Scalable Analysis of Interaction Threats in IoT Systems

被引:41
作者
Alhanahnah, Mohannad [1 ,2 ]
Stevens, Clay [1 ]
Bagheri, Hamid [1 ]
机构
[1] Univ Nebraska, Comp Sci & Engn, Lincoln, NE 68583 USA
[2] Univ Wisconsin, Madison, WI 53706 USA
来源
PROCEEDINGS OF THE 29TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2020 | 2020年
基金
美国国家科学基金会;
关键词
Interaction Threats; IoT Safety; Formal Verification; SECURITY;
D O I
10.1145/3395363.3397347
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The ubiquity of Internet of Things (IoT) and our growing reliance on IoT apps are leaving us more vulnerable to safety and security threats than ever before. Many of these threats are manifested at the interaction level, where undesired or malicious coordinations between apps and physical devices can lead to intricate safety and security issues. This paper presents IotCom, an approach to automatically discover such hidden and unsafe interaction threats in a compositional and scalable fashion. It is backed with automated program analysis and formally rigorous violation detection engines. IotCom relies on program analysis to automatically infer the relevant app's behavior. Leveraging a novel strategy to trim the extracted app's behavior prior to translating them to analyzable formal specifications, IotCom mitigates the state explosion associated with formal analysis. Our experiments with numerous bundles of real-world IoT apps have corroborated IotCom's ability to effectively detect a broad spectrum of interaction threats triggered through cyber and physical channels, many of which were previously unknown, and to significantly outperform the existing techniques in terms of scalability.
引用
收藏
页码:272 / 285
页数:14
相关论文
共 63 条
[1]  
Acar A, 2020, Arxiv, DOI arXiv:1808.02741
[2]  
Agadakos I., 2017, P 2017 WORKSHOP CYBE, P37, DOI DOI 10.1145/3140241.3140252
[3]   Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes [J].
Ali, Bako ;
Awad, Ali Ismail .
SENSORS, 2018, 18 (03)
[4]  
[Anonymous], 2019, IFTTT applet: If i arrive at my house then open my garage door
[5]  
Apple Homekit, 2018, Apple HomeKit
[6]  
Apthorpe N., 2017, arXiv
[7]  
Bagheri Hamid, 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Proceedings, P514, DOI 10.1109/DSN.2016.53
[8]   A formal approach for detection of security flaws in the android permission system [J].
Bagheri, Hamid ;
Kang, Eunsuk ;
Malek, Sam ;
Jackson, Daniel .
FORMAL ASPECTS OF COMPUTING, 2018, 30 (05) :525-544
[9]   Automated Synthesis and Dynamic Analysis of Tradeoff Spaces for Object-Relational Mapping [J].
Bagheri, Hamid ;
Tang, Chong ;
Sullivan, Kevin .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2017, 43 (02) :145-163
[10]   TradeMaker: Automated Dynamic Analysis of Synthesized Tradespaces [J].
Bagheri, Hamid ;
Tang, Chong ;
Sullivan, Kevin .
36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, :106-116