SafeThings 2020

IEEE Workshop on the Internet of Safe Things

Co-located with Oakland 2020 »

May 21st, 2020 - San Francisco, California, USA

The Internet of Things (IoT) has become increasingly popular and innovative. With the rise of connected devices, we have an opportunity to significantly improve the safety of legacy systems. For instance, insights from data across systems can be exploited to reduce accidents, improve air quality and support disaster events. IoT based cyber-physical systems (CPS) also bring new risks that arise due to the unexpected interaction between systems and the larger number of attack vectors on these systems. These safety risks can arise in the context of use of medical devices, smart home appliance control, smart car design or conflicts in policy execution at a societal scale.

The Internet of Safe Things workshop seeks to bring together researchers to create solutions for the development of safe cyber-physical systems. As safety is inherently linked with the security and privacy of a system, we also seek contributions in these areas that address safety concerns. We seek to develop a community that systematically dissects the vulnerabilities and risks exposed by these emerging CPSes, and creates tools, algorithms, frameworks, and systems that help in the development of safe systems.

We seek contributions across domains - autonomous vehicles, smart homes, medical devices, smart grid; and across disciplines - systems, control, human-computer interaction, security, reliability, machine learning, and verification.


Program

09:00 AM | Welcome Address and Best Paper Award
09:15 AM | Keynote 1
Assuring Safety and Security in Cyber-Physical Systems with Varying Levels of Autonomy
Prof. Miroslav Pajic
10:30 AM | Technical Papers - Session 1
A Case Study of the Security Vetting Process of Smart-home Assistant Applications
Hang Hu (Virginia Tech), Limin Yang (UIUC), Shihan Lin (Fudan University) and Gang Wang (UIUC)

On the Feasibility of Acoustic Attacks Using Commodity Smart Devices
Matthew Wixey, Emiliano De Cristofaro and Shane Johnson (University College London)

Privacy-preserving Continuous Tumour Relapse Monitoring Using In-body Radio Signals
Sam Hylamia, Wenqing Yan, André Teixeira, Noor Badariah Asan, Mauricio Perez, Robin Augustine and Thiemo Voigt (Uppsala University)

Never Ending Story: Authentication and AccessControl Design Flaws in Shared IoT Devices
Blake Janes, Heather Crawford and Tj Oconnor (Florida Institute of Technology)
11:50 AM | Posters / Demo / Discussion
01:00 PM | Keynote 2
Safe and Secure Intelligence on the Edge
Prof. Farinaz Koushanfar
02:15 PM | Technical Papers - Session 2
Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles Best Paper Award
Gokcen Yilmaz Dayanikli (Virginia Tech), Rees Hatch (Utah State University), Ryan M. Gerdes (Virginia Tech), Hongjie Wang (Utah State University) and Regan Zane (Utah State University)

Security Analysis of Networked 3D Printers
Matthew McCormack (CMU), Sanjay Chandrasekaran (UCSB), Guyue Liu (CMU), Tianlong Yu (CMU), Sandra DeVincent Wolf (CMU) and Vyas Sekar (CMU)

On Using Camera-based Visible Light Communication for Security Protocols
Wen-Yi Chu, Ting-Guang Yu, Yu-Kai Lin, Shao-Chuan Lee and Hsu-Chun Hsiao (NTU Taiwan)
03:15 PM | Closing Remarks / Discussion

Keynote

Assuring Safety and Security in Cyber-Physical Systems with Varying Levels of Autonomy

Increasing set of functionalities, network interoperability, and system design complexity have introduced easily exploitable security vulnerabilities in cyber-physical systems (CPS). Furthermore, the tight interaction between information technology and physical world makes these systems vulnerable to attacks beyond the standard cyber-attacks, while relying exclusively on conventional security techniques may be unfeasible due to resource-constraints and long system lifetime. Consequently, there is a need to change the way we reason about security in CPS, and start designing platform-aware attack-resilient components and architectures capable providing strong safety and performance guarantees even under attack. In this talk, I will present research challenges and our recent efforts in this domain, starting from cyber-physical security techniques that (a) capture effects of attacks on system performance, (b) introduce attack resilience into control & autonomy components and facilitate attack detection, and (c) enable mapping of the desired Quality-of-Control (QoC) under attack guarantees into real-time performance requirements on the underlying platforms in way that supports design-time tradeoffs between the QoC under attack and security-related overhead. Finally, for systems with varying levels of autonomy and human interaction, I will show how we can exploit human power of inductive reasoning and the ability to provide context, to improve the overall security guarantees.

...

