News (04/08/2017): Workshop proceedings are available!
News (03/30/2017): Full workshop program available!
News (03/30/2017): Keynote speaker: Dr. David Nicol, University of Illinois. Talk: The Role of Modeling and Simulation in IOT Security Research
The Internet-of-Things (IoT) has taken off in a big way and finds itself embedded in our daily lives – from smart home applications to process control monitoring in manufacturing systems, wearables to healthcare, public utilities to military applications, to name just a few. The surge in interest in smart cities increases the scope and reach of IoT-style applications in a significant manner. These applications generate huge volumes of data, have access to personal and confidential information, monitor and control critical processes and are often accessed/controlled via public networks such as the Internet. Hence, they are prime targets for malicious entities and have little to no security mechanisms in place. In addition, most users of such devices/systems are not cognizant of the privacy issues – leakage of personal information for instance, or external entities being able to retrace/recreate our activities from public data obtained through the use of IoT devices/services. On the other hand, onerous security and privacy mechanisms may render these systems useless for most consumers. Hence, there is a need to develop innovative techniques to improve protections for such systems. This is particularly challenging since many IoT systems are often limited in terms of computation power, memory, battery life, bandwidth, etc.
Hence, the goal of IoTSec will be to bring together experts in various areas (security, privacy, embedded systems, sensor networks, etc. along with domains experts from medicine, manufacturing systems, mobile devices and so on) to study and develop security and (usable) privacy mechanisms for next generation IoT systems.
Abstract: Many of the challenges of security in IOT relate to scale. How do we discover what scaling problems exist? How do we evaluate solutions to the problems we foresee? While measurement of many many IoT devices concurrently may be possible, what sense can we make of the measurements when so much of the IoT infrastructure is opaque to us? There is a role for modeling and simulation in assessing security problems and solutions. This talk highlights the opportunities and identifies the associated challenges.
Speaker Bio: David M. Nicol is the Franklin W. Woeltge Professor of Electrical and Computer Engineering at the University of Illinois at Urbana‐Champaign, and Director of the Information Trust Institute (iti.illinois.edu). He is PI for two national centers for infrastructure resilience: the DHS‐funded Critical Infrastructure Reliance Institute (ciri.illinois.edu), and the DoE funded Cyber Resilient Energy Delivery Consortium (cred‐c.org); he is also PI for the Boeing Trusted Software Center, and co-PI for the NSA‐funded Science of Security lablet. Prior to joining UIUC in 2003 he served on the faculties of the computer science departments at Dartmouth College (1996‐2003), and before that the College of William and Mary (1987‐1996). He has won recognition for excellence in teaching at all three universities. His research interests include trust analysis of networks and software, analytic modeling, and parallelized discrete‐event simulation, research which has led to the founding of startup company Network Perception, and election as Fellow of the IEEE and Fellow of the ACM. He is the inaugural recipient of the ACM SIGSIM Outstanding Contributions award, and co‐author of the widely used undergraduate textbook “Discrete‐Event Systems Simulation”.
Download workshop proceedings from [here].
8:30 AM – 8:45 AM
Welcome Remarks
8:45 AM – 9:45 AM
Keynote: “The Role of Modeling and Simulation in IoT Security Research”
Prof. David M. Nicol,
Univeristy of Illinois at Urbana-Champaign
9:45 AM – 10:00 AM
Q & A
10:00 AM – 10:30 AM COFFEE BREAK
10:30 AM – 10:50 AM
Yuan Gong and Christian Poellabauer. An Overview of Vulnerabilities of Voice Controlled Systems
10:50 AM – 11:10 AM
Abhinav Mohanty, Islam Obaidat, Fadi Yilmaz and Meera Sridhar. Control-hijacking Vulnerabilities in IoT Firmware: A Brief Survey
11:10 AM – 11:30 AM
Daniel Sanchez and Bogdan Copos. Cognitive Enhancement as an Attack Surface
11:30 AM – 11:50 AM
Hui Lin. SDN-based In-network Honeypot: Preemptively Disrupt and Mislead Attacks in IoT Network
11:50 AM – 12:10 PM
Chen Cao, Le Guan, Peng Liu, Neng Gao, Jingqiang Lin and Ji Xiang. Hey, You, Keep away from My Device: Remotely Implanting a Virus Expeller to Defeat Mirai on IoT Devices
12:10 PM – 1:30 PM LUNCH BREAK
1:30 PM – 1:50 PM
Ioannis Agadakos, Gabriela Ciocarlie, Bogdan Copos, Tancrede Lepoint, Ulf Lindqvist and Michael Locasto. Butterfly Effect: Causality from Chaos in the IoT
1:50 PM – 2:10 PM
Soteris Demetriou, Nathaniel D. Kaufman, Jonah Baim, Adam J. Goldsher and Carl A. Gunter. Toward an Extensible Framework for Redaction
2:10 PM – 2:30 PM
Sudip Vhaduri and Christian Poellabauer. Implicit Authentication in Wearables Using Multiple Biometrics
2:30 PM – 2:50 PM
Andrew Weyl and George Williamson. A Multinational Legal Examination of Individual Security Risks Related to the Internet of Things
2:50 PM – 3:30 PM COFFEE BREAK
3:30 PM – 3:50 PM
Giovani Gracioli, Murray Dunne and Sebastian Fischmeister. A Comparison of Data Streaming Frameworks for Anomaly Detection in Embedded Systems
3:50 PM – 4:00 PM
Safa Boudabous, Stephan Clémençon, Ons Jelassi and Mariona Caros Roca. A secure IoT architecture for streaming data analysis and anomaly detection
4:10 PM – 4:30 PM
Ebelechukwu Nwafor, Andre Campbell and Gedare Bloom. Anomaly-based Intrusion Detection of IoT Device Sensor Data using Provenance Graphs
4:30 PM – 4:50 PM
Hamed Haddadi, Vassilis Christophides, Renata Cruz Teixeira, Kenjiro Cho, Shigeya Suzuki and Adrian Perrig. SIOTOME: An Edge-ISP Collaborative Architecture for IoT Security
4:50 PM – 5:00 PM
Concluding Remarks
6:00 PM – 8:00 PM RECEPTION
The areas of interest for the workshop includes, but is not limited to, the following:
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
Submissions limited to four, two column, pages
Template: https://www.ieee.org/conferences_events/conferences/publishing/templates.html
Submission site: https://easychair.org/conferences/?conf=iotsec2018