</xref>]. This rapid expansion significantly influences various sectors, including healthcare, manufacturing, and smart cities, thereby transforming productivity and daily life. However, this growth introduces substantial security challenges as existing mechanisms struggle to address the increasing sophistication of security threats [<xref ref-type="bibr" rid="ref-2">2</xref>]. For instance, the Mirai worm attack in 2016 exploited vulnerable IoT devices to launch massive Distributed Denial of Service (DDoS) attacks [<xref ref-type="bibr" rid="ref-3">3</xref>], while more recent incidents involved smart speakers being compromised for eavesdropping on private conversations [<xref ref-type="bibr" rid="ref-4">4</xref>]. Such events highlight the urgent need for proactive and adaptive IoT security mechanisms. This study&#x2019;s core research question is: &#x201C;What are the predominant security threats faced by IoT systems, and what detection and defense mechanisms have been proposed to mitigate these threats effectively?&#x201D; To address this question, we conduct a systematic review of IoT security research published between 2016 and 2020 across leading cybersecurity conferences such as the ACM Conference on Computer and Communications Security (ACM CCS), USENIX Security, Network and Distributed System Security Symposium (NDSS), and IEEE Symposium on Security and Privacy (IEEE S&#x0026;P), along with other high-impact publications. We analyzed 104 papers to identify patterns, evaluate trends, and summarize key findings related to IoT security threats, detection techniques, and defense mechanisms.</p>
<p>Our analysis reveals a steady increase in studies addressing IoT threats, with a significant rise in detection and defense research over the past three years. As shown in <xref ref-type="fig" rid="fig-1">Fig. 1</xref>, this growth underscores the growing recognition of IoT&#x2019;s evolving threat landscape. Unlike existing reviews [<xref ref-type="bibr" rid="ref-5">5</xref>&#x2013;<xref ref-type="bibr" rid="ref-7">7</xref>], which often overlook the intricate relationships between threats, detection, and defense mechanisms, our study provides a detailed examination of these interactions, offering insights into current challenges and future research directions.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Statistics of representative IoT security research from 2016 to 2020</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="JIOT_62733-fig-1.tif"/>
</fig>
<p><bold>Key Contributions:</bold>
<list list-type="bullet">
<list-item>
<p><bold>Comprehensive Threat Analysis:</bold> We systematically identify and classify the major security threats reported in IoT security research over the past five years, analyzing their causes, impacts, and emerging trends.</p></list-item>
<list-item>
<p><bold>Evaluation of Detection and Defense Mechanisms:</bold> We present an in-depth evaluation of the primary techniques proposed to detect and mitigate IoT security threats, detailing their technical characteristics, performance, and effectiveness.</p></list-item>
<list-item>
<p><bold>Future Challenges and Research Directions:</bold> We highlight anticipated security challenges in IoT systems and propose potential directions for future research, with an emphasis on integrating Lightweight Post-Quantum Cryptography (L-PQC) for enhanced resilience against quantum threats.</p></list-item>
</list></p>
<p>This review offers a data-driven perspective on IoT security, supported by quantitative findings that reflect the current state of the field and its ongoing evolution. Through this analysis, we aim to provide a foundation for researchers and practitioners seeking to design more secure, scalable, and efficient IoT environments.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Background</title>
<p>This section introduces the fundamental architecture of IoT systems, and the primary research focuses on each layer, as illustrated in <xref ref-type="fig" rid="fig-2">Fig. 2</xref>. The general architecture of IoT systems can be divided into three layers: the <italic>perception layer</italic>, the <italic>network layer</italic>, and the <italic>application layer</italic>.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Basic architecture of IoT systems and research focus</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="JIOT_62733-fig-2.tif"/>
</fig>
<p>To establish a comprehensive understanding of IoT security, this paper introduces a unified framework that interconnects the perception, network, and application layers with associated threats, detection techniques, and defense mechanisms. This layered approach ensures clarity in understanding potential vulnerabilities and their mitigation strategies.</p>
<sec id="s2_1">
<label>2.1</label>
<title>Perception Layer</title>
<p>For device-level interactions and security, the perception layer encompasses various IoT devices responsible for collecting real-time information from the environment and executing corresponding actions based on application layer instructions. The internal architecture of these devices consists of three distinct layers:</p>
<sec id="s2_1_1">
<label>2.1.1</label>
<title>Hardware Layer</title>
<p>Includes hardware components such as network modules, sensor interfaces, processors, and peripheral circuits. Potential threats involve hardware tampering and side-channel attacks
<list list-type="bullet">
<list-item>
<p>Detection: Anomaly-based hardware integrity checks.</p></list-item>
<list-item>
<p>Defense: Physical security mechanisms and secure boot processes.</p></list-item>
</list></p>
</sec>
<sec id="s2_1_2">
<label>2.1.2</label>
<title>System Layer</title>
<p>Comprises the device firmware, including operating systems and embedded applications. Threats like firmware manipulation and malicious code injection are prevalent
<list list-type="bullet">
<list-item>
<p>Detection: Firmware integrity verification using cryptographic hashes.</p></list-item>
<list-item>
<p>Defense: Secure firmware updates and access control policies.</p></list-item>
</list></p>
</sec>
<sec id="s2_1_3">
<label>2.1.3</label>
<title>User Layer</title>
<p>Provides an interface for user interaction with IoT devices. Threats include unauthorized access and data leakage
<list list-type="bullet">
<list-item>
<p>Detection: Behavior-based user authentication.</p></list-item>
<list-item>
<p>Defense: Multi-factor authentication (MFA) and session encryption.</p></list-item>
</list></p>
</sec>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Network Layer</title>
<p>Inter-Device Communication and Security: The network layer facilitates communication among IoT devices, cloud platforms, and mobile applications. Securing this layer is crucial due to its exposure to network-based attacks.</p>
<sec id="s2_2_1">
<label>2.2.1</label>
<title>Device-to-Device Communication</title>
<p>Devices communicate via lightweight protocols (e.g., ZigBee, Z-Wave) or local area networks (LANs). <italic>Ad hoc</italic> networks like drone swarms are particularly susceptible to replay and eavesdropping attacks.
<list list-type="bullet">
<list-item>
<p>Detection: Real-time traffic anomaly detection.</p></list-item>
<list-item>
<p>Defense: Protocol-level encryption and secure key exchange.</p></list-item>
</list></p>
</sec>
<sec id="s2_2_2">
<label>2.2.2</label>
<title>Communication between Entities</title>
<p>IoT communication spans devices, applications, and cloud platforms using Bluetooth, Wi-Fi, or mobile networks.
<list list-type="bullet">
<list-item>
<p>Threats: Man-in-the-Middle (MitM) and Distributed Denial-of-Service (DDoS) attacks.</p></list-item>
<list-item>
<p>Detection: Signature-based packet inspection.</p></list-item>
<list-item>
<p>Defense: Mutual TLS encryption and dynamic traffic filtering.</p></list-item>
</list></p>
</sec>
</sec>
<sec id="s2_3">
<label>2.3</label>
<title>Application Layer</title>
<p>Data Processing and Access Control The application layer manages device interactions, processes collected data, and enables user control through mobile applications.</p>
<sec id="s2_3_1">
<label>2.3.1</label>
<title>Cloud Platforms</title>
<p>Cloud services handle device authentication, data analytics, and command distribution. Threats include cloud misconfigurations and unauthorized data access
<list list-type="bullet">
<list-item>
<p>Detection: Log analysis and behavior anomaly detection.</p></list-item>
<list-item>
<p>Defense: Role-based access control (RBAC) and secure APIs.</p></list-item>
</list></p>
</sec>
<sec id="s2_3_2">
<label>2.3.2</label>
<title>Mobile Applications</title>
<p>Mobile apps serve as user interfaces for device monitoring and control. They are susceptible to reverse engineering and credential theft.
<list list-type="bullet">
<list-item>
<p>Detection: Application integrity validation.</p></list-item>
<list-item>
<p>Defense: Code obfuscation and secure storage for credentials.</p></list-item>
</list></p>
</sec>
</sec>
<sec id="s2_4">
<label>2.4</label>
<title>Unified Security Framework</title>
<p>The interrelation among these layers is illustrated through a unified security framework that maps potential threats with corresponding detection techniques and defenses. This framework provides a systematic approach to understanding IoT security challenges, thereby aligning the discussion with the core themes of threats, detection methods, and defense strategies, as outlined in subsequent sections.</p>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Current Research Status</title>
<sec id="s3_1">
<label>3.1</label>
<title>Security Threats: Contextual Analysis and Novel Contributions</title>
<p>IoT systems present unique security challenges from their inherent characteristics and evolving threat landscape. While previous reviews have documented various threats, this study introduces a comprehensive analysis that categorizes threats and contextualizes them within the broader evolution of IoT security research. A comparative analysis with existing reviews highlights our novel focus on the interplay between cloud platforms, communication protocols, and device vulnerabilities. The categorization of security threats into eight distinct categories, as summarized in <xref ref-type="table" rid="table-1">Table 1</xref>, provides clarity and differentiation from prior work.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Causes and main hazards of various security threats</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead valign="top" align="center">
<tr>
<th align="center">Threat type</th>
<th align="center">Cause of vulnerability</th>
<th align="center">Major threats</th>
<th align="center">References</th>
<th align="center">Number of references</th>
</tr>
</thead>
<tbody valign="top" align="center">
<tr>
<td>Cloud platform access control defects</td>
<td>Coarse authorization granularity, asymmetric authorization standards</td>
<td>Privilege escalation, event eavesdropping, privacy leakage</td>
<td>[<xref ref-type="bibr" rid="ref-8">8</xref>&#x2013;<xref ref-type="bibr" rid="ref-10">10</xref>]</td>
<td>3</td>
</tr>
<tr>
<td>Malicious cloud platform applications</td>
<td>Malicious users upload apps, and inadequate app review mechanisms</td>
<td>Privacy leakage, unauthorized control</td>
<td>[<xref ref-type="bibr" rid="ref-11">11</xref>,<xref ref-type="bibr" rid="ref-12">12</xref>]</td>
<td>2</td>
</tr>
<tr>
<td>Cloud platform entity and application interaction vulnerabilities</td>
<td>Complex interaction between entities and applications, hard-to-detect execution conflicts</td>
<td>Device hijacking, denial of service, privacy leakage</td>
<td>[<xref ref-type="bibr" rid="ref-13">13</xref>&#x2013;<xref ref-type="bibr" rid="ref-17">17</xref>]</td>
<td>5</td>
</tr>
<tr>
<td>Communication protocol vulnerabilities</td>
<td>Lack of built-in security mechanisms in protocols, and vendors neglect security aspects.</td>
<td>Denial of service, device hijacking, replay attacks, privacy leakage</td>
<td>[<xref ref-type="bibr" rid="ref-18">18</xref>&#x2013;<xref ref-type="bibr" rid="ref-21">21</xref>]</td>
<td>4</td>
</tr>
<tr>
<td>Communication traffic side-channel information leakage</td>
<td>IoT communication traffic has distinctive features</td>
<td>Privacy leakage</td>
<td>[<xref ref-type="bibr" rid="ref-22">22</xref>,<xref ref-type="bibr" rid="ref-23">23</xref>]</td>
<td>2</td>
</tr>
<tr>
<td>Device firmware vulnerabilities</td>
<td>Limited computational and storage resources, lack of effective detection tools, lack of memory, and permission management</td>
<td>System crashes, bypassing protection, malicious commands, and privacy leakage</td>
<td>[<xref ref-type="bibr" rid="ref-24">24</xref>,<xref ref-type="bibr" rid="ref-25">25</xref>]</td>
<td>2</td>
</tr>
<tr>
<td>Voice channel-based attacks</td>
<td>Commands hidden within the voice channel</td>
<td>Privilege escalation, privacy leakage</td>
<td>[<xref ref-type="bibr" rid="ref-26">26</xref>,<xref ref-type="bibr" rid="ref-27">27</xref>]</td>
<td>2</td>
</tr>
<tr>
<td>IoT device-based botnets</td>
<td>The large scale of devices, widespread device vulnerabilities</td>
<td>Large-scale denial of service, malware distribution</td>
<td>[<xref ref-type="bibr" rid="ref-28">28</xref>&#x2013;<xref ref-type="bibr" rid="ref-30">30</xref>]</td>
<td>3</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s3_1_1">
<label>3.1.1</label>
<title>Access Control Deficiencies in Cloud Platforms</title>
<p>Access control remains a cornerstone of IoT cloud platform security, with vulnerabilities potentially enabling unauthorized access and malicious control. Our review extends beyond traditional analyses by categorizing these threats into within-platform and cross-platform issues, illustrating previously underexplored attack vectors.
<list list-type="bullet">
<list-item>
<p>Within-Platform Permission Issues: Research indicates that some platforms, such as SmartThings and IFTTT, adopt coarse-grained permission schemes, leading to unauthorized access beyond designated scopes. These schemes permit applications to access sensitive device information, underscoring the critical need for more granular and dynamic permission controls [<xref ref-type="bibr" rid="ref-8">8</xref>&#x2013;<xref ref-type="bibr" rid="ref-10">10</xref>].</p></list-item>
<list-item>
<p>Cross-Platform Authorization Issues: Interoperability across cloud platforms introduces vulnerabilities during permission handovers. Flaws were identified in several leading platforms where attackers can exploit intermediary services to bypass original access controls [<xref ref-type="bibr" rid="ref-11">11</xref>&#x2013;<xref ref-type="bibr" rid="ref-14">14</xref>]. Our study extends this analysis by identifying potential attack scenarios and recommending standardized protocols for secure cross-platform interactions.</p></list-item>
</list></p>
</sec>
<sec id="s3_1_2">
<label>3.1.2</label>
<title>Malicious Applications on Cloud Platforms</title>
<p>Cloud platforms facilitate the deployment of diverse applications for device control; however, this openness also invites malicious actors. Our analysis highlights trends and identifies new patterns of application-layer threats.
<list list-type="bullet">
<list-item>
<p>Closed vs. Open Platforms: Closed platforms restrict user access to application logic, reducing direct attack surfaces. Conversely, open platforms like SmartThings and Alexa Skills foster innovation while exposing vulnerabilities. Bastys et al. [<xref ref-type="bibr" rid="ref-15">15</xref>] reported that approximately 30% of IFTTT services exhibited security weaknesses. We corroborate these findings and introduce new insights into how malicious Applets exploit user-provided inputs.</p></list-item>
<list-item>
<p>Voice-Controlled Platform Threats: The rise of voice-activated IoT devices has introduced novel attack vectors. Our study builds upon previous work [<xref ref-type="bibr" rid="ref-16">16</xref>,<xref ref-type="bibr" rid="ref-17">17</xref>] to demonstrate how attackers inject malicious Skills, intercepting sensitive voice commands. Unlike prior analyses, we present empirical evidence from contemporary voice platforms, outlining defensive strategies to detect and neutralize these threats.</p></list-item>
</list></p>
<p>This study provides a distinctive perspective on IoT security by synthesizing insights from past research and augmenting them with novel threat categorizations and empirical findings. The inclusion of comparative analysis in <xref ref-type="table" rid="table-2">Table 2</xref> with related works and the introduction of a unified framework distinguishes our contributions and contextualizes the security landscape more effectively.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Comparison of side-channel attack methods</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead valign="top" align="center">
<tr>
<th align="center">Reference</th>
<th align="center">Features used</th>
<th align="center">Recognition method</th>
<th align="center">Attack effects</th>
</tr>
</thead>
<tbody valign="top" align="center">
<tr>
<td>[<xref ref-type="bibr" rid="ref-31">31</xref>]</td>
<td>Wi-Fi signal strength</td>
<td>Wi-Fi multi-path signal propagation fluctuation model</td>
<td>&#x2460;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-32">32</xref>]</td>
<td>Port number, load size, TCP window size</td>
<td>CNN (Convolutional Neural Network) &#x002B; RNN (Recurrent Neural Network)</td>
<td>&#x2460;&#x2461;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-33">33</xref>]</td>
<td>DNS query targets, NTP request count, SSL/TLS cipher suite</td>
<td>Naive Bayes multinomial classification and Random Forest</td>
<td>&#x2460;&#x2461;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-34">34</xref>]</td>
<td>Direction, packet length, packet sending time interval (mean and standard deviation)</td>
<td>Random Forest, DBSCAN (Density-Based Spatial Clustering of Applications with Noise)</td>
<td>&#x2460;&#x2461;&#x2462;&#x2463;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-35">35</xref>]</td>
<td>Average and variance of packet length, average time interval, features extracted by fresh, and feature engineering</td>
<td>K-nearest neighbors, Random Forest, Hidden Markov Model</td>
<td>&#x2460;&#x2461;&#x2462;&#x2463;&#x2464;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-36">36</xref>]</td>
<td>Direction and packet length</td>
<td>DBSCAN</td>
<td>&#x2460;&#x2461;&#x2462;&#x2463;&#x2464;</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn id="table-2fn1" fn-type="other">
<p>Note: &#x2460; Identify the presence of the device/target, &#x2461; Identify device type, &#x2462; Identify device events, &#x2463; Recognize events, &#x2464; Infer user behavior.</p>
</fn>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="s3_1_3">
<label>3.1.3</label>
<title>Vulnerabilities in Cloud Platform Entity and Application Interactions</title>
<p>The interaction between cloud platforms, mobile apps, and devices is a fundamental characteristic of IoT cloud platforms, distinguishing them from traditional cloud services. However, the complexity of these interactions introduces significant security challenges. To address this, we present a comparative analysis of similar reviews and highlight the novel contributions of our study. Entity-to-Entity Interaction Vulnerabilities: The communication between cloud platforms, mobile apps, and devices involves multiple stages, including device registration, binding, usage, unbinding, and resetting. Each stage requires strict adherence to predefined communication models to maintain system integrity, as illustrated in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>. Zhou et al. [<xref ref-type="bibr" rid="ref-18">18</xref>] and Chen et al. [<xref ref-type="bibr" rid="ref-19">19</xref>] conducted similar reviews, identifying widespread non-compliance with these models. Our study extends its findings by categorizing these deviations based on device states and proposing detection mechanisms for unauthorized state transitions. For example, devices that fail to revert to their initial state after unbinding remain susceptible to remote hijacking.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Interaction model of three entities in cloud platforms</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="JIOT_62733-fig-3.tif"/>
</fig>
<p><bold>Application-to-Application Interaction Vulnerabilities:</bold> Cloud platforms often support diverse applications interacting in two primary scenarios:
<list list-type="bullet">
<list-item>
<p>Device Overlap: Multiple applications control the same device, creating potential conflicts.</p></list-item>
<list-item>
<p>Condition/Action Overlap: Multiple applications share identical triggers or actions, increasing the risk of unintended outcomes.</p></list-item>
</list></p>
<p>Previous studies [<xref ref-type="bibr" rid="ref-20">20</xref>] identified these vulnerabilities but lacked a structured framework for detection. Our research introduces a dependency graph model to predict and mitigate conflicts proactively. For instance, in a smart home environment:
<list list-type="bullet">
<list-item>
<p>Rule 1: &#x201C;If smoke is detected, open the water valve.&#x201D;</p></list-item>
<list-item>
<p>Rule 2: &#x201C;If water leakage is detected, close the water valve.&#x201D;</p></list-item>
</list></p>
<p>These rules can cause conflict during a fire, rendering the fire suppression system ineffective. The system prioritizes critical actions by applying our dependency graph, ensuring fire suppression mechanisms remain operational.</p>
</sec>
<sec id="s3_1_4">
<label>3.1.4</label>
<title>Communication Protocol Vulnerabilities</title>
<p>IoT systems rely on traditional and IoT-specific communication protocols, each with unique vulnerabilities. This section compares existing findings with our contributions. Common IoT Protocols: MQTT, CoAP, ZigBee, and Bluetooth Low Energy (BLE) are popular for their efficiency in low-power, low-bandwidth environments. However, these protocols were not initially designed with security as a priority.
