首页 > 最新文献

Proceedings of the 2018 Workshop on IoT Security and Privacy最新文献

英文 中文
Blockchain‐Based Cyber Physical Trust Systems 基于区块链的网络物理信任系统
Pub Date : 2019-12-13 DOI: 10.1002/9781119527978.ch14
A. Beckmann, Alexander J. M. Milne, J. Razafindrakoto, Pardeep Kumar, Michael Breach, N. Preining
Cyber Physical Trust Systems (CPTS) are Cyber Physical Systems and Internet of Things enriched with trust as an explicit, measurable, testable system component. In this chapter, we propose to use blockchain technology as the trust enabling system component for CPTS. Our proposed approach shows that a blockchain based CPTS achieves the security properties of data authenticity, identity and integrity. We describe results of a testbed which implements a blockchain based CPTS for physical asset management. extend the testbed into a generic application for supporting Cyber Physical Trust Systems, and conduct in depth performance analysis ranging from theoretical ones based on theoretical performance assumptions of blockchain technology, to practical ones in relation to an enhanced testbed implementation. We will also explore other application domains, in which Cyber Physical Trust Systems can be applied.
网络物理信任系统(CPTS)是网络物理系统和物联网,作为一个明确的、可测量的、可测试的系统组件。在本章中,我们建议使用区块链技术作为CPTS的信任启用系统组件。我们提出的方法表明,基于区块链的CPTS实现了数据真实性、身份性和完整性的安全特性。我们描述了一个测试平台的结果,该平台实现了基于区块链的物理资产管理CPTS。将测试平台扩展为支持网络物理信任系统的通用应用,并进行深入的性能分析,从基于区块链技术理论性能假设的理论分析到与增强测试平台实施相关的实际分析。我们还将探讨网络物理信任系统可以应用的其他应用领域。
{"title":"Blockchain‐Based Cyber Physical Trust Systems","authors":"A. Beckmann, Alexander J. M. Milne, J. Razafindrakoto, Pardeep Kumar, Michael Breach, N. Preining","doi":"10.1002/9781119527978.ch14","DOIUrl":"https://doi.org/10.1002/9781119527978.ch14","url":null,"abstract":"Cyber Physical Trust Systems (CPTS) are Cyber Physical Systems and Internet of Things enriched with trust as an explicit, measurable, testable system component. In this chapter, we propose to use blockchain technology as the trust enabling system component for CPTS. Our proposed approach shows that a blockchain based CPTS achieves the security properties of data authenticity, identity and integrity. We describe results of a testbed which implements a blockchain based CPTS for physical asset management. extend the testbed into a generic application for supporting Cyber Physical Trust Systems, and conduct in depth performance analysis ranging from theoretical ones based on theoretical performance assumptions of blockchain technology, to practical ones in relation to an enhanced testbed implementation. We will also explore other application domains, in which Cyber Physical Trust Systems can be applied.","PeriodicalId":20541,"journal":{"name":"Proceedings of the 2018 Workshop on IoT Security and Privacy","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84448021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Introduction to IoT 物联网简介
Pub Date : 2019-12-13 DOI: 10.1002/9781119527978.ch1
A. Kalla, Pawani Prombage, Madhusanka Liyanage
{"title":"Introduction to IoT","authors":"A. Kalla, Pawani Prombage, Madhusanka Liyanage","doi":"10.1002/9781119527978.ch1","DOIUrl":"https://doi.org/10.1002/9781119527978.ch1","url":null,"abstract":"","PeriodicalId":20541,"journal":{"name":"Proceedings of the 2018 Workshop on IoT Security and Privacy","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85831773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Index 指数
Pub Date : 2019-12-13 DOI: 10.1002/9781119527978.index
{"title":"Index","authors":"","doi":"10.1002/9781119527978.index","DOIUrl":"https://doi.org/10.1002/9781119527978.index","url":null,"abstract":"","PeriodicalId":20541,"journal":{"name":"Proceedings of the 2018 Workshop on IoT Security and Privacy","volume":"138 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85540510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation 一个开发人员友好的智能家居物联网隐私保护流量混淆库
Pub Date : 2018-08-07 DOI: 10.1145/3229565.3229567
T. Datta, Noah J. Apthorpe, N. Feamster
The number and variety of Internet-connected devices have grown enormously in the past few years, presenting new challenges to security and privacy. Research has shown that network adversaries can use traffic rate metadata from consumer IoT devices to infer sensitive user activities. Shaping traffic flows to fit distributions independent of user activities can protect privacy, but this approach has seen little adoption due to required developer effort and overhead bandwidth costs. Here, we present a Python library for IoT developers to easily integrate privacy-preserving traffic shaping into their products. The library replaces standard networking functions with versions that automatically obfuscate device traffic patterns through a combination of payload padding, fragmentation, and randomized cover traffic. Our library successfully preserves user privacy and requires approximately 4 KB/s overhead bandwidth for IoT devices with low send rates or high latency tolerances. This overhead is reasonable given normal Internet speeds in American homes and is an improvement on the bandwidth requirements of existing solutions.
