{"id":"https://openalex.org/W2735029465","doi":"https://doi.org/10.1145/3098243.3098251","title":"HanGuard","display_name":"HanGuard","publication_year":2017,"publication_date":"2017-07-13","ids":{"openalex":"https://openalex.org/W2735029465","doi":"https://doi.org/10.1145/3098243.3098251","mag":"2735029465"},"language":"en","primary_location":{"id":"doi:10.1145/3098243.3098251","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3098243.3098251","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3098243.3098251","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3098243.3098251","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007503250","display_name":"Soteris Demetriou","orcid":"https://orcid.org/0000-0003-0318-9171"},"institutions":[{"id":"https://openalex.org/I2801919071","display_name":"University of Illinois System","ror":"https://ror.org/05e94g991","country_code":"US","type":"education","lineage":["https://openalex.org/I2801919071"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Soteris Demetriou","raw_affiliation_strings":["University of Illinois"],"affiliations":[{"raw_affiliation_string":"University of Illinois","institution_ids":["https://openalex.org/I2801919071"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100331225","display_name":"Nan Zhang","orcid":"https://orcid.org/0000-0001-7328-6159"},"institutions":[{"id":"https://openalex.org/I592451","display_name":"Indiana University","ror":"https://ror.org/01kg8sb98","country_code":"US","type":"education","lineage":["https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nan Zhang","raw_affiliation_strings":["Indiana University"],"affiliations":[{"raw_affiliation_string":"Indiana University","institution_ids":["https://openalex.org/I592451"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082578648","display_name":"Yeonjoon Lee","orcid":"https://orcid.org/0000-0002-5010-8277"},"institutions":[{"id":"https://openalex.org/I592451","display_name":"Indiana University","ror":"https://ror.org/01kg8sb98","country_code":"US","type":"education","lineage":["https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yeonjoon Lee","raw_affiliation_strings":["Indiana University"],"affiliations":[{"raw_affiliation_string":"Indiana University","institution_ids":["https://openalex.org/I592451"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100333239","display_name":"Xiaofeng Wang","orcid":"https://orcid.org/0000-0002-3583-369X"},"institutions":[{"id":"https://openalex.org/I592451","display_name":"Indiana University","ror":"https://ror.org/01kg8sb98","country_code":"US","type":"education","lineage":["https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"XiaoFeng Wang","raw_affiliation_strings":["Indiana University"],"affiliations":[{"raw_affiliation_string":"Indiana University","institution_ids":["https://openalex.org/I592451"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031954035","display_name":"Carl A. Gunter","orcid":"https://orcid.org/0009-0006-6943-0684"},"institutions":[{"id":"https://openalex.org/I2801919071","display_name":"University of Illinois System","ror":"https://ror.org/05e94g991","country_code":"US","type":"education","lineage":["https://openalex.org/I2801919071"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Carl A. Gunter","raw_affiliation_strings":["University of Illinois"],"affiliations":[{"raw_affiliation_string":"University of Illinois","institution_ids":["https://openalex.org/I2801919071"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064246785","display_name":"Xiaoyong Zhou","orcid":"https://orcid.org/0000-0001-6083-1381"},"institutions":[{"id":"https://openalex.org/I4210101778","display_name":"Samsung (United States)","ror":"https://ror.org/01bfbvm65","country_code":"US","type":"company","lineage":["https://openalex.org/I2250650973","https://openalex.org/I4210101778"]},{"id":"https://openalex.org/I4210133173","display_name":"Research!America (United States)","ror":"https://ror.org/044pgyv50","country_code":"US","type":"company","lineage":["https://openalex.org/I4210133173"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaoyong Zhou","raw_affiliation_strings":["Samsung Research America"],"affiliations":[{"raw_affiliation_string":"Samsung Research America","institution_ids":["https://openalex.org/I4210101778","https://openalex.org/I4210133173"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112308489","display_name":"Michael Grace","orcid":null},"institutions":[{"id":"https://openalex.org/I4210101778","display_name":"Samsung (United