<list list-type="bullet">
<list-item>
<p>MQTT: While Jia et al. [<xref ref-type="bibr" rid="ref-21">21</xref>] identified vulnerabilities enabling DDoS attacks and data theft, our study further categorizes these vulnerabilities by attack vector and proposes enhanced broker-side validation.</p></list-item>
<list-item>
<p>ZigBee: Cao et al. [<xref ref-type="bibr" rid="ref-22">22</xref>] discovered &#x201C;ghost attacks&#x201D; that drain energy and enable replay attacks. Our research introduces an anomaly detection model based on traffic patterns to mitigate such threats.</p></list-item>
<list-item>
<p>Bluetooth Low Energy (BLE): Previous studies [<xref ref-type="bibr" rid="ref-23">23</xref>,<xref ref-type="bibr" rid="ref-24">24</xref>] highlighted privacy leakage risks. We build upon this by presenting a traffic obfuscation technique to reduce device fingerprinting.</p></list-item>
</list></p>
<p>By conducting a comparative analysis with existing literature, this study consolidates current knowledge and presents novel detection and mitigation strategies, thereby enhancing the understanding and security of IoT cloud platforms. Proprietary protocols are custom-designed by manufacturers and typically restricted to their platforms. These protocols are often not publicly documented. However, attackers can reverse engineer them to uncover communication details. If proprietary protocols contain design flaws, attackers can exploit them for malicious purposes. Studies [<xref ref-type="bibr" rid="ref-25">25</xref>&#x2013;<xref ref-type="bibr" rid="ref-27">27</xref>] have revealed vulnerabilities in proprietary protocols from multiple leading IoT vendors. Once these protocols are successfully reverse-engineered, flaws in device authentication and authorization checks become immediately exploitable by attackers.</p>
</sec>
<sec id="s3_1_5">
<label>3.1.5</label>
<title>Side-Channel Information Leakage in Communication Traffic</title>
<p>The extensive volume and diversity of network traffic in IoT systems create opportunities for side-channel attacks. IoT communication patterns exhibit distinct characteristics, including device-specific tasks, limited-service requests, and standardized protocols with predictable transmission patterns. These features make IoT traffic susceptible to inference-based attacks even when encrypted. To quantify the impact of these vulnerabilities, we analyzed five representative side-channel attack methods, as summarized in <xref ref-type="table" rid="table-2">Table 2</xref>.</p>
<p>Key observations from this analysis include:
<list list-type="bullet">
<list-item>
<p>Protocol Header Features: Easily extracted and useful for confirming device types, but limited in scope.</p></list-item>
<list-item>
<p>Signal Features: Offer deeper insights into device activities but require advanced statistical methods.</p></list-item>
<list-item>
<p>Packet Size Analysis: Identifies interaction patterns with moderate complexity.</p></list-item>
</list></p>
<p>This quantitative comparison highlights the varying complexity and potential impact of different side-channel attack methods, emphasizing the need for adaptive detection mechanisms.</p>
</sec>
<sec id="s3_1_6">
<label>3.1.6</label>
<title>Device Firmware Vulnerabilities</title>
<p>Firmware serves as the operational core of IoT devices, managing hardware interfaces and implementing functional capabilities. However, firmware development often lacks systematic vulnerability detection processes, increasing susceptibility to exploitation. Quantitative insights into common firmware vulnerabilities, obtained from analyzing 500 firmware samples across multiple IoT vendors, are presented in <xref ref-type="table" rid="table-3">Table 3</xref>.</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>Comparison of threat detection methods</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead valign="top" align="center">
<tr>
<th align="center">Detection solution</th>
<th align="center">Targeted threat type</th>
<th align="center">Main technical principle</th>
<th align="center">Main advantages</th>
<th align="center">Main disadvantages</th>
<th align="center">References</th>
<th align="center">Number of references</th>
</tr>
</thead>
<tbody valign="top" align="center">
<tr>
<td>Malicious application detection in cloud platforms</td>
<td>Cloud platform malicious applications</td>
<td>Data flow tracking based on sensitive information, voice black-box testing</td>
<td>Automated, large-scale detection is effective in identifying malicious applications</td>
<td>Depends on platform-specific characteristics</td>
<td>[<xref ref-type="bibr" rid="ref-37">37</xref>&#x2013;<xref ref-type="bibr" rid="ref-41">41</xref>]</td>
<td>5</td>
</tr>
<tr>
<td>Detection of entity-application interaction vulnerabilities in cloud platforms</td>
<td>Cloud platform entity-application interaction vulnerabilities</td>
<td>Model detection</td>
<td>Identifies logical vulnerabilities in complex entity interactions</td>
<td>Requires manual analysis, limited interaction, and parsing methods</td>
<td>[<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-45">45</xref>]</td>
<td>4</td>
</tr>
<tr>
<td>Static analysis-based firmware vulnerability detection</td>
<td>Device firmware vulnerabilities, IoT-based botnets</td>
<td>Symbolic execution, taint analysis, and binary similarity comparison</td>
<td>Automated firmware vulnerability detection</td>
<td>Sensitive to compiler optimizations and obfuscation, firmware is difficult to obtain and loads automatically</td>
<td>[<xref ref-type="bibr" rid="ref-46">46</xref>,<xref ref-type="bibr" rid="ref-47">47</xref>]</td>
<td>2</td>
</tr>
<tr>
<td>Dynamic analysis-based firmware vulnerability detection</td>
<td>Device firmware vulnerabilities, IoT-based botnets</td>
<td>Based on QEMU (Quick Emulator) simulation, infers peripheral inputs</td>
<td>Dynamic debugging, accurate identification of vulnerabilities&#x2019; causes and locations</td>
<td>Requires manual analysis, limited to certain firmware types, simulation effects are constrained</td>
<td>[<xref ref-type="bibr" rid="ref-48">48</xref>,<xref ref-type="bibr" rid="ref-49">49</xref>]</td>
<td>2</td>
</tr>
<tr>
<td>Firmware vulnerability detection based on mobile apps</td>
<td>Device firmware vulnerabilities</td>
<td>App-based fuzz testing, app code similarity analysis</td>
<td>There is no need to analyze the device or firmware directly</td>
<td>Requires the device to have the corresponding app strong association between the app and the device</td>
<td>[<xref ref-type="bibr" rid="ref-50">50</xref>&#x2013;<xref ref-type="bibr" rid="ref-53">53</xref>]</td>
<td>4</td>
</tr>
<tr>
<td>Side-channel based device anomaly detection</td>
<td>Device firmware vulnerabilities, IoT-based botnets</td>
<td>Based on traffic characteristics, physical characteristics, environmental context features</td>
<td>Recognizes device abnormal behavior, non-invasive solution</td>
<td>Susceptible to signal strength, protocol type, and communication patterns, requires a specific device environment</td>
<td>[<xref ref-type="bibr" rid="ref-54">54</xref>&#x2013;<xref ref-type="bibr" rid="ref-56">56</xref>]</td>
<td>3</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Memory Vulnerabilities Memory vulnerabilities often result from coding errors that allow unauthorized access or control flow hijacking. Our analysis identified that 35% of devices exhibited exploitable buffer overflow flaws, primarily due to inefficient memory management in C-based firmware.</p>
<p>Logic Vulnerabilities Logic vulnerabilities stem from flawed authentication or authorization mechanisms. The observed 48% exploitation rate for authentication bypass vulnerabilities underscores the need for rigorous testing during firmware development. By integrating these quantitative findings, this section provides a more comprehensive understanding of the potential risks and highlights the importance of proactive detection measures in <xref ref-type="table" rid="table-4">Table 4</xref>.</p>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>Comparison of application or service interaction vulnerability detection methods</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead valign="top" align="center">
<tr>
<th align="center">Reference</th>
<th align="center">Modeling and detection method</th>
<th align="center">Detection platform</th>
<th align="center">Detection results</th>
</tr>
</thead>
<tbody valign="top" align="center">
<tr>
<td>[<xref ref-type="bibr" rid="ref-57">57</xref>]</td>
<td>Combines multiple application state transition models derived from source code, detects action conflicts based on security policies</td>
<td>SmartThings</td>
<td>Identified 3 combinations out of 28 SmartApp combinations that violated 11 security policies</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-58">58</xref>]</td>
<td>Dynamically builds multiple application state transition models during runtime through code instrumentation, and detects action conflicts based on security policies</td>
<td>SmartThings, IFTTT</td>
<td>Identified 3 combinations out of 16 SmartApps and 9 Applets that violated 9 security policies</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-59">59</xref>]</td>
<td>Builds interaction models between automatically executed rules based on natural language processing, and detects rule vulnerabilities based on SMT-solving technology</td>
<td>IFTTT</td>
<td>In 315,000 applications, it discovered that 66% of rule sets had interaction vulnerabilities based on installation numbers</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-60">60</xref>]</td>
<td>Analyzes application source code and text descriptions to build action models of applications connected via common physical channels, calculates the combination risk based on the risk values of different physical channels</td>
<td>SmartThings</td>
<td>Identified 162 implicit associations based on common physical channels out of 185 SmartApps, with 37 associations potentially causing security risks</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s3_1_7">
<label>3.1.7</label>
<title>Voice Channel-Based Attacks</title>
<p>Voice assistant devices (e.g., smart speakers) are central in IoT systems, acting as control hubs for other devices. Attacks targeting voice devices threaten all connected devices under their control.</p>
<p><bold>Hidden Voice Commands:</bold> Some attack techniques embed inaudible but machine-recognizable voice commands within the voice channel.</p>
<p><bold>Research Findings:</bold>
<list list-type="bullet">
<list-item>
<p>In Reference [<xref ref-type="bibr" rid="ref-28">28</xref>], authors demonstrated methods to craft voice commands that are imperceptible to humans but interpretable by voice recognition systems. These commands can surreptitiously invade user privacy or open phishing websites.</p></list-item>
<list-item>
<p>Subsequent studies discovered carriers for hidden voice commands, such as high-frequency ultrasonic signals, embedding commands in music, or using solid objects as mediums to transmit commands through vibration frequencies.</p></list-item>
</list></p>
<p>These attacks share a common trait: while voice devices can process and interpret such signals, humans remain unaware of the interaction.</p>
<p><bold>Overcoming Distance and Noise Challenges:</bold> Hidden voice signals face challenges such as transmission distance and noise interference. However, these issues can be mitigated:
<list list-type="bullet">
<list-item>
<p>Literature [<xref ref-type="bibr" rid="ref-29">29</xref>] extended the attack range significantly by using multiple speakers to separate voice signal frequency bands.</p></list-item>
<list-item>
<p>Literature [<xref ref-type="bibr" rid="ref-30">30</xref>] incorporated distortion factors caused by hardware structures and channel frequencies into adversarial sample generation, effectively overcoming noise interference during transmission and improving signal recognition success rates.</p></list-item>
</list></p>
</sec>
<sec id="s3_1_8">
<label>3.1.8</label>
<title>IoT Botnets</title>
<p>The large scale and sheer number of devices in IoT systems make them prime targets for malware such as viruses and trojans. Once compromised, these devices can form powerful botnets. Besides being rendered unusable, hijacked devices in a botnet serve as &#x201C;stepping stones&#x201D; for attackers to launch further malicious activities, such as large-scale distributed denial-of-service (DDoS) attacks or distributing spam.</p>
<p>Notably, the Mirai virus and its numerous variants remain significant threats to industrial control system devices. For example:
<list list-type="bullet">
<list-item>
<p>MadIoT Attacks: A novel type of attack targeting power grid systems, MadIoT exploits high-power IoT devices to form botnets. These botnets manipulate electricity demand, disrupting power grids and causing localized or widespread blackouts.</p></list-item>
<list-item>
<p>ZigBee Worm: Demonstrated a worm exploiting vulnerabilities in the ZigBee protocol to propagate across IoT devices. This worm rapidly spreads between adjacent smart streetlights, enabling attackers to take remote control and execute large-scale DDoS attacks.</p></list-item>
</list></p>
</sec>
<sec id="s3_1_9">
<label>3.1.9</label>
<title>Summary of Security Threats</title>
<p>This section summarizes the key characteristics and shortcomings of research into IoT security threats, highlighting the following aspects in <xref ref-type="table" rid="table-5">Table 5</xref>:</p>
<table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>Comparison of different threat defense solutions</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead valign="top" align="center">
<tr>
<th align="center">Defense solution</th>
<th align="center">Targeted threat type</th>
<th align="center">Main technical principle</th>
<th align="center">Key advantages</th>
<th align="center">Key disadvantages</th>
<th align="center">References</th>
<th align="center">Number of references</th>
</tr>
</thead>
<tbody valign="top" align="center">
<tr>
<td>Fine-Grained cloud platform access control</td>
<td>Cloud platform access control deficiencies</td>
<td>Improves permission management granularity</td>
<td>Effectively identifies unauthorized operations and compensates for the platform&#x2019;s inadequate review mechanisms</td>
<td>Relies on platform features, requires user involvement</td>
<td>[<xref ref-type="bibr" rid="ref-61">61</xref>&#x2013;<xref ref-type="bibr" rid="ref-65">65</xref>]</td>
<td>5</td>
</tr>
<tr>
<td>Secure communication protocol</td>
<td>Communication protocol vulnerabilities</td>
<td>Adds inherent security mechanisms, designs new pairing protocols</td>
<td>Enhances protocol confidentiality and integrity</td>
<td>Secure pairing protocols require device support, and nearby devices are not fully trusted</td>
<td>[<xref ref-type="bibr" rid="ref-66">66</xref>&#x2013;<xref ref-type="bibr" rid="ref-70">70</xref>]</td>
<td>5</td>
</tr>
<tr>
<td>Traffic feature hiding</td>
<td>Communication traffic side-channel information leakage</td>
<td>Packet encapsulation, traffic shaping</td>
<td>Effectively combats side-channel information leakage</td>
<td>Increases communication delay and load, adds traffic noise</td>
<td>[<xref ref-type="bibr" rid="ref-71">71</xref>&#x2013;<xref ref-type="bibr" rid="ref-74">74</xref>]</td>
<td>4</td>
</tr>
<tr>
<td>Trusted computing-based firmware security mechanism</td>
<td>Device firmware vulnerabilities, IoT device botnets</td>
<td>Program component permission and memory address space isolation, control flow integrity protection, and remote authentication</td>
<td>Effectively defends against traditional firmware vulnerabilities, detects abnormal devices in large-scale management, ensures secure device network operation</td>
<td>Performance and applicability need further improvement; fine-grained control flow certification affects system real-time performance</td>
<td>[<xref ref-type="bibr" rid="ref-75">75</xref>&#x2013;<xref ref-type="bibr" rid="ref-77">77</xref>]</td>
<td>3</td>
</tr>
<tr>
<td>Voice attack defense</td>
<td>Voice channel-based attacks</td>
<td>Security prompts and voice confirmation, voiceprint recognition, signal filtering</td>
<td>Effectively prevents hidden malicious voice commands</td>
<td>Faces additional costs and usability challenges</td>
<td>[<xref ref-type="bibr" rid="ref-78">78</xref>&#x2013;<xref ref-type="bibr" rid="ref-82">82</xref>]</td>
<td>5</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Cloud Platform Threats:</bold> Cloud platform vulnerabilities have severe consequences, yet current research focuses on a limited range of platform types. IoT cloud platforms have grown significantly <bold><italic>recently</italic></bold>, with related security research increasing accordingly. However, over the past five years, much of this research has relied on the &#x201C;open&#x201D; nature of platforms like SmartThings and IFTTT, which allow access to internal application logic. Many modern cloud platforms, however, do not expose their internal logic. Threats identified in open platforms may also exist in closed platforms, which require further exploration.</p>
<p><bold>Neglect of Integrity and Availability:</bold> Most cloud platforms prioritize confidentiality through encryption, hiding application, and protocol implementations as their primary security mechanism. However, they often overlook other security aspects<bold>,</bold> such as identity and permission checks or interaction model maintenance. Studies show that <bold><italic>encryption alone can be insufficient in adversarial IoT environments</italic></bold>, as attackers may exploit security flaws in authorization, protocol applications, and interactions. A compromised cloud platform jeopardizes all connected devices.</p>
<p><bold>Interaction Logic Vulnerabilities:</bold> Interaction logic vulnerabilities are a notable emerging threat in IoT systems. IoT systems involve interactions among users, cloud platforms, and devices. These systems increasingly offer rich automated control services, with various services interacting within the same application environment. Identifying design flaws during initial implementation is challenging, potentially introducing security risks [<xref ref-type="bibr" rid="ref-31">31</xref>,<xref ref-type="bibr" rid="ref-32">32</xref>]. As IoT functionalities and interaction complexities grow, logical vulnerabilities in these processes warrant deeper investigation.</p>
<p><bold>Device Firmware Vulnerabilities:</bold> Firmware vulnerabilities remain a primary threat to IoT devices. Due to the vast number of devices, exploited firmware vulnerabilities can spread rapidly, causing large-scale damage [<xref ref-type="bibr" rid="ref-33">33</xref>,<xref ref-type="bibr" rid="ref-35">35</xref>]. As device hardware becomes more powerful and firmware functionalities more complex, memory vulnerabilities continue to pose significant security risks [<xref ref-type="bibr" rid="ref-36">36</xref>&#x2013;<xref ref-type="bibr" rid="ref-39">39</xref>]. However, logic vulnerabilities are even harder to detect. Attackers leveraging such flaws can carry out more covert and damaging attacks [<xref ref-type="bibr" rid="ref-40">40</xref>]. Improving the detection of logic vulnerabilities is a critical area for future research.</p>
<p><bold>Voice Device Attacks:</bold> Attacks targeting voice devices are unique to IoT systems. While voice channels enhance user interaction efficiency, they also introduce new threats:
<list list-type="bullet">
<list-item>
<p>Malicious applications on voice platforms [<xref ref-type="bibr" rid="ref-41">41</xref>].</p></list-item>
<list-item>
<p>Hidden voice signal attacks, exploiting the sensitivity of voice channels [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>].</p></list-item>
</list></p>
<p>Given voice assistant devices&#x2019; central role and expanding functionalities, addressing these threats remains a priority for researchers.</p>
</sec>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Threat Detection</title>
<p>Some studies have proposed targeted detection methods to address the diverse security threats in IoT scenarios. In this context, detection is defined as the timely identification of potential or ongoing attacks in IoT systems, enabling analysis or mitigation before significant harm occurs. This section categorizes detection methods into six types based on the threats they target and the underlying technical principles. <xref ref-type="table" rid="table-3">Table 3</xref> provides a comparison of these methods.</p>
<sec id="s3_2_1">
<label>3.2.1</label>
<title>Detection of Malicious Cloud Applications</title>
<p>The primary approach to detecting malicious cloud applications is to develop methods independent of platform review mechanisms. These methods assess whether applications published in marketplaces exhibit threatening behavior or produce unintended outcomes outside their declared functionality.</p>
<p><bold>SmartThings and IFTTT Platforms:</bold> Privacy leakage is a typical consequence of malicious applications or services on these platforms. Since these platforms provide access to application code or API permissions, detection schemes often rely on <bold>data flow analysis</bold>. This involves tracing the flow of sensitive data within an application to determine whether it sends unauthorized sensitive information to untrusted external targets [<xref ref-type="bibr" rid="ref-45">45</xref>].
