Proceedings of the 14th International Conference on Emerging Networking EXperiments and Technologies 2018
DOI: 10.1145/3281411.3281440
|View full text |Cite
|
Sign up to set email alerts
|

IotSan

Abstract: Today's IoT systems include event-driven smart applications (apps) that interact with sensors and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app interactions, or device/communication failures, can cause unsafe and dangerous physical states. Detecting flaws that lead to such states, requires a holistic view of installed apps, component devices, their configurations, and more importantly, how they interact. In this paper, we design IotSan, a novel practical system that uses m… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 106 publications
(14 citation statements)
references
References 53 publications
0
14
0
Order By: Relevance
“…When analyzing the model, the solver checks to see if a path exists from any of a specified set of initial states to states that violate any of the safety properties. Prior works in this domain (e.g., IoTSAN [24], Soteria [11]) have commonly used this state-based approach when modeling the IoT systems they analyze.…”
Section: Formal Model Of App Coordinationmentioning
confidence: 99%
See 4 more Smart Citations
“…When analyzing the model, the solver checks to see if a path exists from any of a specified set of initial states to states that violate any of the safety properties. Prior works in this domain (e.g., IoTSAN [24], Soteria [11]) have commonly used this state-based approach when modeling the IoT systems they analyze.…”
Section: Formal Model Of App Coordinationmentioning
confidence: 99%
“…To determine whether rule-based properties are more scalable than the common state-based approach, we analyzed 325 randomly generated bundles of apps drawn from a corpus of 222 real-world IoT apps using both our state-based and rule-based models. We checked both systems for instances of seven general types of app coordination drawn from the literature [11,13,24], such as the Action Conflict and Action Loop inter-rule vulnerabilities described in Wang, et al [31] We tracked the time taken by the Alloy Analyzer to find up to a single counterexample for each assertion and compared the performance of each approach both as the number of apps and rules in the bundles increased.…”
Section: Rq1: State-vs Rule-based Analysismentioning
confidence: 99%
See 3 more Smart Citations