Farid Salama, Ege Korkan, Sebastian Käbisch, S. Steinhorst
{"title":"Towards a behavioral description of cyber-physical systems using the thing description","authors":"Farid Salama, Ege Korkan, Sebastian Käbisch, S. Steinhorst","doi":"10.1145/3488661.3494030","DOIUrl":"https://doi.org/10.1145/3488661.3494030","url":null,"abstract":"The World Wide Web Consortium (W3C) introduced the Thing Description (TD), a standardized and unified human- and machine-readable semantic description of Internet of Things (IoT) devices that focuses on describing how to interact with the described device using its network-interfaces. However, the TDs lack a way to describe the physical effect of said interactions on the device itself, as well as on the environment around the device, limiting its viability for cyber-physical scenarios. In this paper, we propose an extension for describing the effects of an interaction on the property affordances of a Thing in the TD as a first step towards a TD that is able to fully describe a Cyber-Physical System (CPS). We show this extension permits the generation of accurate Digital Twins, facilitates machine-aided system design and device mashup generation and allows for formal verification of the functionality of CPSs during their deployment and maintenance.","PeriodicalId":300781,"journal":{"name":"Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124519636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trustworthy things","authors":"H. Birkholz, T. Fossati","doi":"10.1145/3488661.3494034","DOIUrl":"https://doi.org/10.1145/3488661.3494034","url":null,"abstract":"We postulate that if an IoT device is able to produce trustworthy evidence about itself using Remote Attestation Procedures, it should be possible to augment its affordances with a new \"trustworthiness\" quality that allows to securely bind any information that the device exchanges with a set of trust metrics representing a snapshot of its most recent security state. This new \"trustworthiness affordance\" would be used whenever the device needs to provide application state to its users with strong authenticity, which is often the case when the contribution of the device into some distributed computation has repercussions on the individual or public health and safety.","PeriodicalId":300781,"journal":{"name":"Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124990168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jay Anand, Arunan Sivanathan, Ayyoob Hamza, H. Gharakheili
{"title":"PARVP","authors":"Jay Anand, Arunan Sivanathan, Ayyoob Hamza, H. Gharakheili","doi":"10.1145/3488661.3494031","DOIUrl":"https://doi.org/10.1145/3488661.3494031","url":null,"abstract":"Networked cameras continue to be an attractive target of cyber-attacks and therefore present huge risks to organizations. The use of vulnerable credentials (manufacturers default or publicly known) by these devices remains a primary concern for network and cybersecurity teams. This paper aims to assist enterprise network operators to systematically and passively assess the risk of using default credentials or vulnerable authentication schemes for directly accessing connected cameras. Our contributions are two-fold: (1) We analyze HTTP traffic traces of enterprise-grade network cameras (sourced from popular manufacturers including Cisco, Axis, and Pelco), identify the signature of their authentication techniques, including Basic, regular Digest, and Web Service Security (WSS), extracted from request packets, and develop a system with an algorithm (PARVP) for automatic and passive assessment of authentication risks; and (2) We apply PARVP to traffic traces of about 1.4 million HTTP authentication sessions selectively collected from network traffic of more than 1000 cameras (in our university campus network) during three weeks, and draw insights into risks, including cameras that accept default passwords (though hashed) and camera controllers that reveal passwords (though obsolete) by insecure authentication.","PeriodicalId":300781,"journal":{"name":"Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124894750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Operating large-scale IoT systems through declarative configuration APIs","authors":"R. Kandoi, K. Hartke","doi":"10.1145/3488661.3494033","DOIUrl":"https://doi.org/10.1145/3488661.3494033","url":null,"abstract":"Configuration activities constitute a large part of the work in operating an IoT system. Such activities include the onboarding of devices and rollout of firmware updates. Configuration activities must be carefully vetted to prevent faulty states, putting a lot of pressure on IoT system operators to get it right. The problem is further exacerbated due to the heterogeneity, scalability, and distributed computation challenges typical of large-scale IoT systems. Therefore ensuring safe and reliable operations requires careful design. In this paper, we argue that a declarative approach to configuration, complemented with a discovery-driven API design is ideally suited to solve these challenges. We present suitable abstractions needed to realize such a declarative configuration API. Our experiences show that the proposed abstractions and API model are well suited for the purpose of large-scale IoT systems, and allow for high degree of safety and reliability.","PeriodicalId":300781,"journal":{"name":"Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114554800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nik Sultana, Saket, A. Zhao, Shubhendra Pal Singhal, Michael Kaplan, R. Krishnan, B. T. Loo
{"title":"IPC evolution thru declarative interface generation","authors":"Nik Sultana, Saket, A. Zhao, Shubhendra Pal Singhal, Michael Kaplan, R. Krishnan, B. T. Loo","doi":"10.1145/3488661.3494032","DOIUrl":"https://doi.org/10.1145/3488661.3494032","url":null,"abstract":"Inter-Process Communication (IPC) mechanisms are simple, OS-provided communication endpoints that do not typically accommodate program-level needs on latency, resource utilization, and mobility. But modern network-connected devices, particularly in IoT, have a wide variety of custom needs and frugal capabilities that standard networking stacks and programming interfaces do not cater for well. Thus IPC needs to evolve, but programmers would need to commit to new communication choices through their source code, which is difficult to change. This position paper argues for the reimagining of IPC to benefit IoT through program-level tailoring of composable and reusable protocol building-blocks for computation-and data-management in distributed systems. We propose sprockets, a generalization of RPC beyond marshalling and synchronization. It incorporates programmer annotations about code semantics, program-level network-related functions, and performance expectations. This is a stepping stone towards the declarative synthesis of high-level IPC that better meets the program's communication needs.","PeriodicalId":300781,"journal":{"name":"Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127473810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}