ABSTRACT
The growth of commodity IoT devices that integrate physical processes with digital systems have changed the way we live, play, and work. Yet existing IoT platforms cannot help programmers evaluate whether their IoT applications are safe and secure, nor do these platforms help programmers build secure and reliable applications. In this talk, we discuss several pieces of work that help programmers build secure and reliable IoT applications. We first discuss our work of using static model checking and dynamic analysis to find violations of safety and functional properties in an IoT app or a collection of apps, according to a set of desired properties. We then discuss our recent effort of developing a framework for handling device faults in IoT applications. The framework provides a set of fault-handling primitives such as retry and restart, which programmers can utilize to handle device faults systematically to improve their applications' reliability. This is joint work with Z. Berkay Celik, Patrick McDaniel, Michael Norris, Anand Sivasubramaniam, Prasanna Venkatesh, and Shulin Zhao.
- Z. B. Celik, E. Fernandes, E. Pauley, G. Tan, and P. McDaniel. 2019. Program Analysis of Commodity IoT Applications for Security and Privacy: Opportunities and Challenges. In ACM Computing Surveys (CSUR).Google Scholar
- Z. B. Celik, P. McDaniel, and G. Tan. 2018. Soteria: Automated IoT Safety and Security Analysis. In USENIX Annual Technical Conference (ATC).Google Scholar
- Z. B. Celik, L. Babun, A. K. Sikder, H. Aksu, G. Tan, P. McDaniel, and S. Uluagac. 2018. Sensitive Information Tracking in Commodity IoT. In USENIX Security Symposium.Google Scholar
- Z. B. Celik, G. Tan, and P. McDaniel. 2019. Soteria: IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. In Network and Distributed System Security Symposium (NDSS).Google Scholar
- Z. B. Celik, P. McDaniel, G. Tan, L. Babun, and S. Uluagac. 2019. Verifying Internet of Things Safety and Security in Physical Spaces. In IEEE Security and Privacy Magazine, Vol 17, Issue 5.Google Scholar
Index Terms
- Towards Secure and Reliable IoT Applications
Recommendations
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities
Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive—new applications are being used in nearly every conceivable environment, which ...
Internet of Things Integrated with Multi-level Authentication for Secured IoT Data Stream Through TLS/SSL Layer
Big-Data-Analytics in Astronomy, Science, and EngineeringAbstractWith the advancement in recent technology, the world is connected to multiple devices or peripherals through the Internet of things (IoT). Therefore, there is a need for proper configuration with the required authentication and secured data is ...
Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityAs many types of IoT devices worm their way into numerous settings and many aspects of our daily lives, awareness of their presence and functionality becomes a source of major concern. Hidden IoT devices can snoop (via sensing) on nearby unsuspecting ...
Comments