Proceedings 2018 Network and Distributed System Security Symposium 2018
DOI: 10.14722/ndss.2018.23282
|View full text |Cite
|
Sign up to set email alerts
|

Fear and Logging in the Internet of Things

Abstract: Abstract-As the Internet of Things (IoT) continues to proliferate, diagnosing incorrect behavior within increasinglyautomated homes becomes considerably more difficult. Devices and apps may be chained together in long sequences of triggeraction rules to the point that from an observable symptom (e.g., an unlocked door) it may be impossible to identify the distantly removed root cause (e.g., a malicious app). This is because, at present, IoT audit logs are siloed on individual devices, and hence cannot be used … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
104
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 153 publications
(105 citation statements)
references
References 35 publications
1
104
0
Order By: Relevance
“…ProvThings [46] provides data provenance to diagnose the trace and root cause of behavior. However, data provenance is useful only in forensic analysis after an attack.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…ProvThings [46] provides data provenance to diagnose the trace and root cause of behavior. However, data provenance is useful only in forensic analysis after an attack.…”
Section: Related Workmentioning
confidence: 99%
“…The increasingly complex interdependencies between devices can easily allow for various attacks, because an adversary controlling one IoT device can now expand influence to more devices through such interdependencies. Unfortunately, attacks leveraging trigger-action rules are difficult to detect manually, as device owners may unintentionally provide access or reveal private information to unauthorized entities due to complex chain reactions [46]. This work presents an automated prevention system called SAFECHAIN which identifies exploitable trigger-action attack chains.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, prior work has proposed novel access control enhancements, which may alleviate some of the concerns raised in this paper. ProvThings [54] provides provenance information that may allow the user to piece together evidence of some of the attacks described in this paper, but does not prevent the attacks themselves. On the contrary, ContextIoT [19] provides users with runtime prompts describing the context of sensitive data accesses, which may alert users to unintended execution of routines (F 4 ), at the cost of reducing automation.…”
Section: Related Workmentioning
confidence: 99%
“…Our approach is complete in expressing the causality and dependencies among the data objects through the provenance graph. Another notable work in this area is ProvThings [26] where a provenance collection framework is proposed for IoT apps and devices. ProvThings presents an automated instrumentation mechanism for IoT apps and device APIs.…”
Section: Related Workmentioning
confidence: 99%