States)","ror":"https://ror.org/01bfbvm65","country_code":"US","type":"company","lineage":["https://openalex.org/I2250650973","https://openalex.org/I4210101778"]},{"id":"https://openalex.org/I4210133173","display_name":"Research!America (United States)","ror":"https://ror.org/044pgyv50","country_code":"US","type":"company","lineage":["https://openalex.org/I4210133173"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Grace","raw_affiliation_strings":["Samsung Research America"],"affiliations":[{"raw_affiliation_string":"Samsung Research America","institution_ids":["https://openalex.org/I4210101778","https://openalex.org/I4210133173"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5007503250"],"corresponding_institution_ids":["https://openalex.org/I2801919071"],"apc_list":null,"apc_paid":null,"fwci":4.4772,"has_fulltext":true,"cited_by_count":59,"citation_normalized_percentile":{"value":0.95654839,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"122","last_page":"133"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.8478573560714722},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.766248345375061},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7256964445114136},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5752418041229248},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5423134565353394},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.468217134475708},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4670136570930481},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4628531038761139},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.42574092745780945},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.42217540740966797},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.36961013078689575},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.22575649619102478}],"concepts":[{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.8478573560714722},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.766248345375061},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7256964445114136},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5752418041229248},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5423134565353394},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.468217134475708},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4670136570930481},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4628531038761139},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.42574092745780945},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.42217540740966797},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36961013078689575},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.22575649619102478},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3098243.3098251","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3098243.3098251","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3098243.3098251","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3098243.3098251","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3098243.3098251","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3098243.3098251","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G148792083","display_name":null,"funder_award_id":"13-30491, 14-08944","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2190930083","display_name":null,"funder_award_id":"W911NF1610127","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G260582310","display_name":null,"funder_award_id":"12-23967, 13-30491, 14-08944, 15-13939, 12-23477, 12-23495, 15-27141, 16-18493","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6394191966","display_name":"TWC: Small: Secure Data-Intensive Computing on Hybrid Clouds","funder_award_id":"1223495","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6982404986","display_name":"TWC: Small: Understanding and Mitigating the Security Hazards of Mobile Fragmentation","funder_award_id":"1527141","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7062019924","display_name":null,"funder_award_id":"1223477","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7452299184","display_name":null,"funder_award_id":"W911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G8998121839","display_name":null,"funder_award_id":"911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332195","display_name":"Samsung","ror":"https://ror.org/04w3jy968"},{"id":"https://openalex.org/F4320332222","display_name":"University of Illinois at Urbana-Champaign","ror":"https://ror.org/047426m28"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2735029465.pdf","grobid_xml":"https://content.openalex.org/works/W2735029465.