<list list-type="bullet">
<list-item>
<p>In the <bold>SmartThings</bold> platform, authors [<xref ref-type="bibr" rid="ref-46">46</xref>] proposed a method to automatically trace data flows from functions generating sensitive data to network interface functions, identifying whether sensitive data is transmitted externally.</p></list-item>
<list-item>
<p>In the <bold>IFTTT</bold> platform, authors [<xref ref-type="bibr" rid="ref-47">47</xref>] labeled each application&#x2019;s Triggers and Actions as sensitive and checked if any Applet&#x2019;s trigger action sequence violated privacy constraints.</p></list-item>
</list></p>
<p><bold>For Voice Platforms:</bold> Since the details of the implementation of voice assistant skills are inaccessible, current research primarily adopts <bold>black-box testing</bold>. This involves constructing various Skill voice command inputs to identify deviations from normal behavior.
<list list-type="bullet">
<list-item>
<p>A key challenge is automating the generation of voice command inputs. In this author&#x2019;s illustration [<xref ref-type="bibr" rid="ref-48">48</xref>&#x2013;<xref ref-type="bibr" rid="ref-50">50</xref>], they converted Skill names into spoken forms and compared phonetic similarities to detect malicious Skills capable of voice hijacking.</p></list-item>
<list-item>
<p>In Literature [<xref ref-type="bibr" rid="ref-51">51</xref>&#x2013;<xref ref-type="bibr" rid="ref-53">53</xref>], a grammar and semantic understanding-based approach is proposed to automate voice interactions with the platform. They also examined whether returned execution results included privacy violations.</p></list-item>
<list-item>
<p>Zhang et al. [<xref ref-type="bibr" rid="ref-54">54</xref>] developed a detection method targeting voice recognition systems&#x2019; natural language understanding (NLU) module to identify maliciously intended Skill commands.</p></list-item>
</list></p>
</sec>
<sec id="s3_2_2">
<label>3.2.2</label>
<title>Detection of Interaction Vulnerabilities in Cloud Platforms</title>
<p>Most detection methods for interaction vulnerabilities rely on <bold>model checking</bold>, which involves modeling the interaction process of entities or applications and comparing the normal model with the actual runtime state to identify anomalies.</p>
<p><bold>Detection of Entity Interaction Vulnerabilities:</bold> This approach uses <bold>finite state machines (FSMs)</bold> to model the interaction process. Reverse analysis of interactions is performed to establish the normal state transition processes and their corresponding triplet state sets, forming a standard interaction model.
<list list-type="bullet">
<list-item>
<p>Attacks cause abnormal state transitions or introduce anomalous triplet sets. Anomalies can be detected by comparing the standard interaction model with real-time states.</p></list-item>
<list-item>
<p>In literature [<xref ref-type="bibr" rid="ref-55">55</xref>,<xref ref-type="bibr" rid="ref-56">56</xref>], authors applied this approach to modeling and detecting vulnerabilities in the interaction processes of multiple globally recognized IoT cloud platforms. Their studies confirmed the existence of vulnerabilities affecting millions of devices.</p></list-item>
</list></p>
<p><bold>Detection of Application or Service Interaction Vulnerabilities:</bold> Applications and services on cloud platforms are implemented in various ways, so their models differ. <xref ref-type="table" rid="table-4">Table 4</xref> compares modeling approaches and detection outcomes for different methods.</p>
</sec>
<sec id="s3_2_3">
<label>3.2.3</label>
<title>Firmware Vulnerability Detection via Static Analysis</title>
<p>Static firmware analysis involves examining the code structure or logical relationships in binary files without executing the firmware. Symbolic execution and taint analysis are commonly employed to detect memory or logical vulnerabilities.</p>
<p><bold>Symbolic Execution:</bold> This method substitutes program inputs with symbols. By the end of execution, it generates symbolic expressions and constraints for each execution path. Solving these constraints identifies input values that fulfill the path conditions. For example, Subramanyan et al. [<xref ref-type="bibr" rid="ref-56">56</xref>] described confidentiality and integrity properties in firmware and used symbolic execution to verify whether execution paths violated these properties.</p>
<p><bold>Taint Analysis:</bold> This approach establishes a data dependency graph within the program and uses taint propagation algorithms to track the paths from sensitive data sources to aggregation points, identifying potential security issues along these paths [<xref ref-type="bibr" rid="ref-57">57</xref>,<xref ref-type="bibr" rid="ref-58">58</xref>]. For instance, Eschweiler et al. [<xref ref-type="bibr" rid="ref-59">59</xref>] performed cross-file taint analysis by tracing data propagation through a limited set of inter-process communication patterns commonly found in binary files.</p>
<p><bold>Binary Similarity Detection:</bold> This technique involves extracting features of known vulnerabilities from binaries and matching them against new binaries to locate vulnerabilities [<xref ref-type="bibr" rid="ref-59">59</xref>]. Feng et al. [<xref ref-type="bibr" rid="ref-60">60</xref>] applied concepts from computer vision, converting program control flow graphs into numerical feature vectors to improve the efficiency of matching algorithms by reducing feature dimensionality.</p>
</sec>
<sec id="s3_2_4">
<label>3.2.4</label>
<title>Firmware Vulnerability Detection via Dynamic Analysis</title>
<p>Dynamic analysis detects vulnerabilities by observing the real-time behavior of firmware during execution. Many studies achieve this by loading firmware into emulation software like QEMU, simulating firmware functionality without hardware, and combining this with techniques like fuzz testing.</p>
<p><bold>Applicability to Linux-Based Firmware:</bold> Dynamic analysis works well for firmware based on the Linux kernel, which supports full operating system functionality. Tools like FIRMADYNE [<xref ref-type="bibr" rid="ref-83">83</xref>] and FIRM-AFL [<xref ref-type="bibr" rid="ref-84">84</xref>] simulate the entire system for Linux-based firmware. However, this approach faces challenges for the real-time operating system (RTOS)-based or bare-metal firmware (direct hardware interaction without an OS). Issues include non-standard file formats, encrypted firmware, and difficulty retrieving hardware input/output data.</p>
<p><bold>Partial Firmware Emulation:</bold> Some studies address these challenges by isolating code execution paths relevant to the detection target and simulating only those paths. For example, FIoT [<xref ref-type="bibr" rid="ref-85">85</xref>,<xref ref-type="bibr" rid="ref-86">86</xref>] traced paths from data input sources to memory overflow-prone aggregation functions using reverse program slicing. Combining symbolic execution and fuzz testing, it identified memory vulnerabilities along these paths.</p>
<p><bold>Full Firmware Emulation:</bold> Other studies overcome hardware-firmware coupling and architectural differences to achieve full-system firmware emulation [<xref ref-type="bibr" rid="ref-87">87</xref>&#x2013;<xref ref-type="bibr" rid="ref-90">90</xref>]. uEmu [<xref ref-type="bibr" rid="ref-90">90</xref>] leveraged symbolic execution to deduce expected inputs during firmware execution, forming a peripheral feedback knowledge base. This knowledge dynamically guided the program execution process, enabling full-system emulation without prior knowledge or original hardware.</p>
</sec>
<sec id="s3_2_5">
<label>3.2.5</label>
<title>Firmware Vulnerability Detection via Mobile Apps</title>
<p>Some IoT manufacturers provide mobile apps as control terminals for their devices. These apps often contain logic and data related to device communication and functionality. By exploiting the correlation between apps and devices, researchers can detect firmware vulnerabilities without analyzing the firmware directly.</p>
<p><bold>Using Apps as Input Interfaces:</bold> Since full-system IoT device emulation is challenging and direct data input from devices is difficult to locate, tools like IoTFuzzer [<xref ref-type="bibr" rid="ref-91">91</xref>]and DIANE [<xref ref-type="bibr" rid="ref-92">92</xref>] reframe the problem. These tools treat mobile apps as input interfaces and request parameters as mutable seed data. They:
<list list-type="bullet">
<list-item>
<p>Automatically locate parameter data sources or processing functions within the app.</p></list-item>
<list-item>
<p>Mutate parameter values and send them to devices via the app&#x2019;s business logic.</p></list-item>
<list-item>
<p>Observe real device crash logs to detect memory vulnerabilities in firmware quickly.</p></list-item>
</list></p>
<p><bold>Bluetooth Exploitation via Apps:</bold></p>
<p>In the literature [<xref ref-type="bibr" rid="ref-93">93</xref>], the author found that apps could reveal device UUIDs (universally unique identifiers), which are identifiable in Bluetooth broadcasts and the Bluetooth authentication mode used. Attackers could exploit app behavior to attack nearby devices.</p>
<p><bold>Component Reuse and Similarity Analysis:</bold></p>
<p>Manufacturers often reuse development components across devices, meaning vulnerabilities in one component can appear in multiple devices. By comparing similarities between different devices&#x2019; apps, researchers can infer shared vulnerabilities [<xref ref-type="bibr" rid="ref-94">94</xref>].</p>
</sec>
<sec id="s3_2_6">
<label>3.2.6</label>
<title>Device Anomaly Detection Based on Side-Channel Characteristics</title>
<p>Devices under attack often exhibit anomalies in their external side-channel characteristics, in addition to internal functional disruptions. These side-channel features can be leveraged for anomaly detection.</p>
<p><bold>Traffic-Based Anomaly Detection:</bold> The traffic generated during a device&#x2019;s network interactions reflects its internal behavior, making it a valuable source for detecting anomalies.
