1,488
views
0
recommends
+1 Recommend
1 collections
    8
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      On Synthesis of Runtime Security Monitor for Real-time IoT Applications

      proceedings-article
      , ,
      6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR)
      Cyber Security Research
      10th-12th September 2019
      Runtime assurance, smart home, energy management, computational attacks, data integrity attacks, communication attacks
      Bookmark

            Abstract

            We report on the evaluation of an efficient and scalable verification method that assures runtime security of real-time Internet of Things (IoT) applications with strict performance requirements. Modeling known threats at abstract but practical level is key to assure security of efficient and scalable IoT applications. To this end, the method classifies set of known attacks into computational , data integrity and communication attacks. Then, each attack class is decomposed into declarative properties and definitive properties . A declarative property specifies an attack as a single big-step relation between initial and final state by ignoring intermediate states, while a definitive property specifies an attack as a sequence of numerous small-step relations considering all intermediate states between initial and final state. Finally, the declarative properties are translated into runtime security monitor that assures protection of the application execution against known threats without defying runtime application’s performance requirements. in particular, we evaluate the methodology through its application to an energy management application of smart home.

            Content

            Author and article information

            Contributors
            Conference
            September 2019
            September 2019
            : 82-88
            Affiliations
            [0001]School of Computing and Mathematical Sciences

            University of Greenwich, London, UK
            [0002]Industrial Systems Institute, RC-ATHENA and ECE, University of Patras, Patras, Greece
            [0003]CSAIL, MIT

            Cambridge, USA
            Article
            10.14236/ewic/icscsr19.11
            f5e6bc26-50cd-4611-b804-24b689a3f543
            © Muhammad Taimoor Khan et al. Published by BCS Learning and Development Ltd. 6th International Symposium for ICS & SCADA Cyber Security Research 2019

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            6th International Symposium for ICS & SCADA Cyber Security Research 2019
            ICS-CSR
            6
            Athens, Greece
            10th-12th September 2019
            Electronic Workshops in Computing (eWiC)
            Cyber Security Research
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/icscsr19.11
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            communication attacks,Runtime assurance,smart home,energy management,computational attacks,data integrity attacks

            REFERENCES

            1. 2018 Homonit: Monitoring smart home apps from encrypted traffic Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, ser CCS ’18 New York, USA: ACM 1074 1088

            2. 2017 Axiom: Dtls-based secure iot group communication ACM Trans. Embed. Comput. Syst. 16 3 66 1 66 29

            3. 2018 Smart home energy management system: An exploration of iot use cases Advances in Science and Engineering Technology International Conferences (ASET) 1 5

            4. 2016 A rigorous and efficient run-time security monitor for real-time critical embedded system applications IEEE 3rd World Forum on Internet of Things (WFIoT) 100 105

            5. 2017 A survey of runtime monitoring instrumentation techniques

            6. 2011 Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system IEEE 13th International Conference on e-Health Networking, Applications and Services 150 156

            7. CAPEC Online 2019 Available: https://capec.mitre.org

            8. 2016 Ur/web: A simple model for programming the web Commun. ACM 59 8 93 100

            9. 2018 CompCert: Practical Experience on Integrating and Qualifying a Formally Verified Optimizing Compiler ERTS2 2018 - Embedded Real Time Software and Systems Toulouse, France

            10. 2016 End-to-end verification of arm processors with isa-formal Cham: Springer International Publishing 42 58

            11. 2018 Armet: Behavior-based secure and resilient industrial control systems Proceedings of the IEEE 106 1 129 143

            12. 2019 Runtime protection of real-time critical control applications against known threats IEEE Design & Test no. In Review

            13. 2015 Fiat: Deductive synthesis of abstract data types in a proof assistant Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages POPL, Mumbai, India 689 700

            Comments

            Comment on this article