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W128343026","https://openalex.org/W190551272","https://openalex.org/W1678529581","https://openalex.org/W1971497680","https://openalex.org/W1977001074","https://openalex.org/W1987221145","https://openalex.org/W1993520820","https://openalex.org/W2003063963","https://openalex.org/W2003797911","https://openalex.org/W2012921353","https://openalex.org/W2027538101","https://openalex.org/W2038829846","https://openalex.org/W2040340473","https://openalex.org/W2041276426","https://openalex.org/W2042662524","https://openalex.org/W2046188065","https://openalex.org/W2061719810","https://openalex.org/W2101887502","https://openalex.org/W2102460407","https://openalex.org/W2119812052","https://openalex.org/W2120908295","https://openalex.org/W2122587458","https://openalex.org/W2122672392","https://openalex.org/W2125011234","https://openalex.org/W2132073183","https://openalex.org/W2136553381","https://openalex.org/W2138157888","https://openalex.org/W2144219822","https://openalex.org/W2151211821","https://openalex.org/W2153500642","https://openalex.org/W2157349061","https://openalex.org/W2168872572","https://openalex.org/W2182112800","https://openalex.org/W2290195878","https://openalex.org/W2358552375","https://openalex.org/W2405120356","https://openalex.org/W2460813369","https://openalex.org/W2474516640","https://openalex.org/W2508433864"],"related_works":["https://openalex.org/W2122026593","https://openalex.org/W2582203024","https://openalex.org/W1588358165","https://openalex.org/W4237683758","https://openalex.org/W2370711413","https://openalex.org/W2052038519","https://openalex.org/W2375932043","https://openalex.org/W2841075164","https://openalex.org/W1980506749","https://openalex.org/W2375594474"],"abstract_inverted_index":{"A":[0],"new":[1,110],"development":[2],"of":[3,89,148,189,226],"smart-home":[4],"systems":[5,27],"is":[6,240],"to":[7,11,29,35,43,62,76,83,98,100,112,137,157,169,175,210,212],"use":[8],"mobile":[9,227],"apps":[10,122,144],"control":[12,113,187],"IoT":[13,71,118,139,143,179],"devices":[14,82,119,140],"across":[15],"a":[16,109,124,164,186,232],"Home":[17],"Area":[18],"Network":[19],"(HAN).":[20],"As":[21],"verified":[22],"in":[23,123,245],"our":[24,217],"study,":[25],"those":[26,50],"tend":[28],"rely":[30,69],"on":[31,52,70,80,198],"the":[32,44,56,78,81,87,90,114,117,138,142,146,149,171,177,183,193,196,199,205,213],"Wi-Fi":[33],"router":[34,57,184,194],"authenticate":[36],"other":[37],"devices.":[38],"This":[39],"treatment":[40],"exposes":[41],"them":[42],"attack":[45],"from":[46],"malicious":[47],"apps,":[48],"particularly":[49],"running":[51],"authorized":[53],"phones,":[54],"which":[55,73],"does":[58,132],"not":[59,133],"have":[60],"information":[61],"control.":[63],"Mitigating":[64],"this":[65,105],"threat":[66],"cannot":[67],"solely":[68],"manufacturers,":[72],"may":[74],"need":[75,97],"change":[77],"hardware":[79],"support":[84],"encryption,":[85],"increasing":[86],"cost":[88],"device,":[91],"or":[92,145],"software":[93],"developers":[94],"who":[95],"we":[96,107],"trust":[99],"implement":[101],"security":[102],"correctly.":[103],"In":[104],"work,":[106],"present":[108],"technique":[111],"communication":[115],"between":[116],"and":[120,181,222,231,243],"their":[121],"unified,":[125],"backward-compatible":[126],"way.":[127],"Our":[128,235],"approach,":[129],"called":[130],"HanGuard,":[131],"require":[134],"any":[135],"changes":[136],"themselves,":[141],"OS":[147,228],"participating":[150],"phones.":[151],"HanGuard":[152,239],"uses":[153],"an":[154],"SDN-like":[155],"approach":[156],"offer":[158],"fine-grained":[159],"protection:":[160],"each":[161],"phone":[162,206],"runs":[163],"non-system":[165],"userspace":[166],"Monitor":[167],"app":[168],"identify":[170],"party":[172],"that":[173,238],"attempts":[174],"access":[176,191],"protected":[178],"device":[180],"inform":[182],"through":[185],"plane":[188,201],"its":[190],"decision;":[192],"enforces":[195],"decision":[197],"data":[200],"after":[202],"verifying":[203],"whether":[204],"should":[207],"be":[208],"allowed":[209],"talk":[211],"device.":[214],"We":[215],"implemented":[216],"design":[218],"over":[219],"both":[220,241],"Android":[221],"iOS":[223],"(>":[224],"95%":[225],"market":[229],"share)":[230],"popular":[233],"router.":[234],"study":[236],"shows":[237],"efficient":[242],"effective":[244],"practice.":[246]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":7}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2017-07-21T00:00:00"}