在过去的几年里,联网设备的数量和种类都有了巨大的增长,对安全和隐私提出了新的挑战。研究表明,网络攻击者可以使用来自消费者物联网设备的流量速率元数据来推断敏感的用户活动。塑造流量流以适应独立于用户活动的发行版可以保护隐私,但由于需要开发人员的努力和额外的带宽成本,这种方法很少被采用。在这里,我们为物联网开发人员提供了一个Python库,可以轻松地将保护隐私的流量整形集成到他们的产品中。该库将标准的网络功能替换为通过有效负载填充、碎片和随机覆盖流量的组合自动混淆设备流量模式的版本。我们的库成功地保护了用户隐私,并且对于具有低发送速率或高延迟容限的物联网设备需要大约4 KB/s的开销带宽。考虑到美国家庭的正常网速,这种开销是合理的,而且是对现有解决方案带宽要求的改进。
{"title":"A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation","authors":"T. Datta, Noah J. Apthorpe, N. Feamster","doi":"10.1145/3229565.3229567","DOIUrl":"https://doi.org/10.1145/3229565.3229567","url":null,"abstract":"The number and variety of Internet-connected devices have grown enormously in the past few years, presenting new challenges to security and privacy. Research has shown that network adversaries can use traffic rate metadata from consumer IoT devices to infer sensitive user activities. Shaping traffic flows to fit distributions independent of user activities can protect privacy, but this approach has seen little adoption due to required developer effort and overhead bandwidth costs. Here, we present a Python library for IoT developers to easily integrate privacy-preserving traffic shaping into their products. The library replaces standard networking functions with versions that automatically obfuscate device traffic patterns through a combination of payload padding, fragmentation, and randomized cover traffic. Our library successfully preserves user privacy and requires approximately 4 KB/s overhead bandwidth for IoT devices with low send rates or high latency tolerances. This overhead is reasonable given normal Internet speeds in American homes and is an improvement on the bandwidth requirements of existing solutions.","PeriodicalId":20541,"journal":{"name":"Proceedings of the 2018 Workshop on IoT Security and Privacy","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85520617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
IP-Based IoT Device Detection 基于ip的物联网设备检测
Pub Date : 2018-08-07 DOI: 10.1145/3229565.3229572
Hang Guo, J. Heidemann
Recent IoT-based DDoS attacks have exposed how vulnerable the Internet can be to millions of insufficiently secured IoT devices. To understand the risks of these attacks requires learning about these IoT devices---where are they, how many are there, how are they changing? In this paper, we propose a new method to find IoT devices in Internet to begin to assess this threat. Our approach requires observations of flow-level network traffic and knowledge of servers run by the manufacturers of the IoT devices. We have developed our approach with 10 device models by 7 vendors and controlled experiments. We apply our algorithm to observations from 6 days of Internet traffic at a college campus and partial traffic from an IXP to detect IoT devices.
