Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Software-Based Security Framework for Edge and Mobile IoT
ACM SIGAda Ada Letters (SIGADA), Volume 44, Issue 1Pages 95–99https://doi.org/10.1145/3706601.3706618With the proliferation of Internet of Things (IoT) devices, ensuring secure communications has become imperative. Due to their low cost and embedded nature, many of these devices operate with computational and energy constraints, neglecting the potential ...
- short-paperNovember 2023
SweetCam: an IP Camera Honeypot
CPSIoTSec '23: Proceedings of the 5th Workshop on CPS&IoT Security and PrivacyPages 75–81https://doi.org/10.1145/3605758.3623495The utilization of the Internet of Things (IoT) as an attack surface is nowadays a fact. Taking IP cameras as a use-case, they have been targeted to a great extent mainly due to the absence of authentication, the utilization of weak, in terms of security,...
- research-articleNovember 2023
Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI
CPSIoTSec '23: Proceedings of the 5th Workshop on CPS&IoT Security and PrivacyPages 1–9https://doi.org/10.1145/3605758.3623493With the growth of Internet of Things devices, the number and complexity of these devices are increasing rapidly. Nevertheless, many IoT products are developed without sufficient consideration for security, leaving them vulnerable to exploitation by ...
- research-articleNovember 2023
IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 681–695https://doi.org/10.1145/3576915.3623211The number of "smart'' devices, that is, devices making up the Internet of Things (IoT), is steadily growing. They suffer from vulnerabilities just as other software and hardware. Automated analysis techniques can detect and address weaknesses before ...
- articleOctober 2023
Software-Based Security Approach for Networked Embedded Devices
ACM SIGAda Ada Letters (SIGADA), Volume 43, Issue 1Pages 73–77https://doi.org/10.1145/3631483.3631495As the Internet of Things (IoT) continues to expand, data security has become increasingly important for ensuring privacy and safety, especially given the sensitive and, sometimes, critical nature of the data handled by IoT devices. There exist hardware-...
-
- research-articleJune 2023
Machine Learning for Intrusion Detection: Stream Classification Guided by Clustering for Sustainable Security in IoT
GLSVLSI '23: Proceedings of the Great Lakes Symposium on VLSI 2023Pages 691–696https://doi.org/10.1145/3583781.3590271The Internet of Things (IoT) has brought about unprecedented connectivity and convenience in our daily lives, but with this newfound interconnectedness comes the threat of cyber-attacks. With ever-increasing IoT devices being connected to the internet, ...
- short-paperApril 2023
All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms
CODASPY '23: Proceedings of the Thirteenth ACM Conference on Data and Application Security and PrivacyPages 245–250https://doi.org/10.1145/3577923.3583636IoT devices have become an integral part of our day to day activities, and are also being deployed to fulfil a number of industrial, enterprise and agricultural use cases. To efficiently manage and operate these devices, the IoT ecosystem relies on ...
- research-articleNovember 2022
Understanding IoT Security from a Market-Scale Perspective
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 1615–1629https://doi.org/10.1145/3548606.3560640Consumer IoT products and services are ubiquitous; yet, a proper characterization of consumer IoT security is infeasible without an understanding of what IoT products are on the market, i.e., without a market-scale perspective. This paper seeks to close ...
- research-articleMay 2022
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications SecurityPages 521–533https://doi.org/10.1145/3488932.3517410Many IoT devices today talk to each other via Bluetooth Low Energy (BLE), a wireless communication technology often used to exchange data between a paired central and peripheral. These peripheral devices include not only firmware-defined bare-metal ...
- abstractMay 2022
CPSS '22: 8th ACM Cyber-Physical System Security Workshop
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications SecurityPages 1265–1266https://doi.org/10.1145/3488932.3517202Cyber-Physical Systems (CPS) consist of large-scale interconnected systems of heterogeneous components interacting with their physical environments. There exist a multitude of CPS devices and applications deployed to serve critical functions in our ...