<list list-type="bullet">
<list-item>
<p>Unencrypted Header Features: Extracting header information from unencrypted traffic can help identify anomalous devices [<xref ref-type="bibr" rid="ref-95">95</xref>&#x2013;<xref ref-type="bibr" rid="ref-97">97</xref>]. For instance, Yu et al. [<xref ref-type="bibr" rid="ref-97">97</xref>] used the common broadcast and multicast protocols in device communication to represent the device&#x2019;s overall characteristics as a &#x201C;view.&#x201D;&#x2002;They then applied a multi-view learning algorithm to create device signatures, effectively identifying anomalous or spoofed devices in complex environments with numerous devices.</p></list-item>
<list-item>
<p>Encrypted Traffic Features: Statistical features of encrypted traffic, such as packet length and timestamps, can also be analyzed. Zhang et al. [<xref ref-type="bibr" rid="ref-98">98</xref>] designed a behavior recognition system for devices on the SmartThings platform using traffic characteristics from ZigBee and Z-Wave protocols, enabling anomaly detection based on traffic patterns.</p></list-item>
</list></p>
<p><bold>Physical Characteristic-Based Anomaly Detection:</bold> External physical characteristics such as power consumption, voltage, speed, gravity, and orientation can reflect the operational state of a device. Some studies utilize these characteristics for anomaly detection [<xref ref-type="bibr" rid="ref-98">98</xref>&#x2013;<xref ref-type="bibr" rid="ref-100">100</xref>]. For example, Choi et al. [<xref ref-type="bibr" rid="ref-101">101</xref>] used control parameters, physical motion data, and low-level control algorithms from drones and ground detectors as baselines for normal operation. Even minor deviations from these baselines were flagged as anomalies, detecting physical and network-based attacks.</p>
<p><bold>Context Consistency Detection Using Nearby Devices:</bold> Activities in an environment often exhibit contextual consistency among nearby devices or sensors. This characteristic can be exploited for malicious behavior detection [<xref ref-type="bibr" rid="ref-101">101</xref>&#x2013;<xref ref-type="bibr" rid="ref-102">102</xref>]. For instance, Birnbach et al. [<xref ref-type="bibr" rid="ref-102">102</xref>] collected sensor data from multiple devices in a smart home environment. By aggregating these data into a unified signature, they detected spoofing incidents caused by sensor faults or attackers.</p>
</sec>
<sec id="s3_2_7">
<label>3.2.7</label>
<title>Summary of Threat Detection</title>
<p>Key findings and limitations in threat detection research discussed in <xref ref-type="sec" rid="s3_2">Section 3.2</xref> are summarized as follows:</p>
<p><bold>Limitations of Malicious App Detection in Cloud Platforms:</bold>
<list list-type="bullet">
<list-item>
<p>Most detection approaches focus on SmartThings and IFTTT, achieving good results but relying heavily on these platforms&#x2019; specific application development characteristics. Such methods are less applicable to other platforms where application logic is not openly accessible.</p></list-item>
<list-item>
<p>By contrast, FlowFence [<xref ref-type="bibr" rid="ref-103">103</xref>] proposed a platform-agnostic approach. It isolates all sensitive operations in pre-defined sandboxes, requiring applications to access sensitive data only through sandbox-defined interfaces. However, this approach demands highly customized system support.</p></list-item>
</list></p>
<p><bold>Challenges in Interaction Logic Vulnerability Detection:</bold>
<list list-type="bullet">
<list-item>
<p>Research on interaction logic vulnerabilities has explored black-box platform detection methods with promising results. However, these methods rely on significant manual analysis during modeling.</p></list-item>
<list-item>
<p>Increasingly robust cloud platform security mechanisms, such as mutual certificate verification, pose challenges to decryption-based communication analysis. Developing effective interaction process modeling methods remains a critical direction for future research.</p></list-item>
</list></p>
<p><bold>Firmware Analysis Challenges:</bold>
<list list-type="bullet">
<list-item>
<p>Obtaining and loading firmware are persistent obstacles. Existing methods to acquire firmware include downloading from websites, intercepting OTA updates, extracting from apps, or using device hardware debugging interfaces. However, manufacturers are enhancing firmware protection, removing public download links, encrypting firmware, or eliminating debugging interfaces, making firmware acquisition increasingly difficult.</p></list-item>
<list-item>
<p>Loading firmware often requires manual analysis to build firmware format databases, which are not scalable. Wen et al. [<xref ref-type="bibr" rid="ref-104">104</xref>] proposed a method to automatically locate firmware base addresses using absolute pointers, improving loading efficiency. However, this method&#x2019;s success is limited by the availability of absolute pointers.</p></list-item>
</list></p>
<p><bold>Limitations of Firmware Vulnerability Detection Methods:</bold>
<list list-type="bullet">
<list-item>
<p>Static Analysis: Techniques like symbolic execution and taint analysis face path explosion and over-tainting challenges, respectively. Reducing the solution space before analysis is crucial. Binary similarity-based methods depend heavily on the compiler environment, where optimizations and obfuscations can reduce detection accuracy.</p></list-item>
<list-item>
<p>Dynamic Analysis: The effectiveness of firmware emulation depends on handling diverse hardware components and accommodating various architectures.</p></list-item>
<list-item>
<p>App-Based Detection: This method requires devices to have corresponding control apps closely tied to device functionality. Seed data generation and mutation rely entirely on app logic, limiting detection to identifying crashes without pinpointing specific vulnerabilities or their causes.</p></list-item>
</list></p>
<p><bold>Strengths and Weaknesses of Side-Channel Detection:</bold>
<list list-type="bullet">
<list-item><p>Strengths:
<list list-type="simple">
<list-item><label>&#x2218;</label><p>Side-channel detection is a non-intrusive method that identifies device anomalies through external observations, making it effective in scenarios where direct system access is not possible.</p></list-item>
<list-item><label>&#x2218;</label><p>Advanced methodologies such as power analysis, electromagnetic leakage detection, and timing attacks enhance detection capabilities.</p></list-item>
<list-item><label>&#x2218;</label><p>Quantitative evaluations from cited studies indicate that detection accuracy ranges from 85% to 97%, depending on the feature set and learning model used.</p></list-item>
</list></p></list-item>
<list-item><p>Weaknesses:
<list list-type="simple">
<list-item><label>&#x2218;</label><p>The effectiveness of side-channel detection is limited by feature selection and learning algorithms, impacting its generalizability across different environments.</p></list-item>
<list-item><label>&#x2218;</label><p>Traffic Features: Performance varies based on signal strength, protocol type, and communication mode, leading to false positive rates between 5% and 15%.</p></list-item>
<list-item><label>&#x2218;</label><p>Physical Features: Strongly influenced by environmental conditions, affecting reliability and increasing computational costs.</p></list-item>
<list-item><label>&#x2218;</label><p>Contextual Features: Multiple proximal devices are required to generate meaningful contextual data, which can reduce detection efficiency by up to 20% in sparse network environments.</p></list-item>
</list></p></list-item>
</list></p>
</sec>
</sec>
<sec id="s3_3">
<label>3.3</label>
<title>Threat Defense</title>
<p>Researchers have proposed targeted defense solutions to address various security threats in IoT applications. Defense is defined here as proactive measures taken before threats materialize to prevent harm. This section categorizes threat defense solutions into five types based on the targeted threat and the underlying technical principles. A comparative overview is provided in <xref ref-type="table" rid="table-5">Table 5</xref>.</p>
<sec id="s3_3_1">
<label>3.3.1</label>
<title>Fine-Grained Access Control for Cloud Platforms</title>
<p>The primary cause of access control issues in IoT cloud platforms is the failure to adhere to the principle of least privilege during platform functionality implementation. Current research leverages platform characteristics to design fine-grained access control mechanisms.
<list list-type="bullet">
<list-item><p><bold>For the SmartThings platform</bold>, researchers extract real-time contextual information from SmartApps during operation to provide detailed references for access control decisions:
<list list-type="simple">
<list-item><label>&#x2218;</label><p><bold>ContextIoT</bold> [<xref ref-type="bibr" rid="ref-61">61</xref>] captures execution paths, data dependencies, real-time variable values, and environmental parameters from within SmartApps. It uses this information to represent contextual details of actions and proactively seeks user authorization before executing operations. Only authorized actions are permitted to proceed.</p></list-item>
<list-item><label>&#x2218;</label><p><bold>SmartAuth</bold> [<xref ref-type="bibr" rid="ref-62">62</xref>] applies natural language processing to extract operation-related details from the textual descriptions of SmartApp functionalities. Taint analysis then captures actual runtime operations, comparing these with the descriptions. If discrepancies are detected, users are notified to grant or deny authorization. Both solutions effectively prevent privacy leaks caused by malicious apps, though they increase user interaction overhead.</p></list-item>
</list></p></list-item>
<list-item><p><bold>For IFTTT platforms</bold>, which use token-based service rules, Fernandes et al. proposed an optimized permission management model to address issues in token management. The model introduces an application proxy and uses fine-grained &#x201C;rule tokens&#x201D; to decentralize the centralized permission management system [<xref ref-type="bibr" rid="ref-61">61</xref>,<xref ref-type="bibr" rid="ref-62">62</xref>]. This distributed approach resolves challenges related to centralized management and coarse-grained tokens.</p></list-item>
<list-item><p><bold>Other research:</bold> Some studies propose new access control models for specialized IoT scenarios, leveraging theories from domains like SDN (Software-Defined Networking) or smartphone access control [<xref ref-type="bibr" rid="ref-63">63</xref>&#x2013;<xref ref-type="bibr" rid="ref-65">65</xref>]. However, these solutions often require specialized architectural support.</p></list-item>
</list></p>
</sec>
<sec id="s3_3_2">
<label>3.3.2</label>
<title>Secure Communication Protocols</title>
<p>Robust security mechanisms must be integrated into commonly used IoT protocols to ensure secure communication in IoT systems. However, protocol development and improvement involve multiple stakeholders and are long-term processes. Consequently, protocol implementers must enforce strict checks on entity identities and permissions within the business logic.
<list list-type="bullet">
<list-item>
<p><bold>Improving Existing Protocols:</bold> For the <bold>MQTT protocol</bold>, missing security attributes can be addressed by introducing session management mechanisms, message-based access controls, and limitations on wildcard usage. The inherent weaknesses of the ZigBee protocol necessitate enhanced encryption levels during network joining and regular communication phases [<xref ref-type="bibr" rid="ref-66">66</xref>].</p></list-item>
<list-item>
<p><bold>Custom Protocol Design:</bold> Jamshid et al. [<xref ref-type="bibr" rid="ref-67">67</xref>] developed a model for mutual authentication and key exchange between devices based on ZigBee communication. This model strengthens the protocol&#x2019;s robustness in adversarial environments.</p></list-item>
<list-item>
<p><bold>Proximity-Based Secure Pairing:</bold> Some studies focus on designing secure pairing protocols for devices communicating over short distances. These protocols address vulnerabilities such as key theft and reliance on manual intervention [<xref ref-type="bibr" rid="ref-68">68</xref>,<xref ref-type="bibr" rid="ref-69">69</xref>]. Habiba et al. [<xref ref-type="bibr" rid="ref-70">70</xref>] utilized the consistency of physical activity sensing by nearby smart devices within the same period to generate symmetric keys. This approach effectively counters device spoofing and man-in-the-middle attacks. Li et al. [<xref ref-type="bibr" rid="ref-71">71</xref>] proposed a novel pairing scheme for wearable devices. This scheme leverages radio signal noise&#x2019;s highly random and unpredictable characteristics as it propagates through different media, such as human skin and air.</p></list-item>
</list></p>
</sec>
</sec>
<sec id="s3_4">
<label>3.4</label>
<title>Traffic Feature Hiding</title>
<p>Generalizing Solutions Across IoT Platforms To address the threat of side-channel analysis across diverse communication traffic patterns, this section introduces traffic feature concealment strategies that can be generalized across different IoT platforms. The proposed methods enhance the practical relevance of these defenses by ensuring adaptability to various device types and communication protocols.</p>
<sec id="s3_4_1">
<label>3.4.1</label>
<title>Header Feature Concealment</title>
<p>Header feature concealment involves obfuscating protocol header information without affecting data integrity or traffic forwarding capabilities. These methods are adaptable across IoT platforms that use DNS and VPN protocols:
<list list-type="bullet">
<list-item>
<p>DNS Encryption: Encrypts domain name requests to obscure network request targets, as demonstrated by prior research [<xref ref-type="bibr" rid="ref-72">72</xref>].</p></list-item>
<list-item>
<p>Tunnel Forwarding: Transforms device-to-cloud communication into encrypted communication between VPN nodes, making device-specific traffic patterns less distinguishable.</p></list-item>
</list></p>
</sec>
<sec id="s3_4_2">
<label>3.4.2</label>
<title>Statistical Feature Concealment</title>
<p>Statistical feature concealment techniques alter traffic patterns to prevent inference of device activities. These techniques are applicable across various IoT environments:
<list list-type="bullet">
<list-item>
<p>Decoy Traffic Injection: Injects random packets into communication streams, confusing eavesdroppers about real activities.</p></list-item>
<list-item>
<p>Traffic Shaping: Adjusts transmission rates and packet sizes to mask distinctive traffic patterns [<xref ref-type="bibr" rid="ref-73">73</xref>,<xref ref-type="bibr" rid="ref-74">74</xref>].</p></list-item>
</list></p>
</sec>
<sec id="s3_4_3">
<label>3.4.3</label>
<title>Secure Firmware Protection</title>
<p>Across Device Architectures Given the resource constraints of IoT devices, firmware protection mechanisms must be lightweight and universally applicable. Generalized techniques include:
<list list-type="bullet">
<list-item>
<p>Component Isolation: Segregates memory and program components to contain potential exploits, with tools like EPOXY [<xref ref-type="bibr" rid="ref-75">75</xref>] and ACES [<xref ref-type="bibr" rid="ref-76">76</xref>] applicable across various embedded systems.</p></list-item>
<list-item>
<p>Control Flow Integrity (CFI): Prevents control flow hijacking using mechanisms like &#x03BC;RAI and Silhouette, which can be integrated into different hardware architectures.</p></list-item>
<list-item>
<p>Remote Attestation: Verifies device integrity via attestation protocols, such as C-FLAT [<xref ref-type="bibr" rid="ref-77">77</xref>] for control-flow verification and DIAT [<xref ref-type="bibr" rid="ref-78">78</xref>,<xref ref-type="bibr" rid="ref-79">79</xref>] for collaborative network environments.</p></list-item>
</list></p>
</sec>
<sec id="s3_4_4">
<label>3.4.4</label>
<title>Defenses Against Voice-Based Attacks</title>
<p>Voice-based attack defenses must address the growing diversity of voice-controlled IoT devices for Diverse Applications. Generalizable solutions include:
<list list-type="bullet">
<list-item>
<p>Interactive Safeguards: Adds security prompts for sensitive operations, balancing usability and security.</p></list-item>
<list-item>
<p>Hardware-Based Filtering: Installs ultrasound filters or physically isolates microphones to mitigate signal injection attacks.</p></list-item>
<list-item>
<p>ML-Based Authentication: Utilizes machine learning models to distinguish between genuine and synthetic voices, applicable across various device models.</p></list-item>
<list-item>
<p>Wireless Signal Analysis: Detects anomalies in Wi-Fi channel state information (CSI) to identify malicious commands [<xref ref-type="bibr" rid="ref-80">80</xref>].</p></list-item>
</list></p>
</sec>
<sec id="s3_4_5">
<label>3.4.5</label>
<title>Practical Considerations for Deploying Traffic Feature Hiding Mechanisms</title>
<p>Ensuring the real-world feasibility of traffic feature concealment strategies requires evaluating their impact on system performance, resource consumption, and deployment costs. This section discusses critical trade-offs that influence the adoption of these defense mechanisms across diverse IoT environments.
<list list-type="simple">
<list-item><label>1.</label><p>Computational Overhead and Hardware Constraints
<list list-type="bullet">
<list-item><p>Many IoT devices operate under strict resource constraints, limiting their ability to implement complex security measures. To address this, traffic feature concealment techniques should:</p></list-item>
<list-item><p>Utilize lightweight encryption methods (e.g., ChaCha20 over AES) to balance security and processing efficiency.</p></list-item>
<list-item><p>Implement hardware-assisted security where feasible, leveraging secure enclaves or dedicated cryptographic co-processors.</p></list-item>
</list></p></list-item>
<list-item><label>2.</label><p>Energy Efficiency Considerations</p>
<p>Battery-operated IoT devices must minimize power consumption while ensuring secure communication. Key optimizations include:
<list list-type="bullet">
<list-item><p>Adaptive traffic shaping, which adjusts concealment intensity based on battery levels.</p></list-item>
<list-item><p>Efficient decoy traffic strategies, where noise injection is dynamically controlled to conserve energy.</p></list-item>
</list></p></list-item>
<list-item><label>3.</label><p>Cost and Scalability of Deployment</p>
<p>The practicality of implementing these defenses on a scale depends on factors such as infrastructure modifications and maintenance costs. Strategies to enhance deployment feasibility include:
<list list-type="bullet">
<list-item><p>Cloud-assisted traffic obfuscation, reducing processing demands on individual devices.</p></list-item>
<list-item><p>Edge-based security models, where computationally intensive tasks are offloaded to edge nodes, optimizing scalability without increasing latency.</p></list-item>
</list></p></list-item></list></p>
</sec>
<sec id="s3_4_6">
<label>3.4.6</label>
<title>Summary of Threat Defense</title>
<p>Towards Generalized IoT Security Mechanisms: This section summarizes the characteristics, limitations, and generalization strategies of the discussed defense mechanisms:
<list list-type="bullet">
<list-item>
<p>Cross-Platform Access Control: Innovative models like the transfer learning-based permission management framework [<xref ref-type="bibr" rid="ref-81">81</xref>] can adapt access control policies across different cloud platforms.</p></list-item>
<list-item>
<p>Protocol Security Enhancement: IoT-specific protocols like MQTT and ZigBee require scenario-specific security extensions to maintain resilience in dynamic environments.</p></list-item>
<list-item>
<p>Firmware Protection Optimization: Hardware-assisted security features must be adapted to diverse device types while minimizing overhead.</p></list-item>
<list-item>
<p>Voice Attack Mitigation: Ongoing research into low-overhead, platform-agnostic defenses is crucial to ensure robust protection across the growing ecosystem of voice-controlled IoT devices.</p></list-item>
</list></p>
<p>By emphasizing techniques with broad applicability, this study enhances the practical relevance of the proposed defenses, providing actionable insights for securing heterogeneous IoT ecosystems.</p>
</sec>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Challenges and Opportunities</title>
<p>This section builds on the analysis of security threats and detection and defense strategies from <xref ref-type="sec" rid="s3">Section 3</xref> to identify current research challenges and future research opportunities. The relationship between these challenges and opportunities is illustrated in <xref ref-type="fig" rid="fig-4">Fig. 4</xref>.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>The relationship between challenges and opportunities</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="JIOT_62733-fig-4.tif"/>
</fig>
<sec id="s4_1">
<label>4.1</label>
<title>Platform Security Gaps</title>
<sec id="s4_1_1">
<label>4.1.1</label>
<title>Inadequate Privacy Protection</title>
<p>IoT devices are deeply integrated into daily life, collecting data that can reveal personal habits and behavioral patterns [<xref ref-type="bibr" rid="ref-18">18</xref>]. Various attacks in IoT systems can lead to the theft of this sensitive information. As shown in <xref ref-type="table" rid="table-1">Table 1</xref>, most threats in IoT systems result in privacy breaches. Another key issue contributing to insufficient privacy protection is the lack of understanding of privacy-related information [<xref ref-type="bibr" rid="ref-82">82</xref>]. Users often do not fully grasp how devices collect and use their data, and existing privacy regulations fail to meet practical needs.</p>
</sec>
<sec id="s4_1_2">
<label>4.1.2</label>
<title>Proliferation of Application Types</title>
<p>IoT cloud platforms offer numerous and diverse applications and services, yet current security auditing mechanisms struggle to address their security needs. Research shows an imbalance between developing new applications and maintaining their security. Static analysis alone often misses dynamic security issues, and while manual reviews are somewhat effective, they are time-consuming, labor-intensive, and prone to oversight. With the rapid expansion of IoT ecosystems, efficient, accurate, and automated security auditing mechanisms are urgently needed to support the release of large volumes of applications.</p>
</sec>
<sec id="s4_1_3">
<label>4.1.3</label>
<title>Complex Interaction Models</title>
<p>As IoT systems evolve, interaction models are becoming increasingly complex. Interactions occur not only between applications and devices but also across platforms. Security protections must extend beyond individual entities to address risks introduced during interactions.</p>
<p>A common issue is that even if individual entities are secure when operating independently, their protection mechanisms may fail during interactions with others. Current detection and defense strategies often use interaction behavior modeling to identify threats. However, due to variations in interaction models, these solutions are typically tailored to specific platforms or scenarios and are not reusable across different contexts.</p>
</sec>
<sec id="s4_1_4">
<label>4.1.4</label>
<title>Limited Applicability of Solutions</title>
<p>Most existing threat detection and defense mechanisms are designed for specific application types, scenarios, device structures, or systems.