最近基于物联网的DDoS攻击暴露了互联网对数百万安全性不足的物联网设备的脆弱性。要了解这些攻击的风险,需要了解这些物联网设备——它们在哪里,有多少,它们是如何变化的?在本文中,我们提出了一种新的方法来寻找互联网中的物联网设备,从而开始评估这种威胁。我们的方法需要观察流量级网络流量以及物联网设备制造商运行的服务器的知识。我们已经用7家供应商的10种设备模型和控制实验开发了我们的方法。我们将算法应用于对大学校园6天互联网流量和IXP部分流量的观察,以检测物联网设备。
{"title":"IP-Based IoT Device Detection","authors":"Hang Guo, J. Heidemann","doi":"10.1145/3229565.3229572","DOIUrl":"https://doi.org/10.1145/3229565.3229572","url":null,"abstract":"Recent IoT-based DDoS attacks have exposed how vulnerable the Internet can be to millions of insufficiently secured IoT devices. To understand the risks of these attacks requires learning about these IoT devices---where are they, how many are there, how are they changing? In this paper, we propose a new method to find IoT devices in Internet to begin to assess this threat. Our approach requires observations of flow-level network traffic and knowledge of servers run by the manufacturers of the IoT devices. We have developed our approach with 10 device models by 7 vendors and controlled experiments. We apply our algorithm to observations from 6 days of Internet traffic at a college campus and partial traffic from an IXP to detect IoT devices.","PeriodicalId":20541,"journal":{"name":"Proceedings of the 2018 Workshop on IoT Security and Privacy","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82031001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Towards a Resilient Smart Home 迈向弹性智能家居
Pub Date : 2018-08-07 DOI: 10.1145/3229565.3229570
Tam Thanh Doan, R. Safavi-Naini, Shuai Li, S. Avizheh, Muni Venkateswarlu K., Philip W. L. Fong
Today's Smart Home platforms such as Samsung SmartThings and Amazon AWS IoT are primarily cloud based: devices in the home sense the environment and send the collected data, directly or through a hub, to the cloud. Cloud runs various applications and analytics on the collected data, and generates commands according to the users' specifications that are sent to the actuators to control the environment. The role of the hub in this setup is effectively message passing between the devices and the cloud, while the required analytics, computation, and control are all performed by the cloud. We ask the following question: what if the cloud is not available? This can happen not only by accident or natural causes, but also due to targeted attacks. We discuss possible effects of such unavailability on the functionalities that are commonly available in smart homes, including security and safety related services as well as support for health and well-being of home users, and propose RES-Hub, a hub that can provide the required functionalities when the cloud is unavailable. During the normal functioning of the system, RES-Hub will receive regular status updates from cloud, and will use this information to continue to provide the user specified services when it detects the cloud is down. We describe an IoTivity-based software architecture that is used to implement RES-Hub in a flexible and expendable way and discuss our implementation.
如今的智能家居平台,如三星SmartThings和亚马逊AWS IoT,主要是基于云的:家庭中的设备感知环境,并将收集到的数据直接或通过集线器发送到云端。Cloud对收集的数据运行各种应用程序和分析,并根据用户的规格生成命令,发送给执行器以控制环境。集线器在此设置中的作用是有效地在设备和云之间传递消息,而所需的分析、计算和控制都由云执行。我们提出以下问题:如果云不可用怎么办?这不仅可能是由于意外或自然原因,也可能是由于有针对性的攻击。我们讨论了这种不可用性对智能家居中通常可用的功能(包括安全和安全相关服务以及对家庭用户健康和福祉的支持)可能产生的影响,并提出了RES-Hub,这是一种可以在云不可用时提供所需功能的中心。在系统正常运行期间,RES-Hub将接收来自云的定期状态更新,并在检测到云宕机时使用此信息继续提供用户指定的服务。我们描述了一个基于ioactivity的软件架构,该架构用于以灵活和可消耗的方式实现RES-Hub,并讨论了我们的实现。
{"title":"Towards a Resilient Smart Home","authors":"Tam Thanh Doan, R. Safavi-Naini, Shuai Li, S. Avizheh, Muni Venkateswarlu K., Philip W. L. Fong","doi":"10.1145/3229565.3229570","DOIUrl":"https://doi.org/10.1145/3229565.3229570","url":null,"abstract":"Today's Smart Home platforms such as Samsung SmartThings and Amazon AWS IoT are primarily cloud based: devices in the home sense the environment and send the collected data, directly or through a hub, to the cloud. Cloud runs various applications and analytics on the collected data, and generates commands according to the users' specifications that are sent to the actuators to control the environment. The role of the hub in this setup is effectively message passing