{"id":"https://openalex.org/W2889851986","doi":"https://doi.org/10.1145/3243734.3243841","title":"If This Then What?","display_name":"If This Then What?","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W2889851986","doi":"https://doi.org/10.1145/3243734.3243841","mag":"2889851986"},"language":"en","primary_location":{"id":"doi:10.1145/3243734.3243841","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3243734.3243841","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-238501","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052754205","display_name":"Iulia Bastys","orcid":"https://orcid.org/0000-0002-3052-4185"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Iulia Bastys","raw_affiliation_strings":["Chalmers University of Technology, Gothenburg, Sweden"],"affiliations":[{"raw_affiliation_string":"Chalmers University of Technology, Gothenburg, Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073362414","display_name":"Musard Balliu","orcid":"https://orcid.org/0000-0001-6005-5992"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Musard Balliu","raw_affiliation_strings":["KTH Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070340953","display_name":"Andrei Sabelfeld","orcid":null},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Andrei Sabelfeld","raw_affiliation_strings":["Chalmers University of Technology, Gothenburg, Sweden"],"affiliations":[{"raw_affiliation_string":"Chalmers University of Technology, Gothenburg, Sweden","institution_ids":["https://openalex.org/I66862912"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5052754205"],"corresponding_institution_ids":["https://openalex.org/I66862912"],"apc_list":null,"apc_paid":null,"fwci":8.8004,"has_fulltext":false,"cited_by_count":84,"citation_normalized_percentile":{"value":0.98142995,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1102","last_page":"1119"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/java-applet","display_name":"Java applet","score":0.8276211619377136},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7626162767410278},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.5375895500183105},{"id":"https://openalex.org/keywords/plug-in","display_name":"Plug-in","score":0.48921680450439453},{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.4786190390586853},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.46901649236679077},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46235403418540955},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4538879692554474},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.33200833201408386},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.265572726726532}],"concepts":[{"id":"https://openalex.org/C15524039","wikidata":"https://www.wikidata.org/wiki/Q865817","display_name":"Java applet","level":3,"score":0.8276211619377136},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7626162767410278},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.5375895500183105},{"id":"https://openalex.org/C4924752","wikidata":"https://www.wikidata.org/wiki/Q184148","display_name":"Plug-in","level":2,"score":0.48921680450439453},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.4786190390586853},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.46901649236679077},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46235403418540955},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4538879692554474},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.33200833201408386},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.265572726726532}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3243734.3243841","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3243734.3243841","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:DiVA.org:kth-238501","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-238501","pdf_url":null,"source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference paper"},{"id":"pmh:oai:research.chalmers.se:507823","is_oa":false,"landing_page_url":"https://research.chalmers.se/en/publication/507823","pdf_url":null,"source":{"id":"https://openalex.org/S4306402469","display_name":"Chalmers Research (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:research.chalmers.se:507987","is_oa":false,"landing_page_url":"https://research.chalmers.se/en/publication/ee43cda9-772a-4460-91a5-5f30a3187a20","pdf_url":null,"source":{"id":"https://openalex.org/S4306402469","display_name":"Chalmers Research (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:DiVA.org:kth-238501","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-238501","pdf_url":null,"source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference paper"},"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G8683756101","display_name":null,"funder_award_id":"support","funder_id":"https://openalex.org/F4320322327","funder_display_name":"Knut och Alice Wallenbergs Stiftelse"}],"funders":[{"id":"https://openalex.org/F4320320940","display_name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","ror":"https://ror.org/044wr7g58"},{"id":"https://openalex.org/F4320322327","display_name":"Knut och Alice Wallenbergs Stiftelse","ror":"https://ror.org/004hzzk67"},{"id":"https://openalex.org/F4320322581","display_name":"Vetenskapsr\u00e5det","ror":"https://ror.org/03zttf063"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1222699389","https://openalex.org/W1519566437","https://openalex.org/W1596046736","https://openalex.org/W1783722518","https://openalex.org/W1966590372","https://openalex.org/W1977764760","https://openalex.org/W1981490327","https://openalex.org/W1993520820","https://openalex.org/W2086239403","https://openalex.org/W2119249378","https://openalex.org/W2129278597","https://openalex.org/W2131916295","https://openalex.org/W2146717998","https://openalex.org/W2189652372","https://openalex.org/W2282372177","https://openalex.org/W2296605318","https://openalex.org/W2307994931","https://openalex.org/W2339941521","https://openalex.org/W2346134553","https://openalex.org/W2399248522","https://openalex.org/W2474516640","https://openalex.org/W2508816844","https://openalex.org/W2523797613","https://openalex.org/W2533712304","https://openalex.org/W2547471548","https://openalex.org/W2605367183","https://openalex.org/W2770057444","https://openalex.org/W2791710451","https://openalex.org/W2888937667","https://openalex.org/W2889033824","https://openalex.org/W2889851986","https://openalex.org/W2964014507"],"related_works":["https://openalex.org/W3146554993","https://openalex.org/W2524035291","https://openalex.org/W2889851986","https://openalex.org/W2172222246","https://openalex.org/W118448456","https://openalex.org/W2596305496","https://openalex.org/W2260680879","https://openalex.org/W2997789329","https://openalex.org/W2050283318","https://openalex.org/W2290534421"],"abstract_inverted_index":{"IoT":[0,35,162],"apps":[1,13],"empower":[2],"users":[3],"by":[4,19,52,185],"connecting":[5],"a":[6,77,155,217],"variety":[7],"of":[8,79,95,102,181,219],"otherwise":[9],"unconnected":[10],"services.":[11],"These":[12],"(or":[14],"applets":[15,82,90,104],")":[16],"are":[17,48],"triggered":[18],"external":[20,27],"information":[21,28,120,158,201],"sources":[22,146],"to":[23,50,60,72,92,147,191],"perform":[24],"actions":[25],"on":[26,69,208,216],"sinks.":[29,149],"We":[30,75,108,188],"demonstrate":[31],"that":[32,100,128],"the":[33,89,93,103,174,179,193,209],"popular":[34],"app":[36],"platforms,":[37],"including":[38,56],"IFTTT":[39,81],"(If":[40],"This":[41],"Then":[42],"That),":[43],"Zapier,":[44],"and":[45,67,98,114,119,169,212],"Microsoft":[46],"Flow":[47],"susceptible":[49],"attacks":[51,59],"malicious":[53],"applet":[54,133,167,186],"makers,":[55],"stealthy":[57],"privacy":[58],"exfiltrate":[61],"private":[62,137,145],"photos,":[63],"leak":[64],"user":[65,70],"location,":[66],"eavesdrop":[68],"input":[71],"voice-controlled":[73],"assistants.":[74],"study":[76],"dataset":[78],"279,828":[80],"from":[83,144],"more":[84],"than":[85],"400":[86],"services,":[87],"classify":[88],"according":[91],"sensitivity":[94],"their":[96],"sources,":[97],"find":[99],"30%":[101],"may":[105],"violate":[106],"privacy.":[107],"propose":[109],"two":[110],"countermeasures":[111],"for":[112,157,195,205],"short-":[113],"longterm":[115,151],"protection:":[116],"access":[117,129],"control":[118,130],"flow":[121,159,202],"control.":[122],"For":[123,150],"short-term":[124],"protection,":[125,152],"we":[126,153],"suggest":[127],"classifies":[131],"an":[132,196],"as":[134],"either":[135],"exclusively":[136,139],"or":[138],"public,":[140],"thus":[141],"breaking":[142],"flows":[143],"sensitive":[148],"develop":[154],"framework":[156,165],"tracking":[160,203],"in":[161],"apps.":[163],"The":[164],"models":[166],"reactivity":[168],"timing":[170],"behavior,":[171],"while":[172],"at":[173],"same":[175],"time":[176],"faithfully":[177],"capturing":[178],"subtleties":[180],"attacker":[182],"observations":[183],"caused":[184],"output.":[187],"show":[189],"how":[190],"implement":[192],"approach":[194],"IFTTT-inspired":[197],"setting":[198],"leveraging":[199],"state-of-the-art":[200],"techniques":[204],"JavaScript":[206],"based":[207],"JSFlow":[210],"tool":[211],"evaluate":[213],"its":[214],"effectiveness":[215],"collection":[218],"applets.":[220]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":20},{"year":2020,"cited_by_count":18},{"year":2019,"cited_by_count":11},{"year":2018,"cited_by_count":3}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2018-09-27T00:00:00"}