Miroslav Pajic is the Nortel Networks Assistant Professor in Department of Electrical and Computer Engineering at Duke University. He also holds a secondary appointment in the Departments of Computer Science. His research interests focus on design and analysis of high-assurance cyber-physical systems with varying levels of autonomy and human interaction. He received various awards including the ACM SIGBED Early-Career Award, IEEE TCCPS Early-Career Award, NSF CAREER Award, ONR Young Investigator Program Award, ACM SIGBED Frank Anger Memorial Award, Joseph and Rosaline Wolf Best Dissertation Award from Penn Engineering, IBM Faculty Award, as well as seven Best Paper and Runner-up Awards, such as the Best Paper Awards at the 2017 ACM SIGBED International Conference on Embedded Software (EMSOFT) and 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), and the Best Student Paper award at the 2012 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). He is an associate editor in the ACM Transactions on Computing for Healthcare (ACM HEALTH) and a co-Chair of the 2019 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS'19).



Safe and Secure Intelligence on the Edge

In this talk, I will discuss the current state of the art in safety and security of deploying Intelligence on the edge. System physical constraints such as real-time, privacy, and low-power increasingly favor performing the artificial intelligence (AI) algorithms on the edge devices. Reliability and safety considerations are perhaps the biggest obstacle to the widescale adoption of emerging edge learning methodologies in sensitive scenarios such as smart transportation, health-care, warfare, and financial systems. I will discuss a few of the nefarious vulnerabilities of the edge AI algorithms as well as the present promising defense solutions customized for the constrained environments. I conclude by outlining the challenges and opportunities.

...

Farinaz Koushanfar is a professor and Henry Booker Faculty Scholar in the Electrical and Computer Engineering (ECE) department at University of California San Diego (UCSD), where she is the co-founder and scientific co-director of the UCSD Center for Machine Intelligence, Computing & Security (MICS). Prof. Koushanfar received her Ph.D. in Electrical Engineering and Computer Science as well as her M.A. in Statistics from UC Berkeley. Her research addresses several aspects of efficient computing and embedded systems, with a focus on system and device security, safe AI, real-time/energy-efficient AI under resource constraints, design automation and synthesis, as well as privacy-preserving computing. Professor Koushanfar serves as an associate partner of the Intel Collaborative Research Institute for Secure Computing to aid developing solutions for the next generation of embedded secure devices. She has received a number of awards and honors for her research, mentorship, teaching, and outreach activities including the Presidential Early Career Award for Scientists and Engineers (PECASE) from President Obama, the ACM SIGDA Outstanding New Faculty Award, Cisco IoT Security Grand Challenge Award, Qualcomm Innovation Award(s), MIT Technology Review TR-35 2008 (World’s top 35 innovators under 35), Young Faculty/CAREER Awards from NSF, DARPA, ONR and ARO, as well as a number of Best Paper Awards. Dr. Koushanfar is a fellow of the IEEE, and a fellow of the Kavli Foundation Frontiers of the National Academy of Sciences.


List of Accepted Papers


A Case Study of the Security Vetting Process of Smart-home Assistant Applications
Hang Hu (Virginia Tech), Limin Yang (UIUC), Shihan Lin (Fudan University) and Gang Wang (UIUC)

Privacy-preserving Continuous Tumour Relapse Monitoring Using In-body Radio Signals
Sam Hylamia, Wenqing Yan, André Teixeira, Noor Badariah Asan, Mauricio Perez, Robin Augustine and Thiemo Voigt (Uppsala University)

On the Feasibility of Acoustic Attacks Using Commodity Smart Devices
Matthew Wixey, Emiliano De Cristofaro and Shane Johnson (University College London)

Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles Best Paper Award
Gokcen Yilmaz Dayanikli (Virginia Tech), Rees Hatch (Utah State University), Ryan M. Gerdes (Virginia Tech), Hongjie Wang (Utah State University) and Regan Zane (Utah State University)

Never Ending Story: Authentication and AccessControl Design Flaws in Shared IoT Devices
Blake Janes, Heather Crawford and Tj Oconnor (Florida Institute of Technology)

On Using Camera-based Visible Light Communication for Security Protocols
Wen-Yi Chu, Ting-Guang Yu, Yu-Kai Lin, Shao-Chuan Lee and Hsu-Chun Hsiao (NTU Taiwan)

Security Analysis of Networked 3D Printers
Matthew McCormack (CMU), Sanjay Chandrasekaran (UCSB), Guyue Liu (CMU), Tianlong Yu (CMU), Sandra DeVincent Wolf (CMU) and Vyas Sekar (CMU)



List of Accepted Posters


Poster: Radiometric Signatures for Wireless Device Identification over Dynamic Channels
Wenqing Yan, Thiemo Voigt and Christian Rohner (Uppsala University)

Poster: Class-sourced Penetration Testing of IoT Devices
Abhinav Mohanty, Parag Mhatre and Meera Sridhar (UNC Charlotte)



List of Accepted Demos


ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures
Shin-Ming Cheng (National Taiwan University of Science and Technology), Tao Ban (National Institute of Information and Communications Technology), Jr-Wei Huang (National Taiwan University of Science and Technology), Bing-Kai Hong (National Taiwan University of Science and Technology) and Daisuke Inoue (National Institute of Information and Communications Technology)


Important Dates


Paper/Poster/Demo Submission Deadline January 25th, 2020 (AoE, UTC-12).
February 3rd, 2020 (AoE, UTC-12).
Acceptance Notification February 25th, 2020.
March 2nd, 2020.
Camera-ready Submission Deadline March 6th, 2020 (AoE, UTC-12).
March 20th, 2020 (AoE, UTC-12).