between the devices and the cloud, while the required analytics, computation, and control are all performed by the cloud. We ask the following question: what if the cloud is not available? This can happen not only by accident or natural causes, but also due to targeted attacks. We discuss possible effects of such unavailability on the functionalities that are commonly available in smart homes, including security and safety related services as well as support for health and well-being of home users, and propose RES-Hub, a hub that can provide the required functionalities when the cloud is unavailable. During the normal functioning of the system, RES-Hub will receive regular status updates from cloud, and will use this information to continue to provide the user specified services when it detects the cloud is down. We describe an IoTivity-based software architecture that is used to implement RES-Hub in a flexible and expendable way and discuss our implementation.","PeriodicalId":20541,"journal":{"name":"Proceedings of the 2018 Workshop on IoT Security and Privacy","volume":"158 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86428504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Combining MUD Policies with SDN for IoT Intrusion Detection 结合MUD策略和SDN实现物联网入侵检测
Pub Date : 2018-08-07 DOI: 10.1145/3229565.3229571
Ayyoob Hamza, H. Gharakheili, V. Sivaraman
The IETF's push towards standardizing the Manufacturer Usage Description (MUD) grammar and mechanism for specifying IoT device behavior is gaining increasing interest from industry. The ability to control inappropriate communication between devices in the form of access control lists (ACLs) is expected to limit the attack surface on IoT devices; however, little is known about how MUD policies will get enforced in operational networks, and how they will interact with current and future intrusion detection systems (IDS). We believe this paper is the first attempt to translate MUD policies into flow rules that can be enforced using SDN, and in relating exception behavior to attacks that can be detected via off-the-shelf IDS. Our first contribution develops and implements a system that translates MUD policies to flow rules that are proactively configured into network switches, as well as reactively inserted based on run-time bindings of DNS. We use traces of 28 consumer IoT devices taken over several months to evaluate the performance of our system in terms of switch flow-table size and fraction of exception traffic that needs software inspection. Our second contribution identifies the limitations of flow-rules derived from MUD in protecting IoT devices from internal and external network attacks, and we show how our system is able to detect such volumetric attacks (including port scanning, TCP/UDP/ICMP flooding, ARP spoofing, and TCP/SSDP/SNMP reflection) by sending only a very small fraction of exception packets to off-the-shelf IDS.
IETF正在推动标准化制造商使用描述(MUD)语法和机制,以指定物联网设备的行为,这引起了业界越来越多的兴趣。以访问控制列表(acl)的形式控制设备之间不适当通信的能力预计将限制物联网设备的攻击面;然而,对于MUD策略将如何在操作网络中执行,以及它们将如何与当前和未来的入侵检测系统(IDS)交互,人们知之甚少。我们相信这篇论文是第一次尝试将MUD策略转换成可以使用SDN强制执行的流规则,并将异常行为与可以通过现成的IDS检测到的攻击联系起来。我们的第一个贡献是开发和实现一个系统,该系统将MUD策略转换为流规则,这些流规则被主动配置到网络交换机中,并根据DNS的运行时绑定被动地插入。我们使用了28个消费者物联网设备在几个月内的跟踪来评估我们系统的性能,包括交换机流表大小和需要软件检查的异常流量的比例。我们的第二个贡献确定了来自MUD的流量规则在保护物联网设备免受内部和外部网络攻击方面的局限性,并且我们展示了我们的系统如何能够通过仅向现货IDS发送非常小的异常数据包来检测此类容量攻击(包括端口扫描,TCP/UDP/ICMP泛流,ARP欺骗和TCP/SSDP/SNMP反射)。
{"title":"Combining MUD Policies with SDN for IoT Intrusion Detection","authors":"Ayyoob Hamza, H. Gharakheili, V. Sivaraman","doi":"10.1145/3229565.3229571","DOIUrl":"https://doi.org/10.1145/3229565.3229571","url":null,"abstract":"The IETF's push towards standardizing the Manufacturer Usage Description (MUD) grammar and mechanism for specifying IoT device behavior is gaining increasing interest from industry. The ability to control inappropriate communication between devices in the form of access control lists (ACLs) is expected to limit the attack surface on IoT devices; however, little is known about how MUD policies will get enforced in operational networks, and how they will interact with current and future intrusion detection