Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration最新文献

筛选
英文 中文
Towards a behavioral description of cyber-physical systems using the thing description 用物描述来描述网络物理系统的行为
Farid Salama, Ege Korkan, Sebastian Käbisch, S. Steinhorst
{"title":"Towards a behavioral description of cyber-physical systems using the thing description","authors":"Farid Salama, Ege Korkan, Sebastian Käbisch, S. Steinhorst","doi":"10.1145/3488661.3494030","DOIUrl":"https://doi.org/10.1145/3488661.3494030","url":null,"abstract":"The World Wide Web Consortium (W3C) introduced the Thing Description (TD), a standardized and unified human- and machine-readable semantic description of Internet of Things (IoT) devices that focuses on describing how to interact with the described device using its network-interfaces. However, the TDs lack a way to describe the physical effect of said interactions on the device itself, as well as on the environment around the device, limiting its viability for cyber-physical scenarios. In this paper, we propose an extension for describing the effects of an interaction on the property affordances of a Thing in the TD as a first step towards a TD that is able to fully describe a Cyber-Physical System (CPS). We show this extension permits the generation of accurate Digital Twins, facilitates machine-aided system design and device mashup generation and allows for formal verification of the functionality of CPSs during their deployment and maintenance.","PeriodicalId":300781,"journal":{"name":"Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124519636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trustworthy things 值得信赖的东西
H. Birkholz, T. Fossati
{"title":"Trustworthy things","authors":"H. Birkholz, T. Fossati","doi":"10.1145/3488661.3494034","DOIUrl":"https://doi.org/10.1145/3488661.3494034","url":null,"abstract":"We postulate that if an IoT device is able to produce trustworthy evidence about itself using Remote Attestation Procedures, it should be possible to augment its affordances with a new \"trustworthiness\" quality that allows to securely bind any information that the device exchanges with a set of trust metrics representing a snapshot of its most recent security state. This new \"trustworthiness affordance\" would be used whenever the device needs to provide application state to its users with strong authenticity, which is often the case when the contribution of the device into some distributed computation has repercussions on the individual or public health and safety.","PeriodicalId":300781,"journal":{"name":"Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124990168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PARVP PARVP
Jay Anand, Arunan Sivanathan, Ayyoob Hamza, H. Gharakheili
{"title":"PARVP","authors":"Jay Anand, Arunan Sivanathan, Ayyoob Hamza, H. Gharakheili","doi":"10.1145/3488661.3494031","DOIUrl":"https://doi.org/10.1145/3488661.3494031","url":null,"abstract":"Networked cameras continue to be an attractive target of cyber-attacks and therefore present huge risks to organizations. The use of vulnerable credentials (manufacturers default or publicly known) by these devices remains a primary concern for network and cybersecurity teams. This paper aims to assist enterprise network operators to systematically and passively assess the risk of using default credentials or vulnerable authentication schemes for directly accessing connected cameras. Our contributions are two-fold: (1) We analyze HTTP traffic traces of enterprise-grade network cameras (sourced from popular manufacturers including Cisco, Axis, and Pelco), identify the signature of their authentication techniques, including Basic, regular Digest, and Web Service Security (WSS), extracted from request packets, and develop a system with an algorithm (PARVP) for automatic and passive assessment of authentication risks; and (2) We apply PARVP to traffic traces of about 1.4 million HTTP authentication sessions selectively collected from network traffic of more than 1000 cameras (in our university campus network) during three weeks, and draw insights into risks, including cameras that accept default passwords (though hashed) and camera controllers that reveal passwords (though obsolete) by insecure authentication.","PeriodicalId":300781,"journal":{"name":"Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124894750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Operating large-scale IoT systems through declarative configuration APIs 通过声明式配置api操作大规模物联网系统
R. Kandoi, K. Hartke
{"title":"Operating large-scale IoT systems through declarative configuration APIs","authors":"R. Kandoi, K. Hartke","doi":"10.1145/3488661.3494033","DOIUrl":"https://doi.org/10.1145/3488661.3494033","url":null,"abstract":"Configuration activities constitute a large part of the work in operating an IoT system. Such activities include the onboarding of devices and rollout of firmware updates. Configuration activities must be carefully vetted to prevent faulty states, putting a lot of pressure on IoT system operators to get it right. The problem is further exacerbated due to the heterogeneity, scalability, and distributed computation challenges typical of large-scale IoT systems. Therefore ensuring safe and reliable operations requires careful design. In this paper, we argue that a declarative approach to configuration, complemented with a discovery-driven API design is ideally suited to solve these challenges. We present suitable abstractions needed to realize such a declarative configuration API. Our experiences show that the proposed abstractions and API model are well suited for the purpose of large-scale IoT systems, and allow for high degree of safety and reliability.","PeriodicalId":300781,"journal":{"name":"Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114554800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IPC evolution thru declarative interface generation 通过声明式接口生成IPC演进
Nik Sultana, Saket, A. Zhao, Shubhendra Pal Singhal, Michael Kaplan, R. Krishnan, B. T. Loo
{"title":"IPC evolution thru declarative interface generation","authors":"Nik Sultana, Saket, A. Zhao, Shubhendra Pal Singhal, Michael Kaplan, R. Krishnan, B. T. Loo","doi":"10.1145/3488661.3494032","DOIUrl":"https://doi.org/10.1145/3488661.3494032","url":null,"abstract":"Inter-Process Communication (IPC) mechanisms are simple, OS-provided communication endpoints that do not typically accommodate program-level needs on latency, resource utilization, and mobility. But modern network-connected devices, particularly in IoT, have a wide variety of custom needs and frugal capabilities that standard networking stacks and programming interfaces do not cater for well. Thus IPC needs to evolve, but programmers would need to commit to new communication choices through their source code, which is difficult to change. This position paper argues for the reimagining of IPC to benefit IoT through program-level tailoring of composable and reusable protocol building-blocks for computation-and data-management in distributed systems. We propose sprockets, a generalization of RPC beyond marshalling and synchronization. It incorporates programmer annotations about code semantics, program-level network-related functions, and performance expectations. This is a stepping stone towards the declarative synthesis of high-level IPC that better meets the program's communication needs.","PeriodicalId":300781,"journal":{"name":"Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127473810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信