Z. Berkay Celik

336 Westgate Building
University Park, PA 16802, USA
zbc102@cse.psu.edu

Curriculum Vitae
Google Scholar
Github
Twitter
Linkedin


May 2018

IoT Security and Privacy Reading List: From time to time I receive emails asking how to start studying IoT security and privacy. I and my colleague, Xiaolei Wang, have grouped a collection of papers that we recommend reading for those interested in IoT security and privacy (including trigger-action platforms and voice-controlled devices). If you have any suggestions, please send a pull request.

First depth study on IoT Security
Sensitive Information Flow Tracking
Access Control
Safety and Security Violation Identification and Enforcement
Vulnerability Mining
Forensics
IoT Malware
Fault Detection and Evaluation
Privacy Inference via Sensors and Defenses
Attacks against Voice Control
Trigger-action Platform Measurement and Security Analysis
IoT Test Suite
IoT Surveys