systems (IDS). We believe this paper is the first attempt to translate MUD policies into flow rules that can be enforced using SDN, and in relating exception behavior to attacks that can be detected via off-the-shelf IDS. Our first contribution develops and implements a system that translates MUD policies to flow rules that are proactively configured into network switches, as well as reactively inserted based on run-time bindings of DNS. We use traces of 28 consumer IoT devices taken over several months to evaluate the performance of our system in terms of switch flow-table size and fraction of exception traffic that needs software inspection. Our second contribution identifies the limitations of flow-rules derived from MUD in protecting IoT devices from internal and external network attacks, and we show how our system is able to detect such volumetric attacks (including port scanning, TCP/UDP/ICMP flooding, ARP spoofing, and TCP/SSDP/SNMP reflection) by sending only a very small fraction of exception packets to off-the-shelf IDS.","PeriodicalId":20541,"journal":{"name":"Proceedings of the 2018 Workshop on IoT Security and Privacy","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90439507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Web-based Attacks to Discover and Control Local IoT Devices 基于web的攻击发现和控制本地物联网设备
Pub Date : 2018-08-07 DOI: 10.1145/3229565.3229568
Gunes Acar, D. Huang, Frank H. Li, Arvind Narayanan, N. Feamster
In this paper, we present two web-based attacks against local IoT devices that any malicious web page or third-party script can perform, even when the devices are behind NATs. In our attack scenario, a victim visits the attacker's website, which contains a malicious script that communicates with IoT devices on the local network that have open HTTP servers. We show how the malicious script can circumvent the same-origin policy by exploiting error messages on the HTML5 MediaError interface or by carrying out DNS rebinding attacks. We demonstrate that the attacker can gather sensitive information from the devices (e.g., unique device identifiers and precise geolocation), track and profile the owners to serve ads, or control the devices by playing arbitrary videos and rebooting. We propose potential countermeasures to our attacks that users, browsers, DNS providers, and IoT vendors can implement.
在本文中,我们提出了两种基于web的针对本地物联网设备的攻击,任何恶意网页或第三方脚本都可以执行,即使设备位于nat后面。在我们的攻击场景中,受害者访问攻击者的网站,该网站包含一个恶意脚本,该脚本与本地网络上打开HTTP服务器的物联网设备进行通信。我们展示了恶意脚本如何通过利用HTML5 MediaError接口上的错误消息或通过执行DNS重绑定攻击来规避同源策略。我们证明攻击者可以从设备中收集敏感信息(例如,唯一的设备标识符和精确的地理位置),跟踪和配置所有者以提供广告,或通过播放任意视频和重新启动来控制设备。我们提出了用户、浏览器、DNS提供商和物联网供应商可以实施的潜在攻击对策。
{"title":"Web-based Attacks to Discover and Control Local IoT Devices","authors":"Gunes Acar, D. Huang, Frank H. Li, Arvind Narayanan, N. Feamster","doi":"10.1145/3229565.3229568","DOIUrl":"https://doi.org/10.1145/3229565.3229568","url":null,"abstract":"In this paper, we present two web-based attacks against local IoT devices that any malicious web page or third-party script can perform, even when the devices are behind NATs. In our attack scenario, a victim visits the attacker's website, which contains a malicious script that communicates with IoT devices on the local network that have open HTTP servers. We show how the malicious script can circumvent the same-origin policy by exploiting error messages on the HTML5 MediaError interface or by carrying out DNS rebinding attacks. We demonstrate that the attacker can gather sensitive information from the devices (e.g., unique device identifiers and precise geolocation), track and profile the owners to serve ads, or control the devices by playing arbitrary videos and rebooting. We propose potential countermeasures to our attacks that users, browsers, DNS providers, and IoT vendors can implement.","PeriodicalId":20541,"journal":{"name":"Proceedings of the 2018 Workshop on IoT Security and Privacy","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91201488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Proceedings of the 2018 Workshop on IoT Security and Privacy 2018物联网安全与隐私研讨会论文集
Pub Date : 2018-08-07 DOI: 10.1145/3229565
