Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3338507acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
IoT S&P'19: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things
ACM2019 Proceeding
  • Program Chairs:
  • Peng Liu,
  • Yuqing Zhang
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security London United Kingdom 15 November 2019
ISBN:
978-1-4503-6838-4
Published:
15 November 2019
Sponsors:
Next Conference
October 13 - 17, 2025
Taipei , Taiwan
Reflects downloads up to 09 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 2nd Workshop on the Internet of Things Security and Privacy - IoT S&P 2019. The Internet of Things (IoT) is believed to be the next generation of the Internet and has deeply influenced our daily lives (e.g., smart homes, smart cities, smart wearables, and other smart environments). While bringing convenience to our lives, IoT also introduces potential security hazards. Since increasing IoT devices directly process usergenerated data, once compromised, leave users or even the entire smart society at risk. Furthermore, large-scale data generated by IoT devices also gives opportunities to attackers. For instance, ever since the first Mirai attacks took place in 2016, IoT botnets have taken overmore powerful DDoS attacks recently. The workshop aims to bring together academic and industrial researchers, and to that end, we have put together an exciting program offering a mix of current and potential challenges.

The call for papers attracted submissions from Asia, Australia, Europe, and the United States. The program committee reviewed 16 submissions and accepted 8 as short paper and 2 as poster. The acceptance rate is 50%. We also encourage attendees to attend the keynote and invited talk presentations. These valuable and insightful talks can and will guide us to a better understanding of the future:

Skip Table Of Content Section
SESSION: Keynote Address
keynote
Towards Secure and Reliable IoT Applications

The growth of commodity IoT devices that integrate physical processes with digital systems have changed the way we live, play, and work. Yet existing IoT platforms cannot help programmers evaluate whether their IoT applications are safe and secure, nor ...

SESSION: Attack and Defense
research-article
EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices

The wide deployment of devices in Internet of Things (IoT) not only brings many benefits, but also incurs some security challenges. Remote attestation becomes an attractive method to guarantee the security of IoT devices. Unfortunately, most current ...

research-article
Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks

In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT) edge devices with timing requirements from control spoofing attacks where an adversary sends malicious control signals to the actuators. We use a trusted ...

research-article
Public Access
FirmFuzz: Automated IoT Firmware Introspection and Analysis

While the number of IoT devices grows at an exhilarating pace their security remains stagnant. Imposing secure coding standards across all vendors is infeasible. Testing individual devices allows an analyst to evaluate their security post deployment. ...

poster
Enabling Opportunistic Users in Multi-Tenant IoT Systems using Decentralized Identifiers and Permissioned Blockchains

In this work, we leverage advances in decentralized identifiers and permissioned blockchains to build a flexible user authentication and authorization mechanism that offers enhanced privacy, achieves fast revocation, and supports distributed "policy ...

SESSION: System Analysis and Design
research-article
Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute Profile

Bluetooth Low Energy (BLE) is a short range wireless technology included in many consumer devices such as smartphones, earphones and wristbands. As part of the Attribute (ATT) protocol, discoverable BLE devices expose a data structure called Generic ...

research-article
PoTN: A Novel Blockchain Consensus Protocol with Proof-of-Trust Negotiation in Distributed IoT Networks

As one of the fundamental characteristics of distributed IoT networks, blockchain has attracted tremendous interests from both the academics and industries. Recently, the key to support distributed IoT networks through blockchain is the consensus ...

research-article
An Efficient Image Encryption Scheme for Industrial Internet-of-Things Devices

Recently, industrial Internet-of-Things IoT has appeared and developed rapidly, and image data captured by IoT nodes or terminal devices is associated with user's personal privacy information. In order to protect image data, image encryption mechanism ...

SESSION: Next-gen IoT
research-article
New Features of Authentication Scheme for the IoT: A Survey

With the development of cloud computing and artificial intelligence, the Internet of Things (IoT) products are gradually entering every corner of our lives and changing the way we live. Yet traditional computer authentication protocol cannot be used ...

research-article
PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices

It is argued that the weakest link in the security chain is now the Internet of Things (IoT) and not the people. Hence, an increasing number of solutions are proposed to secure these devices. Here, we propose a PLuggable And Reprogrammable (PLAR) ...

poster
A Security Scheme for Fog Computing Environment of IoT

As an extension of cloud computing, fog computing environment as well as fog node plays an increasingly important role in internet of things (IoT). This technology provides IoT with more distributed and efficient applications and services. However, IoT ...

Contributors
  • Pennsylvania State University

Recommendations