Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243865
|View full text |Cite
|
Sign up to set email alerts
|

On the Safety of IoT Device Physical Interaction Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
110
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 139 publications
(113 citation statements)
references
References 12 publications
0
110
0
Order By: Relevance
“…Our key observation is that for a system of apps to reach an unsafe configuration, a cross-app interaction should either lead to an inconsistent state that violates the intended specification for some apps, or engage in an interaction where the action of one app triggers the execution of another app. This is supported by the intuition, as well as existing real-world vulnerabilities [12], [14], [15], [17], [36], that an end user may consider a system of IoT apps as safe if the runtime behavior of an app in isolation is bisimilar to running that app in parallel with other apps in the system. Drawing on Focardi and Martinelli's Generalized Non Deducibility on Composition [21], we formalize this intuition to provide a bisimulationbased characterization of safe cross-app interaction.…”
Section: Introductionmentioning
confidence: 92%
See 3 more Smart Citations
“…Our key observation is that for a system of apps to reach an unsafe configuration, a cross-app interaction should either lead to an inconsistent state that violates the intended specification for some apps, or engage in an interaction where the action of one app triggers the execution of another app. This is supported by the intuition, as well as existing real-world vulnerabilities [12], [14], [15], [17], [36], that an end user may consider a system of IoT apps as safe if the runtime behavior of an app in isolation is bisimilar to running that app in parallel with other apps in the system. Drawing on Focardi and Martinelli's Generalized Non Deducibility on Composition [21], we formalize this intuition to provide a bisimulationbased characterization of safe cross-app interaction.…”
Section: Introductionmentioning
confidence: 92%
“…Celik et al [12], [14] propose static and dynamic enforcement mechanisms for unveiling cross-app interference vulnerabilities. Ding et al [17] propose a framework that combines device physical channel analysis and static analysis to generate all potential interaction chains among applications in an IoT environment. They leverage natural language processing to identify services that have similar semantics, and propose a risk-based approach to classify the actual risks of the discovered interaction chains.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…e.g., unlocking doors when users are not at home, or creating unsafe or damaging conditions by turning off the heat at winter. Recently, it has been shown that the interactions between devices are an increasing cause of safety and security violations [11], [12], [14], [39]. In practice, IoT apps interact through a common device or some common abstract event (such as the home, away or sleeping modes) when they are co-installed in an environment.…”
Section: Introductionmentioning
confidence: 99%