{"title":"Passive Human Sensing with COTS Wi-Fi","authors":"Kun Qian","doi":"10.1145/3212711.3212713","DOIUrl":"https://doi.org/10.1145/3212711.3212713","url":null,"abstract":"Recent advances in wireless sensing show promise for ubiquitous human activity recognition interface with Wi-Fi. Despite its attractiveness, multiple challenges still exist in bottom-up translation from CSI values to human activities, making existing approaches unready for practical use. To this end, we recognize three key challenges, non-coherent CSI measurements, context-dependent features and diverse human activities. Our preliminary results demonstrate the feasibility of CSI cleaning and passive human tracking. Based on the initial efforts, we propose the plan for further research.","PeriodicalId":376336,"journal":{"name":"Proceedings of the 2018 Workshop on MobiSys 2018 Ph.D. Forum","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122935255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OS-level Software & Hardware Attacks and Defenses","authors":"David Gens","doi":"10.1145/3212711.3212715","DOIUrl":"https://doi.org/10.1145/3212711.3212715","url":null,"abstract":"Computing platforms are an integral part of today's society: our transportation, media, financial markets, and even our elections already depend on these systems. Consequently, computing platforms are also highly diverse, ranging from embedded devices in planes and cars, to smartphones, laptops, desktop computers, and powerful servers running the cloud. The Operating System (OS) manages this hardware and provides abstractions for applications running as user-space programs. The OS usually runs with elevated privileges to protect the platform and other applications from malicious users by enforcing a strict isolation between individual processes. However, all major Operating Systems are written in low-level languages, which provide no guarantees in the presence of bugs. Additionally, hardware implementation flaws enable sophisticated adversaries to exploit the system at run time without requiring memory-corruption vulnerabilities in the system's software. In this thesis, we evaluate the real-world threat of run-time attacks against Operating Systems despite existing defenses such as Control-Flow Integrity (CFI) being deployed and active. In particular, we show that data-only attacks completely bypass all existing defenses in the kernel. Additionally, Rowhammer-based attacks allow sophisticated adversaries to compromise the OS without requiring any vulnerability in software. We develop novel design strategies for defending the OS against strong user-space attackers and demonstrate feasibility through our prototypes for real-world kernels.","PeriodicalId":376336,"journal":{"name":"Proceedings of the 2018 Workshop on MobiSys 2018 Ph.D. Forum","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132840883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 2018 Workshop on MobiSys 2018 Ph.D. Forum","authors":"","doi":"10.1145/3212711","DOIUrl":"https://doi.org/10.1145/3212711","url":null,"abstract":"","PeriodicalId":376336,"journal":{"name":"Proceedings of the 2018 Workshop on MobiSys 2018 Ph.D. Forum","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132564440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward Privacy Enhanced Solutions For Granular Control Over Health Data Collected by Wearable Devices","authors":"Byron M. Lowens","doi":"10.1145/3212711.3212714","DOIUrl":"https://doi.org/10.1145/3212711.3212714","url":null,"abstract":"The advent of wearable technologies has engendered novel ways to understand human behavior as it relates to personalized healthcare and health management. As the availability of these technologies expand and proliferate among users, concerns about threats to data privacy have been raised, specifically, regarding the collection and dissemination of data from wearable devices. These factors point to the urgency to better understand user sharing preferences to formulate personalized solutions that give users granular control of the data collected by their wearable devices. The goal of my dissertation is to design and build human-centered solutions that address the need for granular privacy control over data generated by wearable devices.","PeriodicalId":376336,"journal":{"name":"Proceedings of the 2018 Workshop on MobiSys 2018 Ph.D. Forum","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125990426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Environmental Things: A Human Centered Approach","authors":"Sachit Mahajan","doi":"10.1145/3212711.3212716","DOIUrl":"https://doi.org/10.1145/3212711.3212716","url":null,"abstract":"With the continuous urbanization and industrial growth, the concern about deteriorating air quality is also increasing. This directly impacts the human health and sustainable development. The increase in issues like smog and other issues affecting air quality have adversely influenced the quality of life and even has affected the economic growth in a negative way. In order to move ahead with the idea of \"smart\" world, it is important to have systems which can assist in designing smart environment systems, smart health applications and smart navigation frameworks. The aim is to exploit the mobile sensing, IoT (Internet of Things) technology and Artificial Intelligence to come up with novel solutions to do air quality sensing and provide services to the people which will not just raise awareness related to air quality problem but also assist them in day to day living.","PeriodicalId":376336,"journal":{"name":"Proceedings of the 2018 Workshop on MobiSys 2018 Ph.D. Forum","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126136675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Embedded Networks through Secure Collective Attestation","authors":"Ahmad Ibrahim","doi":"10.1145/3212711.3212712","DOIUrl":"https://doi.org/10.1145/3212711.3212712","url":null,"abstract":"Embedded devices are increasingly permeating our environment to collect data and act on the insight derived. Examples of such devices include smart environments and autonomous systems. The increasing ability to connect, communicate with, and remotely control such devices via the legacy internet has raised considerable security and privacy concerns. One key mechanism to protect the software integrity of these devices is attestation. In this dissertation, we devise attestation schemes that are scalable and applicable for large networks of embedded devices. In particular, we present attestation schemes that are capable of detecting remote malware infestation, physical, and run-time attacks in different settings including smart environments and autonomous systems.","PeriodicalId":376336,"journal":{"name":"Proceedings of the 2018 Workshop on MobiSys 2018 Ph.D. Forum","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126248999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Air Quality Friendly Route Recommendation System","authors":"Savina Singla","doi":"10.1145/3212711.3212717","DOIUrl":"https://doi.org/10.1145/3212711.3212717","url":null,"abstract":"Air-Pollution imposes heavy burden on human beings and understanding the spatio-temporal nature of pollutants is still a challenge. Estimating the personal exposure of an individual to air pollution is equally important as accurately monitoring them. So our overarching aim is to model the overall personal inhalation of hazardous gases through the air (both indoor and outdoor) by an individual, provide air quality friendly route recommendations, thus raising the overall quality of urban movement and living healthy life. We make use of mobile sensors capable of sensing hazardous gases in order to achieve the same.","PeriodicalId":376336,"journal":{"name":"Proceedings of the 2018 Workshop on MobiSys 2018 Ph.D. Forum","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127995797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}