{"id":"https://openalex.org/W4387321783","doi":"https://doi.org/10.1145/3607199.3607225","title":"MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands","display_name":"MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands","publication_year":2023,"publication_date":"2023-10-03","ids":{"openalex":"https://openalex.org/W4387321783","doi":"https://doi.org/10.1145/3607199.3607225"},"language":"en","primary_location":{"id":"doi:10.1145/3607199.3607225","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3607199.3607225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003482377","display_name":"Xuening Xu","orcid":"https://orcid.org/0009-0006-2072-3005"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xuening Xu","raw_affiliation_strings":["Stevens Institute of Technology, United States of America"],"raw_orcid":"https://orcid.org/0009-0006-2072-3005","affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology, United States of America","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075531085","display_name":"Chenglong Fu","orcid":"https://orcid.org/0000-0001-6555-9858"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chenglong Fu","raw_affiliation_strings":["University of North Carolina at Charlotte, USA"],"raw_orcid":"https://orcid.org/0000-0001-6555-9858","affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Stevens Institute of Technology, USA"],"raw_orcid":"https://orcid.org/0000-0003-4235-9671","affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology, USA","institution_ids":["https://openalex.org/I108468826"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5003482377"],"corresponding_institution_ids":["https://openalex.org/I108468826"],"apc_list":null,"apc_paid":null,"fwci":0.1968,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51735142,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"46","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7104321718215942},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.5649954676628113},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5308400392532349},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5306113362312317},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.5087350010871887},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4948117136955261},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46742552518844604},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37452149391174316},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17254433035850525}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7104321718215942},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.5649954676628113},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5308400392532349},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5306113362312317},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.5087350010871887},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4948117136955261},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46742552518844604},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37452149391174316},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17254433035850525},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3607199.3607225","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3607199.3607225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.75,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G5922549982","display_name":null,"funder_award_id":"CNS-2204785, CNS-2205868","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1641861334","https://openalex.org/W2065555571","https://openalex.org/W2087186321","https://openalex.org/W2097025901","https://openalex.org/W2107831657","https://openalex.org/W2257240057","https://openalex.org/W2734941459","https://openalex.org/W2741324494","https://openalex.org/W2768475025","https://openalex.org/W2886320151","https://openalex.org/W2890559797","https://openalex.org/W2892384731","https://openalex.org/W2901909474","https://openalex.org/W2907310707","https://openalex.org/W2912944782","https://openalex.org/W2947175569","https://openalex.org/W2984855628","https://openalex.org/W2986164614","https://openalex.org/W2990216812","https://openalex.org/W3007016253","https://openalex.org/W3046246673","https://openalex.org/W3046873296","https://openalex.org/W3082637116","https://openalex.org/W3092161373","https://openalex.org/W3136780060","https://openalex.org/W3180986399","https://openalex.org/W4223542981","https://openalex.org/W4287848620","https://openalex.org/W4288080331"],"related_works":["https://openalex.org/W2883256816","https://openalex.org/W2171408034","https://openalex.org/W3003320923","https://openalex.org/W2106140982","https://openalex.org/W2152313554","https://openalex.org/W2064303750","https://openalex.org/W1509300825","https://openalex.org/W3092582874","https://openalex.org/W2338718585","https://openalex.org/W2054620577"],"abstract_inverted_index":{"In":[0,123],"recent":[1],"years,":[2],"intelligent":[3],"and":[4,55,118,138,143,164,191,205,212,223,233,242],"automated":[5],"device":[6,25],"control":[7],"features":[8],"have":[9,48],"led":[10],"to":[11,29,59,66,114,181],"a":[12,91,168,176,195,236,243],"significant":[13],"increase":[14],"in":[15,194],"the":[16,34,44,97,131,140,226,252],"adoption":[17],"of":[18,99,238,245],"smart":[19,120,197],"home":[20,121,198],"IoT":[21,24,36,51,100,111,149,152,203,208,231],"systems.":[22],"Each":[23],"sends":[26],"its":[27],"events":[28,54,83,232],"(and":[30],"receives":[31],"commands":[32,88,234],"from)":[33],"corresponding":[35],"server/platform,":[37],"which":[38,129],"executes":[39],"automation":[40,104,209],"rules":[41,166],"set":[42],"by":[43],"user.":[45],"Recent":[46],"studies":[47],"shown":[49],"that":[50,102,135,219],"messages,":[52],"including":[53],"commands,":[56],"are":[57],"subject":[58],"stealthy":[60],"delays":[61],"ranging":[62],"from":[63],"several":[64],"seconds":[65],"minutes,":[67],"or":[68,87],"even":[69],"hours,":[70],"without":[71],"raising":[72],"any":[73],"alerts.":[74],"Exploiting":[75],"this":[76,124],"vulnerability,":[77],"adversaries":[78],"can":[79,109,136,221],"intentionally":[80],"delay":[81,146,184,227,253],"crucial":[82],"(e.g.,":[84,89],"fire":[85],"alarms)":[86],"locking":[90],"door),":[92],"as":[93,95,167,247,249],"well":[94,248],"alter":[96],"order":[98],"messages":[101],"dictate":[103],"rule":[105],"execution.":[106],"This":[107],"manipulation":[108],"deceive":[110],"servers,":[112],"leading":[113],"incorrect":[115],"command":[116,183],"issuance":[117],"jeopardizing":[119],"safety.":[122],"paper,":[125],"we":[126,157],"present":[127],"MP-Mediator,":[128],"is":[130,179],"first":[132],"defense":[133],"system":[134],"detect":[137,225],"handle":[139,182,251],"new,":[141],"stealthy,":[142],"widely":[144],"applicable":[145],"attacks":[147,185,228],"on":[148,186,229],"messages.":[150],"For":[151],"devices":[153,163,204],"lacking":[154],"accessible":[155],"APIs,":[156],"propose":[158],"innovative":[159],"methods":[160],"leveraging":[161],"virtual":[162,165],"bridge":[169],"for":[170],"indirect":[171],"integration":[172],"with":[173,200,235],"MP-Mediator.":[174],"Furthermore,":[175],"VPN-based":[177],"component":[178],"proposed":[180],"critical":[187],"links.":[188],"We":[189],"implement":[190],"evaluate":[192],"MP-Mediator":[193,220],"real-world":[196],"testbed":[199],"twenty-two":[201],"popular":[202],"two":[206],"major":[207],"platforms":[210],"(IFTTT":[211],"Samsung":[213],"SmartThings).":[214],"The":[215],"experimental":[216],"results":[217],"show":[218],"quickly":[222],"accurately":[224],"both":[230],"precision":[237],"more":[239],"than":[240],"96%":[241],"recall":[244],"100%,":[246],"effectively":[250],"attacks.":[254]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