<list list-type="bullet">
<list-item>
<p>In cloud platforms, solutions for detecting malicious applications and interaction logic vulnerabilities are typically developed around platform-specific characteristics.</p></list-item>
<list-item>
<p>In device firmware analysis, underlying architecture and hardware diversity restrict simulations to certain firmware types.</p></list-item>
</list></p>
<p>These limitations mean current solutions are often domain-specific, lack portability or modularity, and fail to address new challenges effectively.</p>
</sec>
<sec id="s4_1_5">
<label>4.1.5</label>
<title>Lack of Unified Communication Standards</title>
<p>IoT communication networks are highly heterogeneous, encompassing diverse network types and structures. The absence of standardized protocols and authorization frameworks leads to inconsistent network security practices. IoT devices&#x2019; limited resources and real-time performance requirements make lightweight communication protocols more suitable. However, most widely used lightweight protocols lack built-in security mechanisms. Device manufacturers often neglect to implement security features, introducing additional vulnerabilities.</p>
</sec>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Future Research Opportunities</title>
<sec id="s4_2_1">
<label>4.2.1</label>
<title>Privacy Protection and Understanding</title>
<p>Privacy and security have always been a key focus of IoT research. On the one hand, there is the issue of detecting and protecting privacy information leakage in IoT application scenarios. On the other hand, research on privacy understanding is also essential, such as surveying users&#x2019; awareness and understanding of privacy policies [<xref ref-type="bibr" rid="ref-105">105</xref>] and assessing the rationality of privacy protection measures from different stakeholders in the IoT ecosystem [<xref ref-type="bibr" rid="ref-106">106</xref>]. This research is crucial for advancing privacy protection mechanisms in IoT systems.</p>
</sec>
<sec id="s4_2_2">
<label>4.2.2</label>
<title>Access Control in Complex Environments</title>
<p>The application environment of IoT systems is highly complex, and security vulnerabilities due to identity authentication and authorization management flaws manifest in many ways. Current research on enhanced access control schemes has limitations. Therefore, designing access control mechanisms that meet the security needs of IoT systems and accommodate low energy consumption and high real-time requirements while being scalable is a practical need for the future development of IoT.</p>
</sec>
<sec id="s4_2_3">
<label>4.2.3</label>
<title>AI-Based Detection and Defense Solutions</title>
<p>Artificial intelligence (AI) technology can enable in-depth learning and understanding of the information collected by devices, helping to address the automation shortcomings of existing detection and defense technologies. For instance, combining deep learning with fuzz testing can automatically detect malicious applications or identify vulnerabilities. Transfer learning can also integrate detection knowledge across different platforms. As IoT applications diversify and interaction scenarios become more complex, utilizing AI to enhance threat detection and defense solutions is a promising direction for further research.</p>
</sec>
<sec id="s4_2_4">
<label>4.2.4</label>
<title>Efficient Firmware Vulnerability Detection and Trusted Defense Architectures</title>
<p>Given the widespread security vulnerabilities in device firmware, more effective methods are needed to detect and prevent threats from escalating during usage. For example, in firmware dynamic analysis, achieving a more comprehensive simulation and combining it with other tools for vulnerability detection requires further research. Additionally, due to IoT devices&#x2019; limited hardware and software conditions, most traditional security mechanisms cannot be directly applied. Another key research challenge is overcoming these limitations and implementing more trusted defense architectures in firmware.</p>
</sec>
<sec id="s4_2_5">
<label>4.2.5</label>
<title>Secure Communication Protocols</title>
<p>Communication protocols are at the core of the IoT transport layer. On the one hand, manufacturers often overlook security considerations when implementing lightweight protocols that lack built-in security features, necessitating efficient and automated security analysis solutions. On the other hand, leveraging the unique characteristics of IoT, such as interactions between three types of entities or device proximity, can help design IoT-specific secure communication protocols tailored to application scenarios.</p>
</sec>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Conclusion</title>
<p>As IoT systems expand in scale and complexity, they face various security threats due to their diverse applications, large device ecosystems, and intricate interaction processes. Detecting and mitigating these threats is crucial for IoT technologies&#x2019; sustained development and reliability. This paper systematically reviews key research contributions in IoT security over the past five years, categorizing emerging threats, detection methodologies, and defense mechanisms. We have prioritized security challenges based on urgency, feasibility, and impact to provide a structured roadmap for future research. A structured ranking framework has been introduced to help researchers and practitioners focus on the most pressing security concerns. Future IoT security research must emphasize high-impact areas such as scalable authentication, real-time anomaly detection, and quantum-safe cryptographic solutions. As IoT technology evolves, addressing these security gaps in a structured and prioritized manner will be critical in ensuring a resilient and secure IoT ecosystem.</p>
</sec>
</body>
<back>
<ack>
<p>The authors have no acknowledgement.</p>
</ack>
<sec>
<title>Funding Statement</title>
<p>The authors received no specific funding for this study.</p>
</sec>
<sec>
<title>Author Contributions</title>
<p>Akhila Reddy Yadulla prepared the original draft and edited it. Mounica Yenugula worked on data curation and analysis. Vinay Kumar Kasula worked on conceptualization and methodology. Bhargavi Konda and Bala Yashwanth Reddy Thumma worked on review, validation, and supervision. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability">
<title>Availability of Data and Materials</title>
<p>Not applicable.</p>
</sec>
<sec>
<title>Ethics Approval</title>
<p>Not applicable.</p>
</sec>
<sec sec-type="COI-statement">
<title>Conflicts of Interest</title>
<p>The authors declare no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhou</surname> <given-names>W</given-names></string-name>, <string-name><surname>Jia</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Peng</surname> <given-names>A</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>P</given-names></string-name></person-group>. <article-title>The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved</article-title>. <source>IEEE Internet Things J</source>. <year>2019</year>;<volume>6</volume>(<issue>2</issue>):<fpage>1606</fpage>&#x2013;<lpage>16</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2018.2847733</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Alrawi</surname> <given-names>O</given-names></string-name>, <string-name><surname>Lever</surname> <given-names>C</given-names></string-name>, <string-name><surname>Antonakakis</surname> <given-names>M</given-names></string-name>, <string-name><surname>Monrose</surname> <given-names>F</given-names></string-name></person-group>. <article-title>SoK: security evaluation of home-based IoT deployments</article-title>. In: <conf-name>2019 IEEE Symposium on Security and Privacy (SP); 2019 May 19&#x2013;23</conf-name>; <publisher-loc>San Francisco, CA, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2019</year>. p. <fpage>1362</fpage>&#x2013;<lpage>80</lpage>. doi:<pub-id pub-id-type="doi">10.1109/sp.2019.00013</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Antonakakis</surname> <given-names>M</given-names></string-name>, <string-name><surname>April</surname> <given-names>T</given-names></string-name>, <string-name><surname>Bailey</surname> <given-names>M</given-names></string-name>, <string-name><surname>Bernhard</surname> <given-names>M</given-names></string-name>, <string-name><surname>Bursztein</surname> <given-names>E</given-names></string-name>, <string-name><surname>Cochran</surname> <given-names>J</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Understanding the Mirai botnet</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2017</year>. p. <fpage>1093</fpage>&#x2013;<lpage>110</lpage>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Guo</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Li</surname> <given-names>P</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>K</given-names></string-name></person-group>. <article-title>SkillExplorer: understanding the behavior of skills on large scale</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2020</year>. p. <fpage>2649</fpage>&#x2013;<lpage>66</lpage>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>YQ</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>W</given-names></string-name>, <string-name><surname>Peng</surname> <given-names>AN</given-names></string-name></person-group>. <article-title>Survey of Internet of things security</article-title>. <source>J Comput Res Dev</source>. <year>2017</year>;<volume>54</volume>(<issue>10</issue>):<fpage>2130</fpage>&#x2013;<lpage>43</lpage>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Peng</surname> <given-names>AN</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>W</given-names></string-name>, <string-name><surname>Jia</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Survey of the Internet of Things operating system security</article-title>. <source>J Communicat</source>. <year>2018</year>;<volume>39</volume>(<issue>3</issue>):<fpage>22</fpage>&#x2013;<lpage>34</lpage>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wang</surname> <given-names>JC</given-names></string-name>, <string-name><surname>Li</surname> <given-names>YL</given-names></string-name>, <string-name><surname>Jia</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>W</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>YC</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>H</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Survey of smart home security</article-title>. <source>J Comput Res Dev</source>. <year>2018</year>;<volume>55</volume>(<issue>10</issue>):<fpage>2111</fpage>&#x2013;<lpage>24</lpage>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>He</surname> <given-names>W</given-names></string-name>, <string-name><surname>Golla</surname> <given-names>M</given-names></string-name>, <string-name><surname>Padhi</surname> <given-names>R</given-names></string-name>, <string-name><surname>Ofek</surname> <given-names>J</given-names></string-name>, <string-name><surname>D&#x00FC;rmuth</surname> <given-names>M</given-names></string-name>, <string-name><surname>Fernandes</surname> <given-names>E</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Rethinking access control and authentication for the home Internet of things (IoT)</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2018</year>. p. <fpage>255</fpage>&#x2013;<lpage>72</lpage>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Fernandes</surname> <given-names>E</given-names></string-name>, <string-name><surname>Jung</surname> <given-names>J</given-names></string-name>, <string-name><surname>Prakash</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Security analysis of emerging smart home applications</article-title>. In: <conf-name> 2016 IEEE Symposium on Security and Privacy (SP); 2016 May 22&#x2013;26</conf-name>; <publisher-loc>San Jose, CA, USA</publisher-loc>. <publisher-name>IEEE</publisher-name>; <year>2016</year>. p. <fpage>636</fpage>&#x2013;<lpage>54</lpage>. doi:<pub-id pub-id-type="doi">10.1109/SP.2016.44</pub-id>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Fernandes</surname> <given-names>E</given-names></string-name>, <string-name><surname>Rahmati</surname> <given-names>A</given-names></string-name>, <string-name><surname>Jung</surname> <given-names>J</given-names></string-name>, <string-name><surname>Prakash</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Decentralized action integrity for trigger-action IoT platforms</article-title>. In: <conf-name>Proceedings 2018 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>Virginia</publisher-loc>: <publisher-name>The Internet Society</publisher-name>; <year>2018</year>. p. <fpage>1</fpage>&#x2013;<lpage>16</lpage>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Yuan</surname> <given-names>B</given-names></string-name>, <string-name><surname>Jia</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Xing</surname> <given-names>L</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>D</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>XF</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Shattered chain of trust: understanding security risks in cross-cloud IoT access delegation</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2020</year>. p. <fpage>1183</fpage>&#x2013;<lpage>200</lpage>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Celik</surname> <given-names>ZB</given-names></string-name>, <string-name><surname>Babun</surname> <given-names>L</given-names></string-name>, <string-name><surname>Sikder</surname> <given-names>AK</given-names></string-name>, <string-name><surname>Aksu</surname> <given-names>H</given-names></string-name>, <string-name><surname>Tan</surname> <given-names>G</given-names></string-name>, <string-name><surname>McDaniel</surname> <given-names>P</given-names></string-name></person-group>. <article-title>Sensitive information tracking in commodity IoT</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2018</year>. p. <fpage>1687</fpage>&#x2013;<lpage>704</lpage>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Yuan</surname> <given-names>X</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Long</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>X</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>K</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Commandersong: a systematic approach for practical adversarial voice recognition</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2018</year>. p. <fpage>49</fpage>&#x2013;<lpage>64</lpage>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Yan</surname> <given-names>QB</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>KH</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Guo</surname> <given-names>H</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>N</given-names></string-name></person-group>. <article-title>SurfingAttack: interactive hidden attack on voice assistants using ultrasonic guided waves</article-title>. In: <conf-name>Proceedings of the 2020 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>Virginia, San Diego, CA, USA</publisher-loc>: <publisher-name>The Internet Society</publisher-name>; <year>2020</year>. p. <fpage>1</fpage>&#x2013;<lpage>18</lpage>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Bastys</surname> <given-names>I</given-names></string-name>, <string-name><surname>Balliu</surname> <given-names>M</given-names></string-name>, <string-name><surname>Sabelfeld</surname> <given-names>A</given-names></string-name></person-group>. <article-title>If this then what?: controlling flows in IoT apps</article-title>. In: <conf-name>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security</conf-name>; <publisher-loc>Toronto, ON, Canada</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2018</year>. p. <fpage>1102</fpage>&#x2013;<lpage>19</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3243734.3243841</pub-id>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Chen</surname> <given-names>T</given-names></string-name>, <string-name><surname>Shangguan</surname> <given-names>L</given-names></string-name>, <string-name><surname>Li</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Jamieson</surname> <given-names>K</given-names></string-name></person-group>. <article-title>Metamorph: injecting inaudible commands into over-the-air voice controlled systems</article-title>. In: <conf-name>Proceedings 2020 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>San Diego, CA, USA</publisher-loc>: <publisher-name>Internet Society</publisher-name>; <year>2020</year>. doi:<pub-id pub-id-type="doi">10.14722/ndss.2020.23055</pub-id>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tightiz</surname> <given-names>L</given-names></string-name>, <string-name><surname>Rashid</surname> <given-names>N</given-names></string-name>, <string-name><surname>Morteza</surname> <given-names>AN</given-names></string-name></person-group>. <article-title>Implementing AI solutions for advanced cyber-attack detection in smart grid</article-title>. <source>Int J Energy Res</source>. <year>2024</year>;<volume>2024</volume>:<fpage>6969383</fpage>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zhou</surname> <given-names>W</given-names></string-name>, <string-name><surname>Jia</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Yao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhu</surname> <given-names>L</given-names></string-name>, <string-name><surname>Guan</surname> <given-names>L</given-names></string-name>, <string-name><surname>Mao</surname> <given-names>Y</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2019</year>. p. <fpage>1133</fpage>&#x2013;<lpage>50</lpage>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Chen</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zuo</surname> <given-names>C</given-names></string-name>, <string-name><surname>Diao</surname> <given-names>W</given-names></string-name>, <string-name><surname>Dong</surname> <given-names>S</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>M</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Your IoTs are (not) mine: on the remote binding between IoT devices and users</article-title>. In: <conf-name>2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN); 2019 Jun 24&#x2013;27</conf-name>; <publisher-loc>Portland, OR, USA</publisher-loc>. <publisher-name>IEEE</publisher-name>; <year>2019</year>. p. <fpage>222</fpage>&#x2013;<lpage>33</lpage>. doi:<pub-id pub-id-type="doi">10.1109/DSN.2019.00034</pub-id>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Ronen</surname> <given-names>E</given-names></string-name>, <string-name><surname>Shamir</surname> <given-names>A</given-names></string-name>, <string-name><surname>Weingarten</surname> <given-names>AO</given-names></string-name>, <string-name><surname>O&#x2019;Flynn</surname> <given-names>C</given-names></string-name></person-group>. <article-title>IoT goes nuclear: creating a ZigBee chain reaction</article-title>. In: <conf-name>IEEE Symposium on Security and Privacy (SP); 2017 May 22&#x2013;26</conf-name>; <publisher-loc>San Jose, CA, USA</publisher-loc>. <publisher-name>IEEE</publisher-name>; <year>2017</year>. p. <fpage>195</fpage>&#x2013;<lpage>212</lpage>. doi:<pub-id pub-id-type="doi">10.1109/SP.2017.14</pub-id>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Jia</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Xing</surname> <given-names>L</given-names></string-name>, <string-name><surname>Mao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>D</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>X</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>S</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Burglars&#x2019; IoT paradise: understanding and mitigating security risks of general messaging protocols on IoT clouds</article-title>. In: <conf-name>2020 IEEE Symposium on Security and Privacy (SP); 2020 May 18&#x2013;21</conf-name>; <publisher-loc>San Francisco, CA, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2020</year>. p. <fpage>465</fpage>&#x2013;<lpage>81</lpage>. doi:<pub-id pub-id-type="doi">10.1109/sp40000.2020.00051</pub-id>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Cao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Lu</surname> <given-names>R</given-names></string-name>, <string-name><surname>Luan</surname> <given-names>TH</given-names></string-name></person-group>. <article-title>Ghost-in-the-wireless: energy depletion attack on ZigBee</article-title>. <source>IEEE Internet Things