IoT安全顶会论文

2020-07-08  本文已影响0人  隔壁那个饭桶777

写在最前面:

持续更新。。。

这是一个flag QWQ

一定要读完!!!!!!

  1. Obfuscation-Resilient Privacy Leak Detection forMobile Apps Through Differential Analysis
    一篇和网络流量隐私泄露相关的文章。
    Con: NDSS 2017

  2. You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi
    Con: Usenix Security 2020

  3. Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation

  4. IoT Security: The Keys to Establishing a Chain of Trust

  5. Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps
    Con: NDSS 2018

  6. MagicPairing: Apple’s Take on Securing Bluetooth Peripherals
    Con: Wisec 2020

  7. Analyzing the Attack Landscape of Zigbee-enabled IoT Systems and Reinstating Users’ Privacy
    Con: Wisec 2020

  8. BrokenStrokes: On the (in)Security of Wireless Keyboards
    Con: Wisec 2020

  9. Peek-a-Boo: I see your smart home activities, even encrypted!
    Con: Wisec 2020

  10. Lost and Found: Stopping Bluetooth Finders from
    Leaking Private Information

    Con: Wisec 2020

  11. Lost and Found: Stopping Bluetooth Finders from
    Leaking Private Information

    Con: Wisec 2020

  12. Kratos: Multi-User Multi-Device-Aware Access Control System
    for the Smart Home

    Con: Wisec 2020

  13. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes
    Con: Wisec 2020

  14. Packet-Level Signatures for Smart Home Devices
    Con: NDSS 2020

  15. Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling
    Con: DSN 2020

  16. BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
    Con: USENIX WOOT 2020

上一篇下一篇

猜你喜欢

热点阅读