Proceedings 2019 Network and Distributed System Security Symposium 2019
DOI: 10.14722/ndss.2019.23326
|View full text |Cite
|
Sign up to set email alerts
|

IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT

Abstract: Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has changed the way we live, play, and work. To date, the traditional approach to securing IoT has treated devices individually. However, in practice, it has been recently shown that the interactions among devices are often the real cause of safety and security violations. In this paper, we present IOTGUARD, a dynamic, policy-based enforcement system for IoT, which protec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
140
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 182 publications
(143 citation statements)
references
References 18 publications
0
140
0
Order By: Relevance
“…Our key observation is that for a system of apps to reach an unsafe configuration, a cross-app interaction should either lead to an inconsistent state that violates the intended specification for some apps, or engage in an interaction where the action of one app triggers the execution of another app. This is supported by the intuition, as well as existing real-world vulnerabilities [12], [14], [15], [17], [36], that an end user may consider a system of IoT apps as safe if the runtime behavior of an app in isolation is bisimilar to running that app in parallel with other apps in the system. Drawing on Focardi and Martinelli's Generalized Non Deducibility on Composition [21], we formalize this intuition to provide a bisimulationbased characterization of safe cross-app interaction.…”
Section: Introductionmentioning
confidence: 92%
See 3 more Smart Citations
“…Our key observation is that for a system of apps to reach an unsafe configuration, a cross-app interaction should either lead to an inconsistent state that violates the intended specification for some apps, or engage in an interaction where the action of one app triggers the execution of another app. This is supported by the intuition, as well as existing real-world vulnerabilities [12], [14], [15], [17], [36], that an end user may consider a system of IoT apps as safe if the runtime behavior of an app in isolation is bisimilar to running that app in parallel with other apps in the system. Drawing on Focardi and Martinelli's Generalized Non Deducibility on Composition [21], we formalize this intuition to provide a bisimulationbased characterization of safe cross-app interaction.…”
Section: Introductionmentioning
confidence: 92%
“…Surbatovich et al [36] study a dataset of 20K IFTTT applets and provide an empirical evaluation of potential secrecy and integrity violations, including violations due to crossapp interactions. Celik et al [12], [14] propose static and dynamic enforcement mechanisms for unveiling cross-app interference vulnerabilities. Ding et al [17] propose a framework that combines device physical channel analysis and static analysis to generate all potential interaction chains among applications in an IoT environment.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Recent research [10], [16], [17], [25], [26], [34], [58] identifies ways to leak private information by malicious IoT apps and suggests information flow tracking as countermeasure. The suggested mechanisms perform data-flow (explicit [30]) and control-flow (implicit [30]) tracking.…”
Section: Introductionmentioning
confidence: 99%