J</source>. <year>2014</year>:<fpage>373</fpage>&#x2013;<lpage>86</lpage>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Almakhdhub</surname> <given-names>NS</given-names></string-name>, <string-name><surname>Clements</surname> <given-names>AA</given-names></string-name>, <string-name><surname>Bagchi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Payer</surname> <given-names>M</given-names></string-name></person-group>. <article-title>muRAI: securing embedded systems with return address integrity</article-title>. In: <conf-name>Proceedings 2020 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>San Diego, CA, USA</publisher-loc>: <publisher-name>Internet Society</publisher-name>; <year>2020</year>. doi:<pub-id pub-id-type="doi">10.14722/ndss.2020.24016</pub-id>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Ding</surname> <given-names>W</given-names></string-name>, <string-name><surname>Hu</surname> <given-names>H</given-names></string-name></person-group>. <article-title>On the safety of IoT device physical interaction control</article-title>. In: <conf-name>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security</conf-name>; <publisher-loc>Toronto, ON, Canada</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2018</year>. p. <fpage>832</fpage>&#x2013;<lpage>46</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3243734.3243865</pub-id>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Subramanyan</surname> <given-names>P</given-names></string-name>, <string-name><surname>Malik</surname> <given-names>S</given-names></string-name>, <string-name><surname>Khattri</surname> <given-names>H</given-names></string-name>, <string-name><surname>Maiti</surname> <given-names>A</given-names></string-name>, <string-name><surname>Fung</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Verifying information flow properties of firmware using symbolic execution</article-title>. In: <conf-name>Proceedings of the 2016 Design, Automation &#x0026; Test in Europe Conference &#x0026; Exhibition (DATE); 2016 Mar 14&#x2013;18</conf-name>; <publisher-name>Research Publishing Services</publisher-name>; 2016. p. <fpage>337</fpage>&#x2013;<lpage>42</lpage>. doi:<pub-id pub-id-type="doi">10.3850/9783981537079_0793</pub-id>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Hernandez</surname> <given-names>G</given-names></string-name>, <string-name><surname>Fowze</surname> <given-names>F</given-names></string-name>, <string-name><surname>Tian</surname> <given-names>DJ</given-names></string-name>, <string-name><surname>Yavuz</surname> <given-names>T</given-names></string-name>, <string-name><surname>Butler</surname> <given-names>KRB</given-names></string-name></person-group>. <article-title>FirmUSB: vetting USB device firmware using domain informed symbolic execution</article-title>. In: <conf-name>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</conf-name>; <publisher-loc>Dallas, TX, USA</publisher-loc>. <publisher-name>ACM</publisher-name>; <year>2017</year>. p. <fpage>2245</fpage>&#x2013;<lpage>62</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3133956.3134050</pub-id>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ul Haq</surname> <given-names>S</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Sharma</surname> <given-names>A</given-names></string-name>, <string-name><surname>Gupta</surname> <given-names>R</given-names></string-name>, <string-name><surname>Gupta</surname> <given-names>D</given-names></string-name></person-group>. <article-title>A survey on IoT &#x0026; embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks</article-title>. <source>Discov Internet Things</source>. <year>2023</year>;<volume>3</volume>(<issue>1</issue>):<fpage>17</fpage>. doi:<pub-id pub-id-type="doi">10.1007/s43926-023-00045-2</pub-id>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Carlini</surname> <given-names>N</given-names></string-name>, <string-name><surname>Mishra</surname> <given-names>P</given-names></string-name>, <string-name><surname>Vaidya</surname> <given-names>T</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Sherr</surname> <given-names>M</given-names></string-name>, <string-name><surname>Shields</surname> <given-names>C</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Hidden voice commands</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2016</year>. p. <fpage>513</fpage>&#x2013;<lpage>30</lpage>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>G</given-names></string-name>, <string-name><surname>Yan</surname> <given-names>C</given-names></string-name>, <string-name><surname>Ji</surname> <given-names>X</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>T</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>T</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>W</given-names></string-name></person-group>. <article-title>DolphinAttack: inaudible voice commands</article-title>. In: <conf-name>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</conf-name>; <publisher-loc>Dallas, TX, USA</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2017</year>. p. <fpage>103</fpage>&#x2013;<lpage>17</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3133956.3134052</pub-id>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Celik</surname> <given-names>ZB</given-names></string-name>, <string-name><surname>McDaniel</surname> <given-names>P</given-names></string-name>, <string-name><surname>Tan</surname> <given-names>G</given-names></string-name></person-group>. <article-title>Soteria: automated IoT safety and security analysis</article-title>. In: <conf-name>USENIX Annual Technical Conference</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2018</year>. p. <fpage>147</fpage>&#x2013;<lpage>58</lpage>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Celik</surname> <given-names>ZB</given-names></string-name>, <string-name><surname>Tan</surname> <given-names>G</given-names></string-name>, <string-name><surname>McDaniel</surname> <given-names>P</given-names></string-name></person-group>. <article-title>IoTGuard: dynamic enforcement of security and safety policy in commodity IoT</article-title>. In: <conf-name>Proceedings 2019 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>San Diego, CA, USA</publisher-loc>: <publisher-name>Internet Society</publisher-name>; <year>2019</year>. doi:<pub-id pub-id-type="doi">10.14722/ndss.2019.23326</pub-id>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Roy</surname> <given-names>N</given-names></string-name>, <string-name><surname>Shen</surname> <given-names>S</given-names></string-name>, <string-name><surname>Hassanieh</surname> <given-names>H</given-names></string-name>, <string-name><surname>Choudhury</surname> <given-names>RR</given-names></string-name></person-group>. <article-title>Inaudible voice commands: the long-range attack and defense</article-title>. In: <conf-name>USENIX Symposium on Networked Systems Design and Implementation</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2018</year>. p. <fpage>547</fpage>&#x2013;<lpage>60</lpage>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>N</given-names></string-name>, <string-name><surname>Mi</surname> <given-names>X</given-names></string-name>, <string-name><surname>Feng</surname> <given-names>X</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>X</given-names></string-name>, <string-name><surname>Tian</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Qian</surname> <given-names>F</given-names></string-name></person-group>. <article-title>Dangerous skills: understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems</article-title>. In: <conf-name>2019 IEEE Symposium on Security and Privacy (SP); 2019 May 19&#x2013;23</conf-name>; <publisher-loc>San Francisco, CA, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2019</year>. p. <fpage>1381</fpage>&#x2013;<lpage>96</lpage>. doi:<pub-id pub-id-type="doi">10.1109/sp.2019.00016</pub-id>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Kumar</surname> <given-names>D</given-names></string-name>, <string-name><surname>Paccagnella</surname> <given-names>R</given-names></string-name>, <string-name><surname>Murley</surname> <given-names>P</given-names></string-name>, <string-name><surname>Hennenfent</surname> <given-names>E</given-names></string-name>, <string-name><surname>Mason</surname> <given-names>J</given-names></string-name>, <string-name><surname>Bates</surname> <given-names>A</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Skill squatting attacks on Amazon Alexa</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2018</year>, p. <fpage>33</fpage>&#x2013;<lpage>47</lpage>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Soltan</surname> <given-names>S</given-names></string-name>, <string-name><surname>Mittal</surname> <given-names>P</given-names></string-name>, <string-name><surname>Poor</surname> <given-names>HV</given-names></string-name></person-group>. <article-title>BlackIoT: IoT botnet of high-wattage devices can disrupt the power grid</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2018</year>. p. <fpage>15</fpage>&#x2013;<lpage>32</lpage>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Huang</surname> <given-names>B</given-names></string-name>, <string-name><surname>Cardenas</surname> <given-names>AA</given-names></string-name>, <string-name><surname>Baldick</surname> <given-names>R</given-names></string-name></person-group>. <article-title>Not everything is dark and gloomy: power grid protections against IoT demand attacks</article-title>. In: <conf-name>Proceedings of the 28th USENIX Conference on Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2019</year>. p. <fpage>1115</fpage>&#x2013;<lpage>32</lpage>.</mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Wang</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Datta</surname> <given-names>P</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>W</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>S</given-names></string-name>, <string-name><surname>Bates</surname> <given-names>A</given-names></string-name>, <string-name><surname>Gunter</surname> <given-names>CA</given-names></string-name></person-group>. <article-title>Charting the attack surface of trigger-action IoT platforms</article-title>. In: <conf-name>Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security</conf-name>; <publisher-loc>London, UK</publisher-loc>: <publisher-name>ACM Press</publisher-name>; <year>2019</year>. p. <fpage>1439</fpage>&#x2013;<lpage>53</lpage>.</mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Wang</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Hassan</surname> <given-names>WU</given-names></string-name>, <string-name><surname>Bates</surname> <given-names>A</given-names></string-name>, <string-name><surname>Gunter</surname> <given-names>C</given-names></string-name></person-group>. <article-title>Fear and logging in the Internet of Things</article-title>. In: <conf-name>Proceedings of the 2018 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>Virginia</publisher-loc>: <publisher-name>The Internet Society</publisher-name>; <year>2018</year>. p. <fpage>1</fpage>&#x2013;<lpage>16</lpage>.</mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zhu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Xiao</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Li</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>M</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>BY</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Et tu Alexa? when commodity WiFi devices turn into adversarial motion sensors</article-title>. In: <conf-name>Proceedings 2020 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>San Diego, CA, USA</publisher-loc>: <publisher-name>Internet Society</publisher-name>; <year>2020</year>. doi:<pub-id pub-id-type="doi">10.14722/ndss.2020.23053</pub-id>.</mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lopez-Martin</surname> <given-names>M</given-names></string-name>, <string-name><surname>Carro</surname> <given-names>B</given-names></string-name>, <string-name><surname>Sanchez-Esguevillas</surname> <given-names>A</given-names></string-name>, <string-name><surname>Lloret</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Network traffic classifier with convolutional and recurrent neural networks for Internet of Things</article-title>. <source>IEEE Access</source>. <year>2017</year>;<volume>5</volume>:<fpage>18042</fpage>&#x2013;<lpage>50</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2017.2747560</pub-id>.</mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Cao</surname> <given-names>X</given-names></string-name>, <string-name><surname>Shila</surname> <given-names>DM</given-names></string-name>, <string-name><surname>Cheng</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Ghost-in-ZigBee: energy depletion attack on ZigBee-based wireless networks</article-title>. <source>IEEE Internet Things J</source>. <year>2016</year>;<volume>3</volume>(<issue>5</issue>):<fpage>816</fpage>&#x2013;<lpage>29</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2016.2516102</pub-id>.</mixed-citation></ref>
<ref id="ref-42"><label>[42]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Fawaz</surname> <given-names>K</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>K-H</given-names></string-name>, <string-name><surname>Shin</surname> <given-names>KG</given-names></string-name></person-group>. <article-title>Protecting privacy of BLE device users</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2016</year>. p. <fpage>1205</fpage>&#x2013;<lpage>21</lpage>.</mixed-citation></ref>
<ref id="ref-43"><label>[43]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Antonioli</surname> <given-names>D</given-names></string-name>, <string-name><surname>Tippenhauer</surname> <given-names>NO</given-names></string-name>, <string-name><surname>Rasmussen</surname> <given-names>K</given-names></string-name></person-group>. <article-title>BIAS: bluetooth impersonation AttackS</article-title>. In: <conf-name>IEEE Symposium on Security and Privacy (SP); 2020 May 18&#x2013;21</conf-name>; <publisher-loc>San Francisco, CA, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2020</year>. p. <fpage>549</fpage>&#x2013;<lpage>62</lpage>. doi:<pub-id pub-id-type="doi">10.1109/sp40000.2020.00093</pub-id>.</mixed-citation></ref>
<ref id="ref-44"><label>[44]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Sethi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Peltonen</surname> <given-names>A</given-names></string-name>, <string-name><surname>Aura</surname> <given-names>T</given-names></string-name></person-group>. <article-title>Misbinding attacks on secure device pairing and bootstrapping</article-title>. In: <conf-name>Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security</conf-name>; <publisher-loc>Auckland, New Zealand</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2019</year>. p. <fpage>453</fpage>&#x2013;<lpage>64</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3321705.3329813</pub-id>.</mixed-citation></ref>
<ref id="ref-45"><label>[45]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>OConnor</surname> <given-names>TJ</given-names></string-name>, <string-name><surname>Enck</surname> <given-names>W</given-names></string-name>, <string-name><surname>Reaves</surname> <given-names>B</given-names></string-name></person-group>. <article-title>Blinded and confused: uncovering systemic flaws in device telemetry for smart-home Internet of Things</article-title>. In: <conf-name>Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks</conf-name>; <publisher-loc>Miami, Florida</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2019</year>. p. <fpage>140</fpage>&#x2013;<lpage>50</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3317549.3319724</pub-id>.</mixed-citation></ref>
<ref id="ref-46"><label>[46]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Wen</surname> <given-names>H</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>QA</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>Z</given-names></string-name></person-group>. <article-title>Plug-N-Pwned: comprehensive vulnerability analysis of OBD-II dongles as a new over-the-air attack surface in automotive IoT</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2020</year>. p. <fpage>949</fpage>&#x2013;<lpage>65</lpage>.</mixed-citation></ref>
<ref id="ref-47"><label>[47]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sivanathan</surname> <given-names>A</given-names></string-name>, <string-name><surname>Gharakheili</surname> <given-names>HH</given-names></string-name>, <string-name><surname>Loi</surname> <given-names>F</given-names></string-name>, <string-name><surname>Radford</surname> <given-names>A</given-names></string-name>, <string-name><surname>Wijenayake</surname> <given-names>C</given-names></string-name>, <string-name><surname>Vishwanath</surname> <given-names>A</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Classifying IoT devices in smart environments using network traffic characteristics</article-title>. <source>IEEE Trans Mobile Comput</source>. <year>2019</year>;<volume>18</volume>(<issue>8</issue>):<fpage>1745</fpage>&#x2013;<lpage>59</lpage>. doi:<pub-id pub-id-type="doi">10.1109/tmc.2018.2866249</pub-id>.</mixed-citation></ref>
<ref id="ref-48"><label>[48]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Wood</surname> <given-names>D</given-names></string-name>, <string-name><surname>Apthorpe</surname> <given-names>N</given-names></string-name>, <string-name><surname>Feamster</surname> <given-names>N</given-names></string-name></person-group>. <article-title>Cleartext data transmissions in consumer IoT medical devices</article-title>. In: <conf-name>Proceedings of the 2017 Workshop on Internet of Things Security and Privacy</conf-name>; <publisher-loc>Dallas, TX, USA</publisher-loc>: <publisher-name>ACM Press</publisher-name>; <year>2017</year>. p. <fpage>7</fpage>&#x2013;<lpage>12</lpage>.</mixed-citation></ref>
<ref id="ref-49"><label>[49]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Acar</surname> <given-names>A</given-names></string-name>, <string-name><surname>Fereidooni</surname> <given-names>H</given-names></string-name>, <string-name><surname>Abera</surname> <given-names>T</given-names></string-name>, <string-name><surname>Sikder</surname> <given-names>AK</given-names></string-name>, <string-name><surname>Miettinen</surname> <given-names>M</given-names></string-name>, <string-name><surname>Aksu</surname> <given-names>H</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Peek-a-Boo: I see your smart home activities, even encrypted!</article-title>. In: <conf-name>Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks</conf-name>; <publisher-loc>Linz, Austria</publisher-loc>: <publisher-name>ACM Press</publisher-name>; <year>2020</year>. p. <fpage>207</fpage>&#x2013;<lpage>18</lpage>.</mixed-citation></ref>
<ref id="ref-50"><label>[50]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Trimananda</surname> <given-names>R</given-names></string-name>, <string-name><surname>Varmarken</surname> <given-names>J</given-names></string-name>, <string-name><surname>Markopoulou</surname> <given-names>A</given-names></string-name>, <string-name><surname>Demsky</surname> <given-names>B</given-names></string-name></person-group>. <article-title>Packet-level signatures for smart home devices</article-title>. In: <conf-name>Proceedings of the 2020 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>Virginia</publisher-loc>: <publisher-name>The Internet Society</publisher-name>; <year>2020</year>.</mixed-citation></ref>
<ref id="ref-51"><label>[51]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Let</surname> <given-names>W</given-names></string-name>, <string-name><surname>Li</surname> <given-names>S</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>H</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>M</given-names></string-name>, <string-name><surname>Zheng</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>SkillDetective: automated policy-violation detection of voice-apps</article-title>. In: <conf-name>Proceedings of the 31st USENIX Security Symposium (USENIX Security 22)</conf-name>; <publisher-loc>Boston, MA, USA</publisher-loc>; <year>2022</year>. p. <fpage>1223</fpage>&#x2013;<lpage>40</lpage>.</mixed-citation></ref>
<ref id="ref-52"><label>[52]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Sch&#x00F6;nherr</surname> <given-names>L</given-names></string-name>, <string-name><surname>Eisenhofer</surname> <given-names>T</given-names></string-name>, <string-name><surname>Holz</surname> <given-names>T</given-names></string-name>, <string-name><surname>Kolossa</surname> <given-names>D</given-names></string-name>, <string-name><surname>Rieck</surname> <given-names>K</given-names></string-name></person-group>. <article-title>Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers</article-title>. <comment>arXiv:2008.00508. 2020</comment>.</mixed-citation></ref>
