[
[1] IoT Analytics, “IoT 2019 in review: The 10 most relevant IoT developments of the year,” https://iot-analytics.com/iot-2019-in-review/, [Online; accessed Nov. 2020].
]Search in Google Scholar
[
[2] J. Ren, D. J. Dubois, D. Choffnes, A. M. Mandalari, R. Kolcun, and H. Haddadi, “Information exposure from consumer IoT devices: A multidimensional, network-informed measurement approach,” in Proceedings of the Internet Measurement Conference, 2019.10.1145/3355369.3355577
]Search in Google Scholar
[
[3] H. Mohajeri Moghaddam, G. Acar, B. Burgess, A. Mathur, D. Y. Huang, N. Feamster, E. W. Felten, P. Mittal, and A. Narayanan, “Watching you watch: The tracking ecosystem of over-the-top TV streaming devices,” in CCS’19, 2019.10.1145/3319535.3354198
]Search in Google Scholar
[
[4] J. Varmarken, H. Le, A. Shuba, A. Markopoulou, and Z. Shafiq, “The TV is smart and full of trackers: Measuring smart TV advertising and tracking,” PETS’20, vol. 2020, no. 2, pp. 129–154, 2020.
]Search in Google Scholar
[
[5] S. J. Saidi, A. M. Mandalari, R. Kolcun, H. Haddadi, D. J. Dubois, D. Choffnes, G. Smaragdakis, and A. Feldmann, “A haystack full of needles: Scalable detection of IoT devices in the wild,” in IMC’20, 2020, pp. 87–100.10.1145/3419394.3423650
]Search in Google Scholar
[
[6] Pi-Hole: A black hole for Internet advertisements, https://pi-hole.net/, [Online; accessed Nov. 2020].
]Search in Google Scholar
[
[7] ico., “Principle (c): Data minimisation,” https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/principles/data-minimisation/, [Online; accessed Nov. 2020].
]Search in Google Scholar
[
[8] ——, “Principle (b): Purpose limitation,” https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/principles/purpose-limitation/, [Online; accessed Mar. 2021].
]Search in Google Scholar
[
[9] IFTTT, Inc., “IFTTT helps every thing work better together,” https://ifttt.com, [Online; accessed Mar. 2021].
]Search in Google Scholar
[
[10] SmartThings, Inc., “SmartThings: One simple home system. A world of possibilities.” https://www.smartthings.com, [Online; accessed Mar. 2021].
]Search in Google Scholar
[
[11] Roku Inc., “Roku Developer Documentation: Development Environment Overview,” https://sdkdocs.roku.com/display/sdkdoc/Development+Environment+Overview, [Online; accessed Feb. 2021].
]Search in Google Scholar
[
[12] Amazon.com Inc., “Developer Tools Menu (Fire TV),” https://developer.amazon.com/docs/fire-tv/developer-tools.html, [Online; accessed Feb. 2021].
]Search in Google Scholar
[
[13] R. Trimananda, J. Varmarken, A. Markopoulou, and B. Demsky, “Packet-level signatures for smart home device events,” in NDSS’20, 2020.10.14722/ndss.2020.24097
]Search in Google Scholar
[
[14] A. Acar, H. Fereidooni, T. Abera, A. K. Sikder, M. Miettinen, H. Aksu, M. Conti, A.-R. Sadeghi, and S. Uluagac, “Peek-a-Boo: I see your smart home activities, even encrypted!” in WiSec’20, 2020, p. 207–218. [Online]. Available: https://doi.org/10.1145/3395351.339942110.1145/3395351.3399421
]Search in Google Scholar
[
[15] Pi-Hole LLC Blocking Mode, https://docs.pi-hole.net/ftldns/blockingmode, [Online; accessed Nov. 2020].
]Search in Google Scholar
[
[16] WaLLy3K, “The big blocklist collection,” https://firebog.net, [Online; accessed Nov. 2020].
]Search in Google Scholar
[
[17] Mother of All AD-BLOCKING, “The big blocklist collection,” https://forum.xda-developers.com/showthread.php?t=1916098, [Online; accessed Nov. 2020].
]Search in Google Scholar
[
[18] Kromtech Alliance Corp, “Stopad for TV,” https://stopad.io/, [Online; accessed Nov. 2020].
]Search in Google Scholar
[
[19] Ashish Kumar Singh and V. Potdar, “Blocking online advertising - a state of the art,” in 2009 IEEE International Conference on Industrial Technology, Feb 2009, pp. 1–10.10.1109/ICIT.2009.4939739
]Search in Google Scholar
[
[20] Consumer Reports, “Home security cameras from top brands lack basic digital security measures,” https://www.consumerreports.org/wireless-security-cameras/home-security-cameras-from-top-brands-lack-basic-digital-security-measures/, [Online; accessed Nov. 2020].
]Search in Google Scholar
[
[21] A. Subahi and G. Theodorakopoulos, “Ensuring compliance of IoT devices with their privacy policy agreement,” in FiCloud’18. IEEE, 2018, pp. 100–107.10.1109/FiCloud.2018.00022
]Search in Google Scholar
[
[22] C. Welch, “I guess I have to watch ads everywhere on my $1,500 LG TV now,” https://www.theverge.com/tldr/2021/3/10/22323790/lg-oled-tv-commercials-content-store, [Online; accessed Mar. 2021].
