%PDF-1.7
%
1 0 obj
<>stream
application/pdfIEEEIEEE Security & Privacy;2019;17;5;10.1109/MSEC.2019.2914190Securing IoT AppsMusard BalliuIulia BastysAndrei Sabelfeld
IEEE Security & Privacy22 Sept.-Oct. 201951710.1109/MSEC.2019.291419029
endstream
endobj
2 0 obj
<>
endobj
3 0 obj
<>stream
HTyPwnDhl3=*D*P "79g@QhES[d5A]Cy uT"rHnf
[۸I[~}_hֆi9:,&L=kve֠K&E-X4:A糣q.
M.-̠RT~Aރq4|U2rҴ"AWsss5mjʕUZ6PJFCӫ4*C&CT,WEsEZլH&;crNJ'aiz]NS-)XyJiCqB(*l$,ʡ(E":@Q #_:N?һNm>`+fZlclO6ھ2ld׳Ul%q!{cd]ϐeC~lmqCmqpqcw;?/wOܜ>u:5?lϰΔx·]\]\T4rytm{C~-Y}#Lga*TmLoxXAL
?6晭>fV65Ԟv\jBbjr¤[J
B"kXު#a YEI\c9az]3%yR3`cs*!<aåaw. >7aD!6ǂr>!Arܰk*J8ɮ>IĭMZDI̕F?kagU-~
}=hd@Pu`˯6F0"ygrD@ׯϏ
<3 S0%3=k0R 2So}'9 6uȮ
MfENi'U 0x{""aSE36HReuawʋS#zvՃ')%]J'{.}LqgG'_67w" yi]qwrQAWoY{p_YvbQR^m4<~ʐrW