{"title":"Proceedings of the 2018 Workshop on IoT Security and Privacy","authors":"","doi":"10.1145/3229565","DOIUrl":"https://doi.org/10.1145/3229565","url":null,"abstract":"","PeriodicalId":20541,"journal":{"name":"Proceedings of the 2018 Workshop on IoT Security and Privacy","volume":"250 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76988939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traversing the Quagmire that is Privacy in your Smart Home 穿越智能家居隐私的泥潭
Pub Date : 2018-08-07 DOI: 10.1145/3229565.3229573
Chuhan Gao, Varun Chandrasekaran, Kassem Fawaz, Suman Banerjee
Voice has become an increasingly popular User Interaction (UI) channel, with voice-activated devices becoming regular fixtures in our homes. The popularity of voice-based assistants (VAs), however, have brought along significant privacy and security threats to their users. Recent revelations have indicated that some VAs record user's private conversations continuously and innocuously. With the VAs being connected to the Internet, they can leak the recorded content without the user's authorization. Moreover, these devices often do not pack authentication mechanisms to check if the voice commands are issued by authorized users. To address both shortcomings, we propose a framework to impose a security and privacy perimeter around the user's VA. Our proposed framework continuously jams the VA to prevent it from innocuously recording the user's speech, unless the user issues a voice command. To prevent unauthorized voice commands, our framework provides a scheme similar to two-factor authentication to only grant access when the authorized user is in its vicinity. Our proposed framework achieves both objectives through a combination of several techniques to (a) continuously jam one (or many) VA's microphones in a manner inaudible to the user, and (b) provide only authenticated users easy access to VAs.
语音已经成为越来越受欢迎的用户交互(UI)渠道,声控设备成为我们家中的常规设备。然而,基于语音的助手(VAs)的普及给用户带来了严重的隐私和安全威胁。最近披露的信息表明,一些自动助理会持续且无害地记录用户的私人对话。当虚拟网关连接到互联网时,它们可以在未经用户授权的情况下泄露记录的内容。此外,这些设备通常不包含验证机制来检查语音命令是否由授权用户发出。为了解决这两个缺点,我们提出了一个框架,在用户的VA周围强加一个安全和隐私边界。我们提出的框架持续阻塞VA,以防止它无害地记录用户的语音,除非用户发出语音命令。为了防止未经授权的语音命令,我们的框架提供了一个类似于双因素身份验证的方案,仅在授权用户在其附近时授予访问权限。我们提出的框架通过几种技术的组合来实现这两个目标:(a)以用户听不到的方式持续干扰一个(或多个)VA的麦克风,以及(b)仅向经过身份验证的用户提供易于访问VA的方法。
{"title":"Traversing the Quagmire that is Privacy in your Smart Home","authors":"Chuhan Gao, Varun Chandrasekaran, Kassem Fawaz, Suman Banerjee","doi":"10.1145/3229565.3229573","DOIUrl":"https://doi.org/10.1145/3229565.3229573","url":null,"abstract":"Voice has become an increasingly popular User Interaction (UI) channel, with voice-activated devices becoming regular fixtures in our homes. The popularity of voice-based assistants (VAs), however, have brought along significant privacy and security threats to their users. Recent revelations have indicated that some VAs record user's private conversations continuously and innocuously. With the VAs being connected to the Internet, they can leak the recorded content without the user's authorization. Moreover, these devices often do not pack authentication mechanisms to check if the voice commands are issued by authorized users. To address both shortcomings, we propose a framework to impose a security and privacy perimeter around the user's VA. Our proposed framework continuously jams the VA to prevent it from innocuously recording the user's speech, unless the user issues a voice command. To prevent unauthorized voice commands, our framework provides a scheme similar to two-factor authentication to only grant access when the authorized user is in its vicinity. Our proposed framework achieves both objectives through a combination of several techniques to (a) continuously jam one (or many) VA's microphones in a manner inaudible to the user, and (b) provide only authenticated users easy access to VAs.","PeriodicalId":20541,"journal":{"name":"Proceedings of the 2018 Workshop on IoT Security and Privacy","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76844687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
Proceedings of the 2018 Workshop on IoT Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1