J. Grier, Detecting data theft using stochastic forensics. digital investigation, vol.8, pp.71-77, 2011.

J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, Internet of things (iot): A vision, architectural elements, and future directions, Future generation computer systems, vol.29, issue.7, pp.1645-1660, 2013.

M. Guri, M. Monitz, and Y. Elovici, Usbee: air-gap covert-channel via electromagnetic emission from usb, Privacy, Security and Trust (PST), 2016 14th Annual Conference on, pp.264-268, 2016.

P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall, These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications, Proceedings of the 18th ACM conference on Computer and communications security, pp.639-652, 2011.

C. L. Hsu and J. C. Lin, An empirical examination of consumer adoption of internet of things services: Network externalities and concern for information privacy perspectives, Computers in Human Behavior, vol.62, pp.516-527, 2016.

Y. Hu, C. Frank, J. Walden, E. Crawford, and D. Kasturiratna, Profiling file repository access patterns for identifying data exfiltration activities, Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, pp.122-128, 2011.

S. Hwang, S. Lee, Y. Kim, and S. Ryu, Bittersweet adb: Attacks and defenses, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp.579-584, 2015.

N. Kobeissi, K. Bhargavan, and B. Blanchet, Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach, 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), pp.435-450, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01575923

B. Lau, Y. Jang, C. Song, T. Wang, P. H. Chung et al., Mactans: Injecting malware into ios devices via malicious chargers, 2013.

J. Lindsay,

F. ;. Liu, J. Jones, and N. S. Bradley, Windows malware attempts to infect android devices, Json web token (jwt), 2014.

A. Nordrum, Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is Outdated, 2016.

P. Sharma, A. Joshi, and T. Finin, Detecting data exfiltration by integrating information across layers, Information Reuse and Integration (IRI), pp.309-316, 2013.

R. Spolaor, L. Abudahi, V. Moonsamy, M. Conti, and R. Poovendran, No free charge theorem: A covert channel via usb charging cable on mobile devices, International Conference on Applied Cryptography and Network Security, pp.83-102, 2017.

D. J. Tian, A. Bates, and K. Butler, Defending against malicious usb firmware with goodusb, Proceedings of the 31st Annual Computer Security Applications Conference, pp.261-270, 2015.

Z. Wang, R. Johnson, R. Murmuria, and A. Stavrou, Exposing security risks for commercial mobile devices, International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, pp.3-21, 2012.