Foresee: A cross-layer vulnerability detection framework for the internet of things

Z Fang, H Fu, T Gu, Z Qian, T Jaeger… - 2019 IEEE 16th …, 2019 - ieeexplore.ieee.org
2019 IEEE 16th International Conference on Mobile Ad Hoc and …, 2019ieeexplore.ieee.org
The exponential growth of Internet-of-Things (IoT) devices not only brings convenience but
also poses numerous challenging safety and security issues. IoT devices are distributed,
highly heterogeneous, and more importantly, directly interact with the physical environment.
In IoT systems, the bugs in device firmware, the defects in network protocols, and the design
flaws in system configurations all may lead to catastrophic accidents, causing severe threats
to people's lives and properties. The challenge gets even more escalated as the possible …
The exponential growth of Internet-of-Things (IoT) devices not only brings convenience but also poses numerous challenging safety and security issues. IoT devices are distributed, highly heterogeneous, and more importantly, directly interact with the physical environment. In IoT systems, the bugs in device firmware, the defects in network protocols, and the design flaws in system configurations all may lead to catastrophic accidents, causing severe threats to people's lives and properties. The challenge gets even more escalated as the possible attacks may be chained together in a long sequence across multiple layers, rendering the current vulnerability analysis inapplicable. In this paper, we present ForeSee, a cross-layer formal framework to comprehensively unveil the vulnerabilities in IoT systems. ForeSee generates a novel attack graph that depicts all of the essential components in IoT, from low-level physical surroundings to high-level decision-making processes. The corresponding graph-based analysis then enables ForeSee to precisely capture potential attack paths. An optimization algorithm is further introduced to reduce the computational complexity of our analysis. The illustrative case studies show that our multilayer modeling can capture threats ignored by the previous approaches.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果