2,004 research outputs found
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities
Recent advances in Internet of Things (IoT) have enabled myriad domains such
as smart homes, personal monitoring devices, and enhanced manufacturing. IoT is
now pervasive---new applications are being used in nearly every conceivable
environment, which leads to the adoption of device-based interaction and
automation. However, IoT has also raised issues about the security and privacy
of these digitally augmented spaces. Program analysis is crucial in identifying
those issues, yet the application and scope of program analysis in IoT remains
largely unexplored by the technical community. In this paper, we study privacy
and security issues in IoT that require program-analysis techniques with an
emphasis on identified attacks against these systems and defenses implemented
so far. Based on a study of five IoT programming platforms, we identify the key
insights that result from research efforts in both the program analysis and
security communities and relate the efficacy of program-analysis techniques to
security and privacy issues. We conclude by studying recent IoT analysis
systems and exploring their implementations. Through these explorations, we
highlight key challenges and opportunities in calibrating for the environments
in which IoT systems will be used.Comment: syntax and grammar error are fixed, and IoT platforms are updated to
match with the submissio
XSS Vulnerabilities in Cloud-Application Add-Ons
Cloud-application add-ons are microservices that extend the functionality of
the core applications. Many application vendors have opened their APIs for
third-party developers and created marketplaces for add-ons (also add-ins or
apps). This is a relatively new phenomenon, and its effects on the application
security have not been widely studied. It seems likely that some of the add-ons
have lower code quality than the core applications themselves and, thus, may
bring in security vulnerabilities. We found that many such add-ons are
vulnerable to cross-site scripting (XSS). The attacker can take advantage of
the document-sharing and messaging features of the cloud applications to send
malicious input to them. The vulnerable add-ons then execute client-side
JavaScript from the carefully crafted malicious input. In a major analysis
effort, we systematically studied 300 add-ons for three popular application
suites, namely Microsoft Office Online, G Suite and Shopify, and discovered a
significant percentage of vulnerable add-ons in each marketplace. We present
the results of this study, as well as analyze the add-on architectures to
understand how the XSS vulnerabilities can be exploited and how the threat can
be mitigated
Static analysis for discovering IoT vulnerabilities
The Open Web Application Security Project (OWASP), released the \u201cOWASP Top 10 Internet of Things 2018\u201d list of the high-priority security vulnerabilities for IoT systems. The diversity of these vulnerabilities poses a great challenge toward development of a robust solution for their detection and mitigation. In this paper, we discuss the relationship between these vulnerabilities and the ones listed by OWASP Top 10 (focused on Web applications rather than IoT systems), how these vulnerabilities can actually be exploited, and in which cases static analysis can help in preventing them. Then, we present an extension of an industrial analyzer (Julia) that already covers five out of the top seven vulnerabilities of OWASP Top 10, and we discuss which IoT Top 10 vulnerabilities might be detected by the existing analyses or their extension. The experimental results present the application of some existing Julia\u2019s analyses and their extension to IoT systems, showing its effectiveness of the analysis of some representative case studies
Introducing Automated Obstacle Detection to British Level Crossings
This paper discusses the implementation of automated obstacle detection to British level crossings to improve safety and efficiency, reduce costs and analyse how successful this could be. There are over 6000 level crossings in Britain, and they are the largest single risk to the railways; one method to improve their safety is by introducing automated obstacle detection. Over the last ten years, there have been, on average, nine deaths a year at level crossings (Rail Safety and Standards Board in Annual safety performance report. Rail Safety and Standards Board Limited, SL, 2016) (excluding suicides), making them a high priority for Network Rail to improve. Obstacle detection would not just help improve the safety of level crossings, but it could also reduce the costs associated with level crossing signallers and operators and would lower the waiting times for road vehicles and pedestrians. With research also being done into the future possibility of introducing autonomous trains to the British railways, the combination of this and the obstacle detection system proposed could see a large improvement in safety across the level crossings
Introducing the STAMP method in road tunnel safety assessment
After the tremendous accidents in European road tunnels over the past decade, many risk assessment methods have been proposed worldwide, most of them based on Quantitative Risk Assessment (QRA). Although QRAs are helpful to address physical aspects and facilities of tunnels, current approaches in the road tunnel field have limitations to model organizational aspects, software behavior and the adaptation of the tunnel system over time. This paper reviews the aforementioned limitations and highlights the need to enhance the safety assessment process of these critical infrastructures with a complementary approach that links the organizational factors to the operational and technical issues, analyze software behavior and models the dynamics of the tunnel system. To achieve this objective, this paper examines the scope for introducing a safety assessment method which is based on the systems thinking paradigm and draws upon the STAMP model. The method proposed is demonstrated through a case study of a tunnel ventilation system and the results show that it has the potential to identify scenarios that encompass both the technical system and the organizational structure. However, since the method does not provide quantitative estimations of risk, it is recommended to be used as a complementary approach to the traditional risk assessments rather than as an alternative. (C) 2012 Elsevier Ltd. All rights reserved
Torque-Displacement Binding Tester
Inadvertent release of a ski binding occurs when the ski binding releases the skier under non-injurious loading conditions and has been known to cause loss