Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Defining Actionable Rules for Verifying IOT Safety and Security

Published

Author(s)

Kayla Ibrahim, Suryadipta Majumdar, Daniel Bastos, Anoop Singhal

Abstract

Internet of Things (IoT) is being widely adopted in recent years. Security, however, has lagged behind, as evidenced by the increasing number of attacks that use IoT devices (e.g., an arson that uses a smart oven, burglary via a smart lock). Therefore, the transparency and accountability of those devices very often become questionable. To that end, formally verifying the system state of those devices against desirable security rules might be a promising solution. However, there is a significant gap between the high-level security recommendations (e.g., NISTIR 8228, NISTIR 8259, OWASP IoT guidance, UK code of practice, and ENISA good practices) for IoT, and the low-level system data (e.g., sensor data, logs, configurations) in IoT devices. This poster aims to bridge this gap and design a technique to automatically define actionable security rules based on those high-level recommendations and to enable the verification of those low-level implementations of IoT devices.
Proceedings Title
41st IEEE Symposium on Security and Privacy
Conference Dates
May 18-20, 2020
Conference Location
San Francisco, CA
Conference Title
41st IEEE Symposium on Security and Privacy 2020

Keywords

IoT, security rules, verification
Created May 17, 2020, Updated August 5, 2020