Blog
About

226
views
0
recommends
+1 Recommend
1 collections
    8
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      On Synthesis of Runtime Security Monitor for Real-time IoT Applications

      , ,

      6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR)

      Cyber Security Research

      10th-12th September 2019

      Runtime assurance, smart home, energy management, computational attacks, data integrity attacks, communication attacks

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We report on the evaluation of an efficient and scalable verification method that assures runtime security of real-time Internet of Things (IoT) applications with strict performance requirements. Modeling known threats at abstract but practical level is key to assure security of efficient and scalable IoT applications. To this end, the method classifies set of known attacks into computational, data integrity and communication attacks. Then, each attack class is decomposed into declarative properties and definitive properties. A declarative property specifies an attack as a single big-step relation between initial and final state by ignoring intermediate states, while a definitive property specifies an attack as a sequence of numerous small-step relations considering all intermediate states between initial and final state. Finally, the declarative properties are translated into runtime security monitor that assures protection of the application execution against known threats without defying runtime application’s performance requirements. in particular, we evaluate the methodology through its application to an energy management application of smart home.

          Related collections

          Most cited references 5

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            A rigorous and efficient run-time security monitor for real-time critical embedded system applications

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Ur/Web

               Adam Chlipala (2016)
                Bookmark

                Author and article information

                Contributors
                Conference
                September 2019
                September 2019
                : 82-88
                Affiliations
                School of Computing and Mathematical Sciences

                University of Greenwich, London, UK
                Industrial Systems Institute, RC-ATHENA and ECE, University of Patras, Patras, Greece
                CSAIL, MIT

                Cambridge, USA
                Article
                10.14236/ewic/icscsr19.11
                © Muhammad Taimoor Khan et al. Published by BCS Learning and Development Ltd. 6th International Symposium for ICS & SCADA Cyber Security Research 2019

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                6th International Symposium for ICS & SCADA Cyber Security Research 2019
                ICS-CSR
                6
                Athens, Greece
                10th-12th September 2019
                Electronic Workshops in Computing (eWiC)
                Cyber Security Research
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article