A survey on IoT-enabled home automation systems: Attacks and defenses

Z Wang, D Liu, Y Sun, X Pang, P Sun… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …

Formal model-driven discovery of bluetooth protocol design vulnerabilities

J Wu, R Wu, D Xu, DJ Tian… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The Bluetooth protocol suite, including Bluetooth Classic, Bluetooth Low Energy, and
Bluetooth Mesh, has become the de facto standard for short-range wireless …

Formal Analysis and Patching of {BLE-SC} Pairing

M Shi, J Chen, K He, H Zhao, M Jia, R Du - 32nd USENIX Security …, 2023 - usenix.org
Bluetooth Low Energy (BLE) is the mainstream Bluetooth standard and BLE Secure
Connections (BLC-SC) pairing is a protocol that authenticates two Bluetooth devices and …

Selfie: reflections on TLS 1.3 with PSK

N Drucker, S Gueron - Journal of Cryptology, 2021 - Springer
TLS 1.3 allows two parties to establish a shared session key from an out-of-band agreed pre-
shared key (PSK). The PSK is used to mutually authenticate the parties, under the …

物联网安全研究综述: 威胁, 检测与防御

杨毅宇, 周威, 赵尚儒, 刘聪, 张宇辉, 王鹤… - 通信 …, 2021 - infocomm-journal.com
基于近5 年网安国际会议(ACM CCS, USENIX Security, NDSS, IEEE S&P)
中发表的物联网安全文献, 以及其他部分高水平研究工作, 从威胁, 检测, 防御的视角对物联网 …

Breakmi: Reversing, exploiting and fixing xiaomi fitness tracking ecosystem

M Casagrande, E Losiouk, M Conti, M Payer… - IACR Transactions on …, 2022 - tches.iacr.org
Xiaomi is the leading company in the fitness tracking industry. Successful attacks on its
fitness tracking ecosystem would result in severe consequences, including the loss of …

Reviewing IoT security via logic bugs in IoT platforms and systems

W Zhou, C Cao, D Huo, K Cheng… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
In recent years, Internet-of-Things (IoT) platforms and systems have been rapidly emerging.
Although IoT is a new technology, new does not mean simpler (than existing networked …

[PDF][PDF] Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing.

MK Jangid, Y Zhang, Z Lin - NDSS, 2023 - cse.ohio-state.edu
Bluetooth is a leading wireless communication technology used by billions of Internet of
Things (IoT) devices today. Its ubiquity demands systematic security scrutiny. A key …

SoK: a systematic literature review of Bluetooth security threats and mitigation measures

S Shrestha, E Irby, R Thapa, S Das - International Symposium on …, 2022 - Springer
Bluetooth devices have integrated into our everyday lives such that we see an increase in
wearable technologies. Users of these devices are often unaware of the security …

EvilScreen attack: smart TV hijacking via multi-channel remote control mimicry

Y Zhang, S Ma, T Chen, J Li, RH Deng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Modern smart TVs often communicate with their remote controls (including the smartphone
simulated ones) using multiple wireless channels (eg, Infrared, Bluetooth, and Wi-Fi) …