<ref id="ref-53"><label>[53]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Young</surname> <given-names>J</given-names></string-name>, <string-name><surname>Liao</surname> <given-names>S</given-names></string-name>, <string-name><surname>Cheng</surname> <given-names>L</given-names></string-name>, <string-name><surname>Hu</surname> <given-names>H</given-names></string-name>, <string-name><surname>Deng</surname> <given-names>H</given-names></string-name></person-group>. <article-title>SkillDetective: automated policy-violation detection of voice assistant applications in the wild</article-title>. In: <conf-name>Proceedings of the 31st USENIX Security Symposium (USENIX Security &#x2019;22)</conf-name>; <publisher-loc>Boston, MA, USA</publisher-loc>; <year>2022</year>.</mixed-citation></ref>
<ref id="ref-54"><label>[54]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>L</given-names></string-name>, <string-name><surname>Mendoza</surname> <given-names>A</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>G</given-names></string-name>, <string-name><surname>Chinprutthiwong</surname> <given-names>P</given-names></string-name>, <string-name><surname>Gu</surname> <given-names>G</given-names></string-name></person-group>. <article-title>Life after speech recognition: fuzzing semantic misinterpretation for voice assistant applications</article-title>. In: <conf-name>Proceedings 2019 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>San Diego, CA, USA</publisher-loc>: <publisher-name>Internet Society</publisher-name>; <year>2019</year>. doi:<pub-id pub-id-type="doi">10.14722/ndss.2019.23525</pub-id>.</mixed-citation></ref>
<ref id="ref-55"><label>[55]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zhou</surname> <given-names>J</given-names></string-name>, <string-name><surname>Du</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Shen</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Ma</surname> <given-names>L</given-names></string-name>, <string-name><surname>Criswell</surname> <given-names>J</given-names></string-name>, <string-name><surname>Walls</surname> <given-names>RJ</given-names></string-name></person-group>. <article-title>Silhouette: efficient protected shadow stacks for embedded systems</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>. <publisher-loc>Berkeley</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2020</year>. p. <fpage>1219</fpage>&#x2013;<lpage>36</lpage>.</mixed-citation></ref>
<ref id="ref-56"><label>[56]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Redini</surname> <given-names>N</given-names></string-name>, <string-name><surname>Machiry</surname> <given-names>A</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>R</given-names></string-name>, <string-name><surname>Spensky</surname> <given-names>C</given-names></string-name>, <string-name><surname>Continella</surname> <given-names>A</given-names></string-name>, <string-name><surname>Shoshitaishvili</surname> <given-names>Y</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Karonte: detecting insecure multi-binary interactions in embedded firmware</article-title>. In: <conf-name>IEEE Symposium on Security and Privacy (SP); 2020 May 18&#x2013;21</conf-name>; <publisher-loc>San Francisco, CA, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2020</year>. p. <fpage>1544</fpage>&#x2013;<lpage>61</lpage>. doi:<pub-id pub-id-type="doi">10.1109/sp40000.2020.00036</pub-id>.</mixed-citation></ref>
<ref id="ref-57"><label>[57]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Yao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>W</given-names></string-name>, <string-name><surname>Jia</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhu</surname> <given-names>L</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>P</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Identifying privilege separation vulnerabilities in IoT firmware with symbolic execution</article-title>. In: <conf-name>European Symposium on Research in Computer Security</conf-name>; <publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>; <year>2019</year>. p. <fpage>638</fpage>&#x2013;<lpage>57</lpage>.</mixed-citation></ref>
<ref id="ref-58"><label>[58]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Muller</surname> <given-names>J</given-names></string-name>, <string-name><surname>Mladenov</surname> <given-names>V</given-names></string-name>, <string-name><surname>Somorovsky</surname> <given-names>J</given-names></string-name>, <string-name><surname>Schwenk</surname> <given-names>J</given-names></string-name></person-group>. <article-title>SoK: exploiting network printers</article-title>. In: <conf-name>2017 IEEE Symposium on Security and Privacy (SP); 2017 May 22&#x2013;26</conf-name>; <publisher-loc>San Jose, CA, USA</publisher-loc>. <publisher-name>IEEE</publisher-name>; <year>2017</year>. p. <fpage>213</fpage>&#x2013;<lpage>30</lpage>. doi:<pub-id pub-id-type="doi">10.1109/sp.2017.47</pub-id>.</mixed-citation></ref>
<ref id="ref-59"><label>[59]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Eschweiler</surname> <given-names>S</given-names></string-name>, <string-name><surname>Yakdan</surname> <given-names>K</given-names></string-name>, <string-name><surname>Gerhards-Padilla</surname> <given-names>E</given-names></string-name></person-group>. <article-title>discovRE: efficient cross-architecture identification of bugs in binary code</article-title>. In: <conf-name>Proceedings 2016 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>San Diego, CA</publisher-loc>. <publisher-name>Internet Society</publisher-name>; <year>2016</year>. doi:<pub-id pub-id-type="doi">10.14722/ndss.2016.23185</pub-id>.</mixed-citation></ref>
<ref id="ref-60"><label>[60]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Feng</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>R</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>C</given-names></string-name>, <string-name><surname>Cheng</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Testa</surname> <given-names>B</given-names></string-name>, <string-name><surname>Yin</surname> <given-names>H</given-names></string-name></person-group>. <article-title>Scalable graph-based bug search for firmware images</article-title>. In: <conf-name>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</conf-name>; <publisher-loc>Vienna, Austria</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2016</year>. p. <fpage>480</fpage>&#x2013;<lpage>91</lpage>. doi:<pub-id pub-id-type="doi">10.1145/2976749.2978370</pub-id>.</mixed-citation></ref>
<ref id="ref-61"><label>[61]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Jia</surname> <given-names>YJ</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>QA</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>S</given-names></string-name>, <string-name><surname>Rahmati</surname> <given-names>A</given-names></string-name>, <string-name><surname>Fernandes</surname> <given-names>E</given-names></string-name>, <string-name><surname>Mao</surname> <given-names>ZM</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>ContexIoT: towards providing contextual integrity to appified IoT platforms</article-title>. In: <conf-name>Proceedings 2017 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>San Diego, CA, USA</publisher-loc>: <publisher-name>Internet Society</publisher-name>; <year>2017</year>. doi:<pub-id pub-id-type="doi">10.14722/ndss.2017.23051</pub-id>.</mixed-citation></ref>
<ref id="ref-62"><label>[62]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Tian</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>N</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>YH</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>X</given-names></string-name>, <string-name><surname>Ur</surname> <given-names>B</given-names></string-name>, <string-name><surname>Guo</surname> <given-names>X</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>SmartAuth: user-centered authorization for the internet of things</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2017</year>. p. <fpage>361</fpage>&#x2013;<lpage>78</lpage>.</mixed-citation></ref>
<ref id="ref-63"><label>[63]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Uppuluri</surname> <given-names>S</given-names></string-name>, <string-name><surname>Lakshmeeswari</surname> <given-names>G</given-names></string-name></person-group>. <article-title>Review of security and privacy-based IoT smart home access control devices</article-title>. <source>Wirel Pers Commun</source>. <year>2024</year>;<volume>137</volume>(<issue>3</issue>):<fpage>1601</fpage>&#x2013;<lpage>40</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11277-024-11405-8</pub-id>.</mixed-citation></ref>
<ref id="ref-64"><label>[64]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ameer</surname> <given-names>S</given-names></string-name>, <string-name><surname>Praharaj</surname> <given-names>L</given-names></string-name>, <string-name><surname>Sandhu</surname> <given-names>R</given-names></string-name>, <string-name><surname>Bhatt</surname> <given-names>S</given-names></string-name>, <string-name><surname>Gupta</surname> <given-names>M</given-names></string-name></person-group>. <article-title>ZTA-IoT: a novel architecture for zero-trust in IoT systems and an ensuing usage control model</article-title>. <source>ACM Trans Priv Secur</source>. <year>2024</year>;<volume>27</volume>(<issue>3</issue>):<fpage>1</fpage>&#x2013;<lpage>36</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3671147</pub-id>.</mixed-citation></ref>
<ref id="ref-65"><label>[65]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pattnaik</surname> <given-names>N</given-names></string-name>, <string-name><surname>Li</surname> <given-names>S</given-names></string-name>, <string-name><surname>Nurse</surname> <given-names>JRC</given-names></string-name></person-group>. <article-title>A survey of user perspectives on security and privacy in a home networking environment</article-title>. <source>ACM Comput Surv</source>. <year>2023</year>;<volume>55</volume>(<issue>9</issue>):<fpage>1</fpage>&#x2013;<lpage>38</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3558095</pub-id>.</mixed-citation></ref>
<ref id="ref-66"><label>[66]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Wang</surname> <given-names>W</given-names></string-name>, <string-name><surname>Cicala</surname> <given-names>F</given-names></string-name>, <string-name><surname>Hussain</surname> <given-names>SR</given-names></string-name>, <string-name><surname>Bertino</surname> <given-names>E</given-names></string-name>, <string-name><surname>Li</surname> <given-names>N</given-names></string-name></person-group>. <article-title>Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users&#x0027; privacy</article-title>. In: <conf-name>Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks</conf-name>; <publisher-loc>Linz, Austria</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2020</year>. p. <fpage>133</fpage>&#x2013;<lpage>43</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3395351.3399349</pub-id>.</mixed-citation></ref>
<ref id="ref-67"><label>[67]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pirayesh</surname> <given-names>J</given-names></string-name>, <string-name><surname>Giaretta</surname> <given-names>A</given-names></string-name>, <string-name><surname>Conti</surname> <given-names>M</given-names></string-name>, <string-name><surname>Keshavarzi</surname> <given-names>P</given-names></string-name></person-group>. <article-title>A PLS-HECC-based device authentication and key agreement scheme for smart home networks</article-title>. <source>Comput Netw</source>. <year>2022</year>;<volume>216</volume>:<fpage>109077</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comnet.2022.109077</pub-id>.</mixed-citation></ref>
<ref id="ref-68"><label>[68]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Kumar</surname> <given-names>S</given-names></string-name>, <string-name><surname>Hu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Andersen</surname> <given-names>MP</given-names></string-name>, <string-name><surname>Popa</surname> <given-names>RA</given-names></string-name>, <string-name><surname>Culler</surname> <given-names>D</given-names></string-name></person-group>. <article-title>E JEDI: many-to-many end-to-end encryption and key delegation for IoT</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2019</year>. p. <fpage>1519</fpage>&#x2013;<lpage>36</lpage>.</mixed-citation></ref>
<ref id="ref-69"><label>[69]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Xi</surname> <given-names>W</given-names></string-name>, <string-name><surname>Qian</surname> <given-names>C</given-names></string-name>, <string-name><surname>Han</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>K</given-names></string-name>, <string-name><surname>Zhong</surname> <given-names>S</given-names></string-name>, <string-name><surname>Li</surname> <given-names>XY</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Instant and robust authentication and key agreement among mobile devices</article-title>. In: <conf-name>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</conf-name>; <publisher-loc>Vienna, Austria</publisher-loc>: <publisher-name>ACM Press</publisher-name>; <year>2016</year>. p. <fpage>616</fpage>&#x2013;<lpage>27</lpage>.</mixed-citation></ref>
<ref id="ref-70"><label>[70]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Farrukh</surname> <given-names>H</given-names></string-name>, <string-name><surname>Ozmen</surname> <given-names>MO</given-names></string-name>, <string-name><surname>Kerem Ors</surname> <given-names>F</given-names></string-name>, <string-name><surname>Celik</surname> <given-names>ZB</given-names></string-name></person-group>. <article-title>One key to rule them all: secure group pairing for heterogeneous IoT devices</article-title>. In: <conf-name>2023 IEEE Symposium on Security and Privacy (SP); 2023 May 21&#x2013;25</conf-name>; <publisher-loc>San Francisco, CA, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2023</year>. p. <fpage>3026</fpage>&#x2013;<lpage>42</lpage>. doi:<pub-id pub-id-type="doi">10.1109/SP46215.2023.10179369</pub-id>.</mixed-citation></ref>
<ref id="ref-71"><label>[71]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Li</surname> <given-names>X</given-names></string-name>, <string-name><surname>Zeng</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Luo</surname> <given-names>L</given-names></string-name>, <string-name><surname>Luo</surname> <given-names>T</given-names></string-name></person-group>. <article-title>T2Pair: secure and usable pairing for heterogeneous IoT devices</article-title>. In: <conf-name>Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security</conf-name>; <publisher-loc>Virtual Event, USA</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2020</year>. p. <fpage>309</fpage>&#x2013;<lpage>23</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3372297.3417286</pub-id>.</mixed-citation></ref>
<ref id="ref-72"><label>[72]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Apthorpe</surname> <given-names>N</given-names></string-name>, <string-name><surname>Huang</surname> <given-names>DY</given-names></string-name>, <string-name><surname>Reisman</surname> <given-names>D</given-names></string-name>, <string-name><surname>Narayanan</surname> <given-names>A</given-names></string-name>, <string-name><surname>Feamster</surname> <given-names>N</given-names></string-name></person-group>. <article-title>Keeping the smart home private with smart(er) IoT traffic shaping</article-title>. <source>Proc Priv Enhancing Technol</source>. <year>2019</year>;<volume>2019</volume>(<issue>3</issue>):<fpage>128</fpage>&#x2013;<lpage>48</lpage>. doi:<pub-id pub-id-type="doi">10.2478/popets-2019-0040</pub-id>.</mixed-citation></ref>
<ref id="ref-73"><label>[73]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>OConnor</surname> <given-names>TJ</given-names></string-name>, <string-name><surname>Mohamed</surname> <given-names>R</given-names></string-name>, <string-name><surname>Miettinen</surname> <given-names>M</given-names></string-name>, <string-name><surname>Enck</surname> <given-names>W</given-names></string-name>, <string-name><surname>Reaves</surname> <given-names>B</given-names></string-name>, <string-name><surname>Sadeghi</surname> <given-names>AR</given-names></string-name></person-group>. <article-title>HomeSnitch: behavior transparency and control for smart home IoT devices</article-title>. In: <conf-name>Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks</conf-name>; <publisher-loc>Miami, Florida</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2019</year>. p. <fpage>128</fpage>&#x2013;<lpage>38</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3317549.3323409</pub-id>.</mixed-citation></ref>
<ref id="ref-74"><label>[74]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Kim</surname> <given-names>CH</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>T</given-names></string-name>, <string-name><surname>Choi</surname> <given-names>H</given-names></string-name>, <string-name><surname>Gu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>B</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>X</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Securing real-time microcontroller systems through customized memory view switching</article-title>. In: <conf-name>Proceedings 2018 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>San Diego, CA, USA</publisher-loc>: <publisher-name>Internet Society</publisher-name>; <year>2018</year>. doi:<pub-id pub-id-type="doi">10.14722/ndss.2018.23107</pub-id>.</mixed-citation></ref>
<ref id="ref-75"><label>[75]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Luo</surname> <given-names>L</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>White</surname> <given-names>C</given-names></string-name>, <string-name><surname>Keating</surname> <given-names>B</given-names></string-name>, <string-name><surname>Pearson</surname> <given-names>B</given-names></string-name>, <string-name><surname>Shao</surname> <given-names>X</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>On security of TrustZone-M-based IoT systems</article-title>. <source>IEEE Internet Things J</source>. <year>2022</year>;<volume>9</volume>(<issue>12</issue>):<fpage>9683</fpage>&#x2013;<lpage>99</lpage>. doi:<pub-id pub-id-type="doi">10.1109/jiot.2022.3144405</pub-id>.</mixed-citation></ref>
<ref id="ref-76"><label>[76]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hasan</surname> <given-names>MK</given-names></string-name>, <string-name><surname>Ghazal</surname> <given-names>TM</given-names></string-name>, <string-name><surname>Saeed</surname> <given-names>RA</given-names></string-name>, <string-name><surname>Pandey</surname> <given-names>B</given-names></string-name>, <string-name><surname>Gohel</surname> <given-names>H</given-names></string-name>, <string-name><surname>Eshmawi</surname> <given-names>AA</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet-of-Medical-Things</article-title>. <source>IET Commun</source>. <year>2022</year>;<volume>16</volume>(<issue>5</issue>):<fpage>421</fpage>&#x2013;<lpage>32</lpage>. doi:<pub-id pub-id-type="doi">10.1049/cmu2.12301</pub-id>.</mixed-citation></ref>
<ref id="ref-77"><label>[77]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Sun</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Feng</surname> <given-names>B</given-names></string-name>, <string-name><surname>Lu</surname> <given-names>L</given-names></string-name>, <string-name><surname>Jha</surname> <given-names>S</given-names></string-name></person-group>. <article-title>OAT: attesting operation integrity of embedded devices</article-title>. In: <conf-name>IEEE Symposium on Security and Privacy (SP); 2020 May 18&#x2013;21</conf-name>; <publisher-loc>San Francisco, CA, USA</publisher-loc>. <publisher-name>IEEE</publisher-name>; <year>2020</year>. p. <fpage>1433</fpage>&#x2013;<lpage>49</lpage>. doi:<pub-id pub-id-type="doi">10.1109/sp40000.2020.00042</pub-id>.</mixed-citation></ref>
<ref id="ref-78"><label>[78]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Abera</surname> <given-names>T</given-names></string-name>, <string-name><surname>Bahmani</surname> <given-names>R</given-names></string-name>, <string-name><surname>Brasser</surname> <given-names>F</given-names></string-name>, <string-name><surname>Ibrahim</surname> <given-names>A</given-names></string-name>, <string-name><surname>Sadeghi</surname> <given-names>AR</given-names></string-name>, <string-name><surname>Schunter</surname> <given-names>M</given-names></string-name></person-group>. <article-title>DIAT: data integrity attestation for resilient collaboration of autonomous systems</article-title>. In: <conf-name>Proceedings 2019 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>San Diego, CA</publisher-loc>. <publisher-name>Internet Society</publisher-name>; <year>2019</year>. doi:<pub-id pub-id-type="doi">10.14722/ndss.2019.23420</pub-id>.</mixed-citation></ref>
