본문

서브메뉴

Achieving Compositional Security and Privacy in IoT Environments.
내용보기
Achieving Compositional Security and Privacy in IoT Environments.
자료유형  
 학위논문
Control Number  
0017164963
International Standard Book Number  
9798346500834
Dewey Decimal Classification Number  
001
Main Entry-Personal Name  
Ozmen, Muslum Ozgur.
Publication, Distribution, etc. (Imprint  
[S.l.] : Purdue University., 2024
Publication, Distribution, etc. (Imprint  
Ann Arbor : ProQuest Dissertations & Theses, 2024
Physical Description  
228 p.
General Note  
Source: Dissertations Abstracts International, Volume: 86-06, Section: B.
General Note  
Advisor: Celik, Z. Berkay.
Dissertation Note  
Thesis (Ph.D.)--Purdue University, 2024.
Summary, Etc.  
요약The Internet of Things (IoT) systems include sensors that measure the physical world, actuators that influence it, and IoT apps that automate these sensors and actuators. Although IoT environments have revolutionized our lives by integrating digital connectivity into physical processes, they also introduce unique security and privacy concerns. Particularly, these systems include multiple components that are unified through the cyber and physical domains. For instance, smart homes include various devices and multiple IoT apps that control these devices. Thus, attacks against any single component can have rippling effects, amplifying due to the composite behavior of sensors, actuators, apps, and the physical environment.In this dissertation, I explore the emerging security and privacy issues that arise from the complex physical interactions in IoT environments. To discover and mitigate these emerging issues, there is a need for composite reasoning techniques that consider the interplay between digital and physical domains. This dissertation addresses these challenges to build secure IoT environments and enhance user privacy with new formal techniques and systems.To this end, I first describe my efforts in ensuring the safety and security of IoT environments. Particularly, I introduced IoTSeer, a security service that discovers physical interaction vulnerabilities among IoT apps. I then proposed attacks that evade prior event verification systems by exploiting the complex physical interactions between IoT sensors and actuators. To address them, I developed two defenses, software patching and sensor placement, to make event verification systems robust against evasion attacks. These works provide a suite of tools to achieve compositional safety and security in IoT environments.Second, I discuss my work that identifies the privacy risks of emerging IoT devices. I designed DMC-Xplorer to find vulnerabilities in voice assistant platforms and showed that an adversary can eavesdrop on privacy-sensitive device states and prevent users from controlling devices. I then developed a remote side-channel attack against intermittent devices to infer privacy-sensitive information about the environment in which they are deployed. These works highlight new privacy issues in emerging commodity devices used in IoT environments.
Subject Added Entry-Topical Term  
Software.
Subject Added Entry-Topical Term  
Violations.
Subject Added Entry-Topical Term  
Smart houses.
Subject Added Entry-Topical Term  
Computer science.
Subject Added Entry-Topical Term  
Information technology.
Index Term-Uncontrolled  
Internet of Things
Index Term-Uncontrolled  
Security and privacy
Added Entry-Corporate Name  
Purdue University.
Host Item Entry  
Dissertations Abstracts International. 86-06B.
Electronic Location and Access  
로그인을 한후 보실 수 있는 자료입니다.
Control Number  
joongbu:655894
신착도서 더보기
최근 3년간 통계입니다.

소장정보

  • 예약
  • 캠퍼스간 도서대출
  • 서가에 없는 책 신고
  • 나의폴더
소장자료
등록번호 청구기호 소장처 대출가능여부 대출정보
TQ0031916 T   원문자료 열람가능/출력가능 열람가능/출력가능
마이폴더 부재도서신고

* 대출중인 자료에 한하여 예약이 가능합니다. 예약을 원하시면 예약버튼을 클릭하십시오.

해당 도서를 다른 이용자가 함께 대출한 도서

관련도서

관련 인기도서

도서위치