no code implementations • 24 Nov 2019 • Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, A. Selcuk Uluagac
We designed and built IoTWatcH based on an IoT privacy survey that considers the privacy needs of IoT users.
no code implementations • 22 Nov 2019 • Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, A. Selcuk Uluagac
Users can specify their desired access control settings using the interaction module which are translated into access control policies in the backend server.
Cryptography and Security
no code implementations • 3 Sep 2018 • Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac
In order to test the performance of IoTDots, we tested IoTDots in a realistic smart office environment with a total of 22 devices and sensors.
Cryptography and Security
1 code implementation • 22 Feb 2018 • Z. Berkay Celik, Leonardo Babun, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, A. Selcuk Uluagac
Through this effort, we introduce a rigorously grounded framework for evaluating the use of sensitive information in IoT apps---and therein provide developers, markets, and consumers a means of identifying potential threats to security and privacy.
Cryptography and Security Programming Languages