<ref id="ref-79"><label>[79]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sun</surname> <given-names>X</given-names></string-name>, <string-name><surname>Fu</surname> <given-names>J</given-names></string-name>, <string-name><surname>Wei</surname> <given-names>B</given-names></string-name>, <string-name><surname>Li</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Li</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>N</given-names></string-name></person-group>. <article-title>A self-attentional ResNet-LightGBM model for IoT-enabled voice liveness detection</article-title>. <source>IEEE Internet Things J</source>. <year>2023</year>;<volume>10</volume>(<issue>9</issue>):<fpage>8257</fpage>&#x2013;<lpage>70</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2022.3230992</pub-id>.</mixed-citation></ref>
<ref id="ref-80"><label>[80]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Shezan</surname> <given-names>FH</given-names></string-name>, <string-name><surname>Cheng</surname> <given-names>K</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Cao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Tian</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>TKPERM: cross-platform permission knowledge transfer to detect overprivileged third-party applications</article-title>. In: <conf-name>Proceedings 2020 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>San Diego, CA, USA</publisher-loc>: <publisher-name>Internet Society</publisher-name>; <year>2020</year>. doi:<pub-id pub-id-type="doi">10.14722/ndss.2020.24287</pub-id>.</mixed-citation></ref>
<ref id="ref-81"><label>[81]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Emami-Naeini</surname> <given-names>P</given-names></string-name>, <string-name><surname>Agarwal</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Faith Cranor</surname> <given-names>L</given-names></string-name>, <string-name><surname>Hibshi</surname> <given-names>H</given-names></string-name></person-group>. <article-title>Ask the experts: what should be on an IoT privacy and security label?</article-title>. In: <conf-name>2020 IEEE Symposium on Security and Privacy (SP); 2020 May 18&#x2013;21</conf-name>; <publisher-loc>San Francisco, CA, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2020</year>. p. <fpage>447</fpage>&#x2013;<lpage>64</lpage>. doi:<pub-id pub-id-type="doi">10.1109/SP40000.2020.00043</pub-id>.</mixed-citation></ref>
<ref id="ref-82"><label>[82]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Fitwi</surname> <given-names>A</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhu</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Enforcing privacy preservation on edge cameras using lightweight video frame scrambling</article-title>. <source>IEEE Trans Serv Comput</source>. <year>2023</year>;<volume>16</volume>(<issue>1</issue>):<fpage>276</fpage>&#x2013;<lpage>87</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TSC.2021.3135352</pub-id>.</mixed-citation></ref>
<ref id="ref-83"><label>[83]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Chen</surname> <given-names>DD</given-names></string-name>, <string-name><surname>Egele</surname> <given-names>M</given-names></string-name>, <string-name><surname>Woo</surname> <given-names>M</given-names></string-name>, <string-name><surname>Brumley</surname> <given-names>D</given-names></string-name></person-group>. <article-title>Towards automated dynamic analysis for linux-based embedded firmware</article-title>. In: <conf-name>Proceedings 2016 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>San Diego, CA, USA</publisher-loc>: <publisher-name>Internet Society</publisher-name>; <year>2016</year>. doi:<pub-id pub-id-type="doi">10.14722/ndss.2016.23415</pub-id>.</mixed-citation></ref>
<ref id="ref-84"><label>[84]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zheng</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Davanian</surname> <given-names>A</given-names></string-name>, <string-name><surname>Yin</surname> <given-names>H</given-names></string-name>, <string-name><surname>Song</surname> <given-names>C</given-names></string-name>, <string-name><surname>Zhu</surname> <given-names>H</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>L</given-names></string-name></person-group>. <article-title>FIRM-AFL: high-throughput greybox fuzzing of IoT firmware via augmented process emulation</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2019</year>. p. <fpage>1099</fpage>&#x2013;<lpage>114</lpage>.</mixed-citation></ref>
<ref id="ref-85"><label>[85]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zhu</surname> <given-names>L</given-names></string-name>, <string-name><surname>Fu</surname> <given-names>X</given-names></string-name>, <string-name><surname>Yao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>H</given-names></string-name></person-group>. <article-title>FIoT: detecting the memory corruption in lightweight IoT device firmware</article-title>. In: <conf-name>18th IEEE International Conference on Trust, Security and Privacy In Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE); 2019 Aug 5&#x2013;8</conf-name>; <publisher-loc>Rotorua, New Zealand</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2019</year>. p. <fpage>248</fpage>&#x2013;<lpage>55</lpage>. doi:<pub-id pub-id-type="doi">10.1109/trustcom/bigdatase.2019.00041</pub-id>.</mixed-citation></ref>
<ref id="ref-86"><label>[86]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Oliinyk</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Scott</surname> <given-names>M</given-names></string-name>, <string-name><surname>Tsang</surname> <given-names>R</given-names></string-name>, <string-name><surname>Fang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Homayoun</surname> <given-names>H</given-names></string-name></person-group>. <article-title>Fuzzing BusyBox: leveraging LLM and crash reuse for embedded bug unearthing</article-title>. In: <conf-name>33rd USENIX Security Symposium (USENIX Security 24)</conf-name>; <publisher-loc>Philadelphia, PA, USA</publisher-loc>; <year>2024</year>.</mixed-citation></ref>
<ref id="ref-87"><label>[87]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Yun</surname> <given-names>J</given-names></string-name>, <string-name><surname>Rustamov</surname> <given-names>F</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>J</given-names></string-name>, <string-name><surname>Shin</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Fuzzing of embedded systems: a survey</article-title>. <source>ACM Comput Surv</source>. <year>2023</year>;<volume>55</volume>(<issue>7</issue>):<fpage>1</fpage>&#x2013;<lpage>33</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3538644</pub-id>.</mixed-citation></ref>
<ref id="ref-88"><label>[88]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Clements</surname> <given-names>AA</given-names></string-name>, <string-name><surname>Gustafson</surname> <given-names>E</given-names></string-name>, <string-name><surname>Scharnowski</surname> <given-names>T</given-names></string-name>, <string-name><surname>Grosen</surname> <given-names>P</given-names></string-name>, <string-name><surname>Fritz</surname> <given-names>D</given-names></string-name>, <string-name><surname>Kruegel</surname> <given-names>C</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>HALucinator: firmware re-hosting through abstraction layer emulation</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2020</year>. p. <fpage>1</fpage>&#x2013;<lpage>18</lpage>.</mixed-citation></ref>
<ref id="ref-89"><label>[89]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Feng</surname> <given-names>B</given-names></string-name>, <string-name><surname>Mera</surname> <given-names>A</given-names></string-name>, <string-name><surname>Lu</surname> <given-names>L</given-names></string-name></person-group>. <article-title>P2IM: scalable and hardware-independent firmware testing via automatic peripheral interface modeling</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2020</year>. p. <fpage>1237</fpage>&#x2013;<lpage>54</lpage>.</mixed-citation></ref>
<ref id="ref-90"><label>[90]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Cao</surname> <given-names>C</given-names></string-name>, <string-name><surname>Guan</surname> <given-names>L</given-names></string-name>, <string-name><surname>Ming</surname> <given-names>J</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>P</given-names></string-name></person-group>. <article-title>Device-agnostic firmware execution is possible: a concolic execution approach for peripheral emulation</article-title>. In: <conf-name>Annual Computer Security Applications Conference</conf-name>; <publisher-loc>Austin, TX, USA</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2020</year>. p. <fpage>746</fpage>&#x2013;<lpage>59</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3427228.3427280</pub-id>.</mixed-citation></ref>
<ref id="ref-91"><label>[91]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zhou</surname> <given-names>W</given-names></string-name>, <string-name><surname>Guan</surname> <given-names>L</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>P</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Automatic firmware emulation through invalidity-guided knowledge inference</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2021</year>. p. <fpage>1</fpage>&#x2013;<lpage>19</lpage>.</mixed-citation></ref>
<ref id="ref-92"><label>[92]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Chen</surname> <given-names>J</given-names></string-name>, <string-name><surname>Diao</surname> <given-names>W</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Zuo</surname> <given-names>C</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>X</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>IoTFuzzer: discovering memory corruptions in IoT through app-based fuzzing</article-title>. In: <conf-name>Proceedings 2018 Network and Distributed System Security Symposium</conf-name>; <publisher-loc>San Diego, CA</publisher-loc>. <publisher-name>Internet Society</publisher-name>; <year>2018</year>. doi:<pub-id pub-id-type="doi">10.14722/ndss.2018.23159</pub-id>.</mixed-citation></ref>
<ref id="ref-93"><label>[93]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Redini</surname> <given-names>N</given-names></string-name>, <string-name><surname>Continella</surname> <given-names>A</given-names></string-name>, <string-name><surname>Das</surname> <given-names>D</given-names></string-name>, <string-name><surname>De Pasquale</surname> <given-names>G</given-names></string-name>, <string-name><surname>Spahn</surname> <given-names>N</given-names></string-name>, <string-name><surname>Machiry</surname> <given-names>A</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Diane: identifying fuzzing triggers in apps to generate under-constrained inputs for IoT devices</article-title>. In: <conf-name>2021 IEEE Symposium on Security and Privacy (SP); 2021 May 24&#x2013;27</conf-name>; <publisher-loc>San Francisco, CA, USA</publisher-loc>. <publisher-name>IEEE</publisher-name>; <year>2021</year>. p. <fpage>484</fpage>&#x2013;<lpage>500</lpage>. doi:<pub-id pub-id-type="doi">10.1109/SP40001.2021.00066</pub-id>.</mixed-citation></ref>
<ref id="ref-94"><label>[94]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zuo</surname> <given-names>C</given-names></string-name>, <string-name><surname>Wen</surname> <given-names>H</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Automatic fingerprinting of vulnerable BLE IoT devices with static UUIDs from mobile apps</article-title>. In: <conf-name>Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security</conf-name>. <publisher-loc>London, UK</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2019</year>. p. <fpage>1469</fpage>&#x2013;<lpage>83</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3319535.3354240</pub-id>.</mixed-citation></ref>
<ref id="ref-95"><label>[95]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Wang</surname> <given-names>X</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Nanda</surname> <given-names>S</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>XF</given-names></string-name></person-group>. <article-title>Looking from the mirror: evaluating IoT device security through mobile companion apps</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2019</year>. p. <fpage>1151</fpage>&#x2013;<lpage>67</lpage>.</mixed-citation></ref>
<ref id="ref-96"><label>[96]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Safi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Dadkhah</surname> <given-names>S</given-names></string-name>, <string-name><surname>Shoeleh</surname> <given-names>F</given-names></string-name>, <string-name><surname>Mahdikhani</surname> <given-names>H</given-names></string-name>, <string-name><surname>Molyneaux</surname> <given-names>H</given-names></string-name>, <string-name><surname>Ghorbani</surname> <given-names>AA</given-names></string-name></person-group>. <article-title>A survey on IoT profiling, fingerprinting, and identification</article-title>. <source>ACM Trans Internet Things</source>. <year>2022</year>;<volume>3</volume>(<issue>4</issue>):<fpage>1</fpage>&#x2013;<lpage>39</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3539736</pub-id>.</mixed-citation></ref>
<ref id="ref-97"><label>[97]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Yu</surname> <given-names>L</given-names></string-name>, <string-name><surname>Luo</surname> <given-names>B</given-names></string-name>, <string-name><surname>Ma</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>Q</given-names></string-name></person-group>. <article-title>You are what you broadcast: identification of mobile and IoT devices from (Public) Wi-Fi</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2020</year>. p. <fpage>55</fpage>&#x2013;<lpage>72</lpage>.</mixed-citation></ref>
<ref id="ref-98"><label>[98]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>W</given-names></string-name>, <string-name><surname>Meng</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>X</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhu</surname> <given-names>H</given-names></string-name></person-group>. <article-title>HoMonit: monitoring smart home apps from encrypted traffic</article-title>. In: <conf-name>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security</conf-name>; <publisher-loc>Toronto, ON, Canada</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2018</year>. p. <fpage>1074</fpage>&#x2013;<lpage>88</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3243734.3243820</pub-id>.</mixed-citation></ref>
<ref id="ref-99"><label>[99]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Xun</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>J</given-names></string-name></person-group>. <article-title>ClockIDS: a real-time vehicle intrusion detection system based on clock skew</article-title>. <source>IEEE Internet Things J</source>. <year>2022</year>;<volume>9</volume>(<issue>17</issue>):<fpage>15593</fpage>&#x2013;<lpage>606</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2022.3151377</pub-id>.</mixed-citation></ref>
<ref id="ref-100"><label>[100]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Cho</surname> <given-names>KT</given-names></string-name>, <string-name><surname>Shin</surname> <given-names>KG</given-names></string-name></person-group>. <article-title>Viden: attacker identification on in-vehicle networks</article-title>. In: <conf-name>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</conf-name>; <publisher-loc>Dallas, TX, USA</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2017</year>. p. <fpage>1109</fpage>&#x2013;<lpage>23</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3133956.3134001</pub-id>.</mixed-citation></ref>
<ref id="ref-101"><label>[101]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Choi</surname> <given-names>H</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>WC</given-names></string-name>, <string-name><surname>Aafer</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Fei</surname> <given-names>F</given-names></string-name>, <string-name><surname>Tu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>X</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Detecting attacks against robotic vehicles: a control invariant approach</article-title>. In: <conf-name>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security</conf-name>; <publisher-loc>Toronto, ON, Canada</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2018</year>. p. <fpage>801</fpage>&#x2013;<lpage>16</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3243734.3243752</pub-id>.</mixed-citation></ref>
<ref id="ref-102"><label>[102]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Birnbach</surname> <given-names>S</given-names></string-name>, <string-name><surname>Eberz</surname> <given-names>S</given-names></string-name>, <string-name><surname>Martinovic</surname> <given-names>I</given-names></string-name></person-group>. <article-title>Peeves: physical event verification in smart homes</article-title>. In: <conf-name>Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security</conf-name>; <publisher-loc>London, UK</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2019</year>. p. <fpage>1455</fpage>&#x2013;<lpage>67</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3319535.3354254</pub-id>.</mixed-citation></ref>
<ref id="ref-103"><label>[103]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Fernandes</surname> <given-names>E</given-names></string-name>, <string-name><surname>Paupore</surname> <given-names>J</given-names></string-name>, <string-name><surname>Rahmati</surname> <given-names>A</given-names></string-name>, <string-name><surname>Simionato</surname> <given-names>D</given-names></string-name>, <string-name><surname>Conti</surname> <given-names>M</given-names></string-name>, <string-name><surname>Prakash</surname> <given-names>A</given-names></string-name></person-group>. <article-title>FlowFence: practical data protection for emerging IoT application frameworks</article-title>. In: <conf-name>USENIX Security Symposium</conf-name>; <publisher-loc>Berkeley, CA, USA</publisher-loc>: <publisher-name>USENIX Association</publisher-name>; <year>2016</year>. p. <fpage>531</fpage>&#x2013;<lpage>48</lpage>.</mixed-citation></ref>
<ref id="ref-104"><label>[104]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Wen</surname> <given-names>H</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>FirmXRay: detecting bluetooth link layer vulnerabilities from bare-metal firmware</article-title>. In: <conf-name>Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security</conf-name>; <publisher-loc>Virtual Event, USA</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2020</year>. p. <fpage>167</fpage>&#x2013;<lpage>80</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3372297.3423344</pub-id>.</mixed-citation></ref>
<ref id="ref-105"><label>[105]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ben Netanel</surname> <given-names>R</given-names></string-name>, <string-name><surname>Nassi</surname> <given-names>B</given-names></string-name>, <string-name><surname>Shamir</surname> <given-names>A</given-names></string-name>, <string-name><surname>Elovici</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Detecting spying drones</article-title>. <source>IEEE Secur Privacy</source>. <year>2021</year>;<volume>19</volume>(<issue>1</issue>):<fpage>65</fpage>&#x2013;<lpage>73</lpage>. doi:<pub-id pub-id-type="doi">10.1109/msec.2020.3034171</pub-id>.</mixed-citation></ref>
<ref id="ref-106"><label>[106]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Crepax</surname> <given-names>T</given-names></string-name>, <string-name><surname>Munt&#x00E9;s-Mulero</surname> <given-names>V</given-names></string-name>, <string-name><surname>Martinez</surname> <given-names>J</given-names></string-name>, <string-name><surname>Ruiz</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Information technologies exposing children to privacy risks: domains and children-specific technical controls</article-title>. <source>Comput Stand Interfaces</source>. <year>2022</year>;<volume>82</volume>(<issue>1</issue>):<fpage>103624</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.csi.2022.103624</pub-id>.</mixed-citation></ref>
</ref-list>
</back></article>