{"id":"https://openalex.org/W2974058390","doi":"https://doi.org/10.1109/spw.2019.00042","title":"A Study of Vulnerability Analysis of Popular Smart Devices Through Their Companion Apps","display_name":"A Study of Vulnerability Analysis of Popular Smart Devices Through Their Companion Apps","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2974058390","doi":"https://doi.org/10.1109/spw.2019.00042","mag":"2974058390"},"language":"en","primary_location":{"id":"doi:10.1109/spw.2019.00042","is_oa":true,"landing_page_url":"https://doi.org/10.1109/spw.2019.00042","pdf_url":"https://ieeexplore.ieee.org/ielx7/8834415/8844588/08844591.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Security and Privacy Workshops (SPW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/8834415/8844588/08844591.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051138180","display_name":"Davino Mauro","orcid":null},"institutions":[{"id":"https://openalex.org/I25112270","display_name":"Universidade Federal de Pernambuco","ror":"https://ror.org/047908t24","country_code":"BR","type":"education","lineage":["https://openalex.org/I25112270"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Davino Mauro Junior","raw_affiliation_strings":["Federal University of Pernambuco, Brazil"],"affiliations":[{"raw_affiliation_string":"Federal University of Pernambuco, Brazil","institution_ids":["https://openalex.org/I25112270"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060492867","display_name":"Lu\u00eds Melo","orcid":"https://orcid.org/0000-0001-5468-7889"},"institutions":[{"id":"https://openalex.org/I25112270","display_name":"Universidade Federal de Pernambuco","ror":"https://ror.org/047908t24","country_code":"BR","type":"education","lineage":["https://openalex.org/I25112270"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Luis Melo","raw_affiliation_strings":["Federal University of Pernambuco, Brazil"],"affiliations":[{"raw_affiliation_string":"Federal University of Pernambuco, Brazil","institution_ids":["https://openalex.org/I25112270"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101877034","display_name":"Hao L\u00fc","orcid":"https://orcid.org/0000-0002-2241-6598"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hao Lu","raw_affiliation_strings":["University of Michigan, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020353093","display_name":"Marcelo d\u2019Amorim","orcid":"https://orcid.org/0000-0002-1323-8769"},"institutions":[{"id":"https://openalex.org/I25112270","display_name":"Universidade Federal de Pernambuco","ror":"https://ror.org/047908t24","country_code":"BR","type":"education","lineage":["https://openalex.org/I25112270"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Marcelo d'Amorim","raw_affiliation_strings":["Federal University of Pernambuco, Brazil"],"affiliations":[{"raw_affiliation_string":"Federal University of Pernambuco, Brazil","institution_ids":["https://openalex.org/I25112270"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019723791","display_name":"Atul Prakash","orcid":"https://orcid.org/0000-0002-4907-3687"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Atul Prakash","raw_affiliation_strings":["University of Michigan, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, USA","institution_ids":["https://openalex.org/I27837315"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5051138180"],"corresponding_institution_ids":["https://openalex.org/I25112270"],"apc_list":null,"apc_paid":null,"fwci":1.4927,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.83355837,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"181","last_page":"186"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7624608278274536},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7533179521560669},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7240186929702759},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6418927311897278},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.559694766998291},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5554258227348328},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4798450171947479},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4551416039466858},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.43655213713645935},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.35563260316848755},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3252532184123993},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12341544032096863}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7624608278274536},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7533179521560669},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7240186929702759},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6418927311897278},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.559694766998291},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5554258227348328},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4798450171947479},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4551416039466858},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.43655213713645935},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.35563260316848755},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3252532184123993},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12341544032096863}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/spw.2019.00042","is_oa":true,"landing_page_url":"https://doi.org/10.1109/spw.2019.00042","pdf_url":"https://ieeexplore.ieee.org/ielx7/8834415/8844588/08844591.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Security and Privacy Workshops (SPW)","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1109/spw.2019.00042","is_oa":true,"landing_page_url":"https://doi.org/10.1109/spw.2019.00042","pdf_url":"https://ieeexplore.ieee.org/ielx7/8834415/8844588/08844591.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Security and Privacy Workshops (SPW)","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2974058390.pdf","grobid_xml":"https://content.openalex.org/works/W2974058390.grobid-xml"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W1553308705","https://openalex.org/W2008810193","https://openalex.org/W2027538101","https://openalex.org/W2101609731","https://openalex.org/W2102460407","https://openalex.org/W2156453323","https://openalex.org/W2340586376","https://openalex.org/W2508433864","https://openalex.org/W2613352518","https://openalex.org/W2773031569","https://openalex.org/W2791710451","https://openalex.org/W6632977858","https://openalex.org/W6747031791"],"related_works":["https://openalex.org/W2981602419","https://openalex.org/W3046211085","https://openalex.org/W2892995359","https://openalex.org/W3200230338","https://openalex.org/W3132305133","https://openalex.org/W2997166284","https://openalex.org/W3041895572","https://openalex.org/W2885045113","https://openalex.org/W2920854091","https://openalex.org/W2952303706","https://openalex.org/W2963341288","https://openalex.org/W3034868407","https://openalex.org/W2063549770","https://openalex.org/W2611949601","https://openalex.org/W3034145953","https://openalex.org/W2561495609","https://openalex.org/W2805094107","https://openalex.org/W2760477869","https://openalex.org/W3005810434","https://openalex.org/W2335873957"],"abstract_inverted_index":{"Security":[0],"of":[1,3,33,54,72,80,105,126,141,152,158],"Internet":[2],"Things":[4],"(IoT)":[5],"devices":[6,13,36,59,95,106,137,160,181],"is":[7],"a":[8,51,69],"well-known":[9,170],"concern":[10],"as":[11,109,111,174],"these":[12,94,127],"come":[14],"in":[15,18],"increasing":[16],"use":[17,42,163],"homes":[19],"and":[20,38,138,182,200,210],"commercial":[21],"environments.":[22],"To":[23],"better":[24],"understand":[25,131],"the":[26,34,39,73,78,87,115,124,136,139,153,159,184,197,203,215],"extent":[27],"to":[28,43,130,148,156,195],"which":[29],"companies":[30],"take":[31],"security":[32,52,140,146,219],"IoT":[35,58],"seriously":[37],"methods":[40],"they":[41,133],"secure":[44],"them,":[45],"this":[46],"paper":[47],"presents":[48],"findings":[49],"from":[50,107,214],"analysis":[53,74],"96":[55],"top-selling":[56],"WiFi":[57],"on":[60,208],"Amazon.":[61],"We":[62,122,144,177],"found":[63,103,145,186],"that":[64,93,142,217],"we":[65,102,192,206],"could":[66],"carry":[67],"out":[68],"significant":[70],"portion":[71],"by":[75],"first":[76],"analyzing":[77],"code":[79,125],"Android":[81],"companion":[82,100,128],"apps":[83,129,154],"responsible":[84],"for":[85],"controlling":[86],"devices.":[88],"An":[89],"interesting":[90],"finding":[91],"was":[92],"used":[96,169],"only":[97],"32":[98],"unique":[99],"apps;":[101],"instances":[104],"same":[108,116],"well":[110],"different":[112],"brands":[113],"sharing":[114],"app,":[117],"significantly":[118],"reducing":[119],"our":[120],"work.":[121],"analyzed":[123],"how":[132],"communicated":[134],"with":[135,187],"communication.":[143],"problems":[147],"be":[149],"widespread:":[150],"50%":[151],"corresponding":[155],"38%":[157],"did":[161],"not":[162],"proper":[164],"encryption":[165],"techniques;":[166],"some":[167,190],"even":[168],"weak":[171],"ciphers":[172],"such":[173],"Caesar":[175],"cipher.":[176],"also":[178],"purchased":[179],"5":[180],"confirmed":[183],"vulnerabilities":[185],"exploits.":[188],"In":[189],"cases,":[191],"were":[193],"able":[194],"bypass":[196],"pairing":[198],"process":[199],"still":[201],"control":[202],"device.":[204],"Finally,":[205],"comment":[207],"technical":[209],"non-technical":[211],"lessons":[212],"learned":[213],"study":[216],"have":[218],"implications.":[220]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":6},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