- posterMay 2022
MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions
WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 290–291https://doi.org/10.1145/3507657.3529656Authenticating Internet of Things (IoT) devices is still a defiant task, despite the remarkable technological advancement achieved in the last few years. The issue is especially challenging in scenarios involving low-cost constrained nodes, hardly ...
- keynoteNovember 2021
Internet of Things (IoT) Security and Forensics: Challenges and Opportunities
CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and PrivacyPages 27–28https://doi.org/10.1145/3462633.3484691Internet of Things (IoT) devices are increasingly found around, in, and on us (e.g., smart home and other consumer devices) in applications ranging from environmental monitoring to healthcare (e.g., healthcare or medical IoT devices) to surveillance to ...
- research-articleNovember 2021
CapSpeaker: Injecting Voices to Microphones via Capacitors
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 1915–1929https://doi.org/10.1145/3460120.3485389Voice assistants can be manipulated by various malicious voice commands, yet existing attacks require a nearby speaker to play the attack commands. In this paper, we show that even when no speakers are available, we can play malicious commands by ...
- research-articleMay 2019
Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms
SACMAT '19: Proceedings of the 24th ACM Symposium on Access Control Models and TechnologiesPages 61–72https://doi.org/10.1145/3322431.3325107This paper focuses on developing a security mechanism geared towards appified smart-home platforms. Such platforms often expose programming interfaces for developing automation apps that mechanize different tasks among smart sensors and actuators (e.g., ...
- abstractFebruary 2019
Using Raspberry Pi as a Platform for Teaching Cybersecurity Concepts
SIGCSE '19: Proceedings of the 50th ACM Technical Symposium on Computer Science EducationPage 1237https://doi.org/10.1145/3287324.3287534This workshop aims to assist high school and college educators with implementing cybersecurity into their existing curriculum. The workshop will introduce Raspberry Pi as a teaching platform for topics such as network traffic analysis, cryptography and ...
- research-articleMay 2018
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems
- Chuadhry Mujeeb Ahmed,
- Martin Ochoa,
- Jianying Zhou,
- Aditya P. Mathur,
- Rizwan Qadeer,
- Carlos Murguia,
- Justin Ruths
ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications SecurityPages 483–497https://doi.org/10.1145/3196494.3196532An attack detection scheme is proposed to detect data integrity attacks on sensors in Cyber-Physical Systems (CPSs). A combined fingerprint for sensor and process noise is created during the normal operation of the system. Under sensor spoofing attack, ...
- short-paperMarch 2018
SPEED: Secure Provable Erasure for Class-1 IoT Devices
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 111–118https://doi.org/10.1145/3176258.3176337The Internet of Things (IoT) consists of embedded devices that sense and manage our environment in a growing range of applications. Large-scale IoT systems such as smart cities require significant investment in both equipment and personnel. To maximize ...
- research-articleJanuary 2018
VirtSense: Virtualize Sensing through ARM TrustZone on Internet-of-Things
SysTEX '18: Proceedings of the 3rd Workshop on System Software for Trusted ExecutionPages 2–7https://doi.org/10.1145/3268935.3268937Internet-of-Things (IoTs) are becoming more and more popular in our life. IoT devices are generally designed for sensing or actuation purposes. However, the current sensing system on IoT devices lacks the understanding of sensing needs, which diminishes ...
- posterNovember 2017
Keep Pies Away from Kids: A Raspberry Pi Attacking Tool
IoTS&P '17: Proceedings of the 2017 Workshop on Internet of Things Security and PrivacyPages 61–62https://doi.org/10.1145/3139937.3139953The focus of this short paper has been to use a Raspberry Pi device to perform certain network attacks and exploit vulnerabilities in existing systems. To this end, we developed a new attack tool that can be installed on a Raspberry Pi and allows novice ...
- research-articleNovember 2017
A Secure Event Logging System for Smart Homes
IoTS&P '17: Proceedings of the 2017 Workshop on Internet of Things Security and PrivacyPages 37–42https://doi.org/10.1145/3139937.3139945Smart homes include hundreds of devices that generate messages, and communicate with each other and the world outside the home, to provide a highly functional, optimized and personalized environment for residents. A secure and reliable event logging ...