Call for Papers

As the traditionally segregated systems are brought online for next-generation connected applications, we have an opportunity to significantly improve the safety of legacy systems. For instance, insights from data across systems can be exploited to reduce accidents, improve air quality and support disaster events. Cyber-physical systems (CPS) also bring new risks that arise due to the unexpected interaction between systems. These safety risks arise because of information that distracts users while driving, software errors in medical devices, corner cases in data-driven control, compromised sensors in drones or conflicts in societal policies.

Accordingly, the Internet of Safe Things workshop (or SafeThings, for brevity) seeks to bring researchers and practitioners that are actively exploring system design, modeling, verification, authentication approaches to provide safety guarantees in the Internet of Things (IoT). The workshop welcomes contributions that integrate hardware and software systems provided by disparate vendors, particularly those that have humans in the loop. As safety is inherently linked with the security and privacy, we also seek contributions in these areas that address safety concerns. With the SafeThings workshop, we seek to develop a community that systematically dissects the vulnerabilities and risks exposed by these emerging CPSes, and create tools, algorithms, frameworks, and systems that help in the development of safe systems.

SafeThings workshop covers safety topics as it relates to an individual’s health (physical, mental), the society (air pollution, toxicity, disaster events), or the environment (species preservation, global warming, oil spills). The workshop considers safety from a human perspective, and thus, does not include topics such as thread safety or memory safety in its scope.

Our workshop will cover, but not limit itself to, the following subject categories:

Our workshop will cover, but not limit itself to, the following domains​:


Call for Posters and Demos

If you would like to share a provocative opinion, an interesting preliminary work, or a cool idea that will spark discussion about IoT safety, the poster and demo section is a perfect venue to introduce new or ongoing work. Poster and demo presenters will have the opportunity to discuss their work, get exposure, and receive feedback from attendees.



Submission Instruction

Submitted papers must be in English, unpublished, and must not be currently under review for any other publication. Submissions must follow the official IEEE Conference Proceedings format. Full papers must be at most 6 single-spaced, double column 8.5” x 11” pages. Posters and Demos must be at most 1 single-spaced, double column 8.5” x 11” page, and have "poster" or "demo" in their titles. All figures, references, and appendices must fit within these limits. Papers that do not meet the size and formatting requirements will not be reviewed. All papers must be in Adobe Portable Document Format (PDF) and submitted through the web submission form via EasyChair (submission link below). The review process is single-blind.

Full Papers: 6 pages.
Posters and Demos: 1 page (with "poster" or "demo" in the title).

Submission Form »



Presentation Form

All accepted submissions will be presented at the workshop and included in the IEEE workshop proceedings.

One author of each accepted paper is required to attend the workshop and present the paper for it to be included in the proceedings.


Organization


General Chair

Jyotirmoy Vinay Deshmukh (University of Southern California)


Program Committee Chairs

Aanjhan Ranganathan (Northeastern University)

Patrick Tague (Carnegie Mellon University)


Technical Program Committee

Gail-Joon Ahn (Arizona State University)

David Barerra (Carleton University)

Gedare Bloom (University of Colorado Colorado Springs)

Jyotirmoy Deshmukh (University of Southern California)

Kassem Fawaz (University of Wisconsin-Madison)

Richard Han (University of Colorado Boulder)

Anwar Hithnawi (UC Berkeley)

Bardh Hoxha (Toyota Research Institute North America)

Kari Kostiainen (ETH Zurich)

Insup Lee (University of Pennsylvania)

Joseph Maguire (University of Glasgow)

Adwait Nadkarni (William and Mary)

Sashank Narain (Umass Lowell)

Miroslav Pajic (Duke University)

Amir Rahmati (Stony Brook University)

Aanjhan Ranganathan (Northeastern University)

Kay Roemer (TU Graz)

Elizabeth Stobert (National Research Council Canada)

Paulo Tabuada (University of California, Los Angeles)

Patrick Tague (CMU)

Yuan Tian (University of Virginia)

Nils Ole Tippenhauer (CISPA Helmholtz Center for Information Security)

James Weimer (University of Pennsylvania)

Xinyu Zhang (University of California San Diego)

Saman Zonouz (Rutgers University)


Steering Committee

Bharathan Balaji (Amazon)

Robin Kravets (University of Illinois, Urbana Champaign)

Mani Srivastava (University of California, Los Angeles)

John A. Stankovic (University of Virginia)

Patrick Tague (Carnegie Mellon University)