]Search in Google Scholar
[
[23] R. Nithyanand, S. Khattak, M. Javed, N. Vallina-Rodriguez, M. Falahrastegar, J. E. Powles, E. De Cristofaro, H. Haddadi, and S. J. Murdoch, “Adblocking and counter blocking: A slice of the arms race,” in 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 16), 2016.
]Search in Google Scholar
[
[24] E. Lear, R. Droms, and D. Romascanu, “RFC 8520: Manufacturer usage description specification,” 2019.10.17487/RFC8520
]Search in Google Scholar
[
[25] A. Hamza, D. Ranathunga, H. H. Gharakheili, M. Roughan, and V. Sivaraman, “Clear as MUD: Generating, validating and applying IoT behavioral profiles,” in SIGCOMM ’18 Workshop on IoT S&P, 2018.10.1145/3229565.3229566
]Search in Google Scholar
[
[26] C. Haar and E. Buchmann, “FANE: A firewall appliance for the smart home,” in FedCSIS ’19, 2019, pp. 449–458.10.15439/2019F177
]Search in Google Scholar
[
[27] A. K. Simpson, F. Roesner, and T. Kohno, “Securing vulnerable home IoT devices with an in-hub security manager,” in PerCom ’17 Workshops, 2017, pp. 551–556.10.1109/PERCOMW.2017.7917622
]Search in Google Scholar
[
[28] N. Gupta, V. Naik, and S. Sengupta, “A firewall for internet of things,” in 2017 9th International Conference on Communication Systems and Networks (COMSNETS), 2017, pp. 411–412.10.1109/COMSNETS.2017.7945418
]Search in Google Scholar
[
[29] J. Habibi, D. Midi, A. Mudgerikar, and E. Bertino, “Heimdall: Mitigating the internet of insecure things,” IEEE Internet of Things Journal, vol. 4, no. 4, pp. 968–978, 2017.10.1109/JIOT.2017.2704093
]Search in Google Scholar
[
[30] E. Lastdrager, C. Hesselman, J. Jansen, and M. Davids, “Protecting home networks from insecure IoT devices,” in NOMS 2020, 2020, pp. 1–6.10.1109/NOMS47738.2020.9110419
]Search in Google Scholar
[
[31] ShieldIOT, https://shieldiot.io/, [Online; accessed Nov. 2020].
]Search in Google Scholar
[
[32] Fingbox, https://www.fing.com/, [Online; accessed Nov. 2020].
]Search in Google Scholar
[
[33] Bitdefender, https://www.bitdefender.com/iot/, [Online; accessed Nov. 2020].
]Search in Google Scholar
[
[34] D. Y. Huang, N. Apthorpe, F. Li, G. Acar, and N. Feamster, “IoT inspector: Crowdsourcing labeled network traffic from smart home devices at scale,” Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., vol. 4, no. 2, Jun. 2020.10.1145/3397333
]Search in Google Scholar
[
[35] N. Apthorpe, D. Reisman, and N. Feamster, “A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic,” DAT’16, 2016. [Online]. Available: http://arxiv.org/abs/1705.06805
]Search in Google Scholar
[
[36] H. Tahaei, F. Afifi, A. Asemi, F. Zaki, and N. B. Anuar, “The rise of traffic classification in IoT networks: A survey,” Journal of Network and Computer Applications, vol. 154, p. 102538, 2020. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S108480452030012610.1016/j.jnca.2020.102538
]Search in Google Scholar
[
[37] Y. Meidan, M. Bohadana, A. Shabtai, J. D. Guarnizo, M. Ochoa, N. O. Tippenhauer, and Y. Elovici, “ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis,” in SAC ’17, 2017, pp. 506–509. [Online]. Available: https://doi.org/10.1145/3019612.301987810.1145/3019612.3019878
]Search in Google Scholar
[
[38] M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A. Sadeghi, and S. Tarkoma, “IoT SENTINEL: Automated device-type identification for security enforcement in IoT,” in ICDCS’17, 2017, pp. 2177–2184.10.1109/ICDCS.2017.283
]Search in Google Scholar
[
[39] I. Hafeez, M. Antikainen, A. Y. Ding, and S. Tarkoma, “IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge,” IEEE Transactions on Network and Service Management, vol. 17, no. 1, pp. 45–59, 2020.10.1109/TNSM.2020.2966951
]Search in Google Scholar
[
[40] N. Apthorpe, D. Y. Huang, D. Reisman, A. Narayanan, and N. Feamster, “Keeping the smart home private with smart(er) IoT traffic shaping,” PETS, vol. 2019, no. 3, pp. 128 – 148, 2019. [Online]. Available: https://content.sciendo.com/view/journals/popets/2019/3/article-p128.xml10.2478/popets-2019-0040
]Search in Google Scholar
[
[41] A. Alshehri, J. Granley, and C. Yue, “Attacking and protecting tunneled traffic of smart home devices,” in CODASPY ’20, 2020, p. 259–270.10.1145/3374664.3375723
]Search in Google Scholar