- Sponsor:
- sigsac
It is our great pleasure to welcome you to the 2nd Workshop on the Internet of Things Security and Privacy - IoT S&P 2019. The Internet of Things (IoT) is believed to be the next generation of the Internet and has deeply influenced our daily lives (e.g., smart homes, smart cities, smart wearables, and other smart environments). While bringing convenience to our lives, IoT also introduces potential security hazards. Since increasing IoT devices directly process usergenerated data, once compromised, leave users or even the entire smart society at risk. Furthermore, large-scale data generated by IoT devices also gives opportunities to attackers. For instance, ever since the first Mirai attacks took place in 2016, IoT botnets have taken overmore powerful DDoS attacks recently. The workshop aims to bring together academic and industrial researchers, and to that end, we have put together an exciting program offering a mix of current and potential challenges.
The call for papers attracted submissions from Asia, Australia, Europe, and the United States. The program committee reviewed 16 submissions and accepted 8 as short paper and 2 as poster. The acceptance rate is 50%. We also encourage attendees to attend the keynote and invited talk presentations. These valuable and insightful talks can and will guide us to a better understanding of the future:
Proceeding Downloads
Towards Secure and Reliable IoT Applications
The growth of commodity IoT devices that integrate physical processes with digital systems have changed the way we live, play, and work. Yet existing IoT platforms cannot help programmers evaluate whether their IoT applications are safe and secure, nor ...
EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices
The wide deployment of devices in Internet of Things (IoT) not only brings many benefits, but also incurs some security challenges. Remote attestation becomes an attractive method to guarantee the security of IoT devices. Unfortunately, most current ...
Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks
In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT) edge devices with timing requirements from control spoofing attacks where an adversary sends malicious control signals to the actuators. We use a trusted ...
FirmFuzz: Automated IoT Firmware Introspection and Analysis
While the number of IoT devices grows at an exhilarating pace their security remains stagnant. Imposing secure coding standards across all vendors is infeasible. Testing individual devices allows an analyst to evaluate their security post deployment. ...
Enabling Opportunistic Users in Multi-Tenant IoT Systems using Decentralized Identifiers and Permissioned Blockchains
In this work, we leverage advances in decentralized identifiers and permissioned blockchains to build a flexible user authentication and authorization mechanism that offers enhanced privacy, achieves fast revocation, and supports distributed "policy ...
Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute Profile
Bluetooth Low Energy (BLE) is a short range wireless technology included in many consumer devices such as smartphones, earphones and wristbands. As part of the Attribute (ATT) protocol, discoverable BLE devices expose a data structure called Generic ...
PoTN: A Novel Blockchain Consensus Protocol with Proof-of-Trust Negotiation in Distributed IoT Networks
As one of the fundamental characteristics of distributed IoT networks, blockchain has attracted tremendous interests from both the academics and industries. Recently, the key to support distributed IoT networks through blockchain is the consensus ...
An Efficient Image Encryption Scheme for Industrial Internet-of-Things Devices
Recently, industrial Internet-of-Things IoT has appeared and developed rapidly, and image data captured by IoT nodes or terminal devices is associated with user's personal privacy information. In order to protect image data, image encryption mechanism ...
New Features of Authentication Scheme for the IoT: A Survey
With the development of cloud computing and artificial intelligence, the Internet of Things (IoT) products are gradually entering every corner of our lives and changing the way we live. Yet traditional computer authentication protocol cannot be used ...
PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices
It is argued that the weakest link in the security chain is now the Internet of Things (IoT) and not the people. Hence, an increasing number of solutions are proposed to secure these devices. Here, we propose a PLuggable And Reprogrammable (PLAR) ...
A Security Scheme for Fog Computing Environment of IoT
As an extension of cloud computing, fog computing environment as well as fog node plays an increasingly important role in internet of things (IoT). This technology provides IoT with more distributed and efficient applications and services. However, IoT ...