Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities

被引:71
作者
Celik, Z. Berkay [1 ,3 ]
Fernandes, Earlence [2 ,4 ]
Pauley, Eric [1 ,5 ]
Tan, Gang [1 ,5 ]
Mcdaniel, Patrick [1 ,5 ]
机构
[1] Penn State Univ, University Pk, PA 16802 USA
[2] Univ Washington, Seattle, WA 98195 USA
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[4] Univ Wisconsin Madison, Dept Comp Sci, Madison, WI 53706 USA
[5] Penn State Univ Penn State, Dept Comp Sci & Engn, State Coll, PA 16802 USA
基金
美国国家科学基金会;
关键词
IoT security and privacy; IoT programming platforms; program analysis; INTERNET; THINGS;
D O I
10.1145/3333501
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive-new applications are being used in nearly every conceivable environment, which leads to the adoption of device-based interaction and automation. However, IoT has also raised issues about the security and privacy of these digitally augmented spaces. Program analysis is crucial in identifying those issues, yet the application and scope of program analysis in IoT remains largely unexplored by the technical community. In this article, we study privacy and security issues in IoT that require program-analysis techniques with an emphasis on identified attacks against these systems and defenses implemented so far. Based on a study of five IoT programming platforms, we identify the key insights that result from research efforts in both the program analysis and security communities and relate the efficacy of program-analysis techniques to security and privacy issues. We conclude by studying recent IoT analysis systems and exploring their implementations. Through these explorations, we highlight key challenges and opportunities in calibrating for the environments in which IoT systems will be used.
引用
收藏
页数:30
相关论文
共 83 条
  • [1] Acar Abbas, 2018, 180802741 ARXIV
  • [2] Aho A.V., 2006, Compilers: Principles, Techniques, & Tools
  • [3] Alrawi O., 2019, IEEE S SEC PRIV SP 1
  • [4] [Anonymous], 2018, ARXIV180900745
  • [5] [Anonymous], 2015, P 2 IEEE WORLD FOR I
  • [6] [Anonymous], 2010, P IEEE S SEC PRIV S
  • [7] Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
  • [8] Babun Leonardo, 2018, P USENIX SEC S
  • [9] A Survey of Symbolic Execution Techniques
    Baldoni, Roberto
    Coppa, Emilio
    D'Elia, Daniele Cono
    Demetrescu, Camil
    Finocchi, Irene
    [J]. ACM COMPUTING SURVEYS, 2018, 51 (03) : 1 - 39
  • [10] Bartel Alexandre, 2012, P ACM SIGPLAN WORKSH