{"id":"https://openalex.org/W7125973875","doi":"https://doi.org/10.1109/ase63991.2025.00238","title":"Better Safe than Sorry: Preventing Policy Violations through Predictive Root-Cause-Analysis for IoT Systems","display_name":"Better Safe than Sorry: Preventing Policy Violations through Predictive Root-Cause-Analysis for IoT Systems","publication_year":2025,"publication_date":"2025-11-16","ids":{"openalex":"https://openalex.org/W7125973875","doi":"https://doi.org/10.1109/ase63991.2025.00238"},"language":null,"primary_location":{"id":"doi:10.1109/ase63991.2025.00238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ase63991.2025.00238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 40th IEEE/ACM International Conference on Automated Software Engineering (ASE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124070575","display_name":"Michael Norris","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michael Norris","raw_affiliation_strings":["Pennsylvania State University"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053169357","display_name":"Syed Rafiul Hussain","orcid":"https://orcid.org/0000-0001-9222-8544"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Syed Rafiul Hussain","raw_affiliation_strings":["Pennsylvania State University"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077180777","display_name":"Gang Tan","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gang Tan","raw_affiliation_strings":["Pennsylvania State University"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5124070575"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.87289344,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2894","last_page":"2905"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.19589999318122864,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.19589999318122864,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.17990000545978546,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.13930000364780426,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.715399980545044},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.6886000037193298},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6079000234603882},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5313000082969666},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4659999907016754},{"id":"https://openalex.org/keywords/moment","display_name":"Moment (physics)","score":0.40049999952316284}],"concepts":[{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.715399980545044},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.6886000037193298},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6764000058174133},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6567999720573425},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6079000234603882},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5313000082969666},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4659999907016754},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4262000024318695},{"id":"https://openalex.org/C179254644","wikidata":"https://www.wikidata.org/wiki/Q13222844","display_name":"Moment (physics)","level":2,"score":0.40049999952316284},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3686000108718872},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3508000075817108},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.31859999895095825},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3111000061035156},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.29179999232292175},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2840000092983246},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.26339998841285706}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ase63991.2025.00238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ase63991.2025.00238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 40th IEEE/ACM International Conference on Automated Software Engineering (ASE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.82061767578125,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2049240872","https://openalex.org/W2161830378","https://openalex.org/W2331106415","https://openalex.org/W2624878024","https://openalex.org/W2739921820","https://openalex.org/W2792078641","https://openalex.org/W2795245562","https://openalex.org/W2810315699","https://openalex.org/W2945500644","https://openalex.org/W2962974491","https://openalex.org/W2969100211","https://openalex.org/W3021602187","https://openalex.org/W3024340288","https://openalex.org/W3027431742","https://openalex.org/W3039877240","https://openalex.org/W3083012366","https://openalex.org/W3107087963","https://openalex.org/W3125345207","https://openalex.org/W3136780060","https://openalex.org/W3159922383","https://openalex.org/W3206674745","https://openalex.org/W4210580908","https://openalex.org/W4220957574","https://openalex.org/W4411672233"],"related_works":[],"abstract_inverted_index":{"In":[0,69],"an":[1,54],"Internet":[2],"of":[3],"Things":[4],"(IoT)":[5],"environment,":[6,55,161],"there":[7,56],"are":[8,147],"several":[9],"way":[10],"things":[11],"can":[12,38,89,126],"go":[13],"wrong":[14],"based":[15],"on":[16],"device":[17],"activity.":[18],"Poorly":[19],"defined":[20],"rules,":[21],"conflicts":[22],"between":[23,27],"applications,":[24],"physical":[25,51],"interactions":[26],"devices,":[28],"or":[29,44,49],"unintentional":[30],"interference":[31],"by":[32],"user":[33],"behavior.":[34,121],"Since":[35],"these":[36],"devices":[37],"have":[39,102],"access":[40],"to":[41,47,61,84,105,113,117,131,140,143,155],"sensitive":[42],"information":[43,154],"the":[45,97,109,119,133,145,164],"capability":[46],"disrupt":[48],"harm":[50],"elements":[52],"in":[53,66,96,159,163,168],"is":[57],"a":[58,75],"strong":[59],"motivation":[60],"protect":[62],"confidentiality":[63],"and":[64,107,167],"integrity":[65],"IoT":[67],"systems.":[68],"this":[70,123],"paper":[71],"we":[72,125],"design":[73],"IoTArmor,":[74],"novel":[76],"Root-Cause-Analysis":[77],"tool":[78],"that":[79,88,92],"uses":[80],"machine":[81],"learning":[82],"models":[83],"select":[85],"remediating":[86],"actions":[87],"prevent":[90,118,132],"violations":[91,101],"would":[93],"otherwise":[94],"occur":[95,106],"future.":[98],"We":[99],"assume":[100],"been":[103],"predicted":[104],"analyze":[108],"current":[110,165],"system":[111],"state":[112],"produce":[114],"optimal":[115],"fixes":[116,130,146],"violating":[120],"Through":[122],"analysis,":[124],"give":[127],"accurate":[128],"proposed":[129],"violations,":[134],"as":[135,137,142],"well":[136],"detailed":[138],"explanations":[139],"users":[141,156],"why":[144],"effective.":[148],"This":[149],"methodology":[150],"provides":[151],"easily":[152],"usable":[153],"about":[157],"flaws":[158],"their":[160,169],"both":[162],"moment":[166],"overall":[170],"application":[171],"setup.":[172]},"counts_by_year":[],"updated_date":"2026-01-29T23:17:01.242718","created_date":"2026-01-29T00:00:00"}
