Scalable Analysis of Interaction Threats in IoT Systems

被引:42
作者
Alhanahnah, Mohannad [1 ,2 ]
Stevens, Clay [1 ]
Bagheri, Hamid [1 ]
机构
[1] Univ Nebraska, Comp Sci & Engn, Lincoln, NE 68583 USA
[2] Univ Wisconsin, Madison, WI 53706 USA
来源
PROCEEDINGS OF THE 29TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2020 | 2020年
基金
美国国家科学基金会;
关键词
Interaction Threats; IoT Safety; Formal Verification; SECURITY;
D O I
10.1145/3395363.3397347
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The ubiquity of Internet of Things (IoT) and our growing reliance on IoT apps are leaving us more vulnerable to safety and security threats than ever before. Many of these threats are manifested at the interaction level, where undesired or malicious coordinations between apps and physical devices can lead to intricate safety and security issues. This paper presents IotCom, an approach to automatically discover such hidden and unsafe interaction threats in a compositional and scalable fashion. It is backed with automated program analysis and formally rigorous violation detection engines. IotCom relies on program analysis to automatically infer the relevant app's behavior. Leveraging a novel strategy to trim the extracted app's behavior prior to translating them to analyzable formal specifications, IotCom mitigates the state explosion associated with formal analysis. Our experiments with numerous bundles of real-world IoT apps have corroborated IotCom's ability to effectively detect a broad spectrum of interaction threats triggered through cyber and physical channels, many of which were previously unknown, and to significantly outperform the existing techniques in terms of scalability.
引用
收藏
页码:272 / 285
页数:14
相关论文
共 63 条
[41]   Static analysis of android apps: A systematic literature review [J].
Li, Li ;
Bissyande, Tegawende F. ;
Papadakis, Mike ;
Rasthofer, Siegfried ;
Bartel, Alexandre ;
Octeau, Damien ;
Klein, Jacques ;
Traon, Le .
INFORMATION AND SOFTWARE TECHNOLOGY, 2017, 88 :67-95
[42]   Systematically Debugging IoT Control System Correctness for Building Automation [J].
Liang, Chieh-Jan Mike ;
Bu, Lei ;
Li, Zhao ;
Zhang, Junbei ;
Han, Shi ;
Karlsson, Borje F. ;
Zhang, Dongmei ;
Zhao, Feng .
BUILDSYS'16: PROCEEDINGS OF THE 3RD ACM CONFERENCE ON SYSTEMS FOR ENERGY-EFFCIENT BUILT ENVIRONMENTS, 2016, :133-142
[43]   Modeling and Testing a Family of Surgical Robots: An Experience Report [J].
Mansoor, Niloofar ;
Saddler, Jonathan A. ;
Silva, Bruno ;
Bagheri, Hamid ;
Cohen, Myra B. ;
Farritor, Shane .
ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2018, :785-790
[44]  
microsoftFlow, 2020, microsoftFlow
[45]  
Myers EugeneM., 1981, P 8 ACM SIGPLAN SIGA, P219
[46]   IOTA: A Calculus for Internet of Things Automation [J].
Newcomb, Julie L. ;
Chandra, Satish ;
Jeannin, Jean-Baptiste ;
Schlesinger, Cole ;
Sridharan, Manu .
PROCEEDINGS OF THE 2017 ACM SIGPLAN INTERNATIONAL SYMPOSIUM ON NEW IDEAS, NEW PARADIGMS, AND REFLECTIONS ON PROGRAMMING AND SOFTWARE (ONWARD!'17), 2017, :119-133
[47]   Tyche: A Risk-Based Permission Model for Smart Homes [J].
Rahmati, Amir ;
Fernandes, Earfence ;
Eykholt, Kevin ;
Prakash, Atul .
2018 IEEE CYBERSECURITY DEVELOPMENT CONFERENCE (SECDEV 2018), 2018, :29-36
[48]  
SmartThings, 2018, SmartThings Classic Documentation
[49]  
SmartThings capabilities reference, 2018, SmartThings Classic capabilities reference
[50]  
smartthings github, 2018, SmartThings Community repository