{"id":"https://openalex.org/W4366494053","doi":"https://doi.org/10.1145/3577923.3583636","title":"All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms","display_name":"All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms","publication_year":2023,"publication_date":"2023-04-20","ids":{"openalex":"https://openalex.org/W4366494053","doi":"https://doi.org/10.1145/3577923.3583636"},"language":"en","primary_location":{"id":"doi:10.1145/3577923.3583636","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3577923.3583636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019001470","display_name":"Bhaskar Tejaswi","orcid":"https://orcid.org/0000-0003-0506-2641"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Bhaskar Tejaswi","raw_affiliation_strings":["Concordia University, Montreal, PQ, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University, Montreal, PQ, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055898168","display_name":"Mohammad Mannan","orcid":"https://orcid.org/0000-0002-9630-5858"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammad Mannan","raw_affiliation_strings":["Concordia University, Montreal, PQ, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University, Montreal, PQ, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085765243","display_name":"Amr Youssef","orcid":"https://orcid.org/0000-0002-4284-8646"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Amr Youssef","raw_affiliation_strings":["Concordia University, Montreal, PQ, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University, Montreal, PQ, Canada","institution_ids":["https://openalex.org/I60158472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019001470"],"corresponding_institution_ids":["https://openalex.org/I60158472"],"apc_list":null,"apc_paid":null,"fwci":0.4066,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.53645866,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"245","last_page":"250"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7275902032852173},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7014509439468384},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6768988370895386},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6477290391921997},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4185539484024048},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10175040364265442}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7275902032852173},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7014509439468384},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6768988370895386},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6477290391921997},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4185539484024048},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10175040364265442},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3577923.3583636","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3577923.3583636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/2","score":0.5400000214576721,"display_name":"Zero hunger"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2350778671","https://openalex.org/W2399187981","https://openalex.org/W2767039516","https://openalex.org/W2794608538","https://openalex.org/W2929305171","https://openalex.org/W3014135557","https://openalex.org/W3173923030","https://openalex.org/W4387011179"],"related_works":["https://openalex.org/W2942005518","https://openalex.org/W2948603704","https://openalex.org/W4210403433","https://openalex.org/W2037453544","https://openalex.org/W2293040026","https://openalex.org/W4285143238","https://openalex.org/W4214528532","https://openalex.org/W4295364991","https://openalex.org/W2766839175","https://openalex.org/W2414015808"],"abstract_inverted_index":{"IoT":[0,37,42,98,125],"devices":[1,176],"have":[2],"become":[3],"an":[4],"integral":[5],"part":[6],"of":[7,22,49,106,154],"our":[8,93],"day":[9,11],"to":[10,18,63,95,118,167,178],"activities,":[12],"and":[13,25,32,128,174],"are":[14],"also":[15],"being":[16],"deployed":[17],"fulfil":[19],"a":[20,86,104],"number":[21,105],"industrial,":[23],"enterprise":[24],"agricultural":[26],"use":[27,92],"cases.":[28],"To":[29],"efficiently":[30],"manage":[31],"operate":[33],"these":[34,54],"devices,":[35],"the":[36,46,50,65,76,155],"ecosystem":[38,66],"relies":[39],"on":[40,144,152,158],"several":[41],"management":[43,99],"platforms.":[44,100,156,180],"Given":[45],"security-sensitive":[47],"nature":[48],"operations":[51],"performed":[52],"by":[53,74,80],"platforms,":[55,82,114,139,146,160],"analyzing":[56],"them":[57],"for":[58],"security":[59,87],"vulnerabilities":[60,111,163],"is":[61],"critical":[62],"protect":[64],"from":[67],"potential":[68],"cyber":[69],"threats.":[70],"In":[71],"this":[72],"work,":[73],"exploring":[75],"core":[77],"functionalities":[78],"offered":[79],"leading":[81],"we":[83,91,133,161],"first":[84],"design":[85],"evaluation":[88],"framework.":[89],"Subsequently,":[90],"framework":[94],"analyze":[96],"42":[97],"Our":[101],"analysis":[102],"uncovers":[103],"high":[107],"severity":[108],"unauthorized":[109],"access":[110],"in":[112,137],"9/42":[113],"which":[115],"could":[116,165],"lead":[117,166],"attacks":[119],"such":[120],"as":[121],"remote":[122,149],"SIM":[123,126],"deactivation,":[124],"overcharging":[127],"device":[129],"data":[130],"forgery.":[131],"Furthermore,":[132],"find":[134,162],"broken":[135],"authentication":[136],"11/42":[138,159],"including":[140],"complete":[141],"account":[142],"takeover":[143],"7/42":[145],"along":[147],"with":[148],"code":[150],"execution":[151],"one":[153],"Overall,":[157],"that":[164,170],"platform-wide":[168],"attacks,":[169],"affect":[171],"all":[172,175],"users":[173],"connected":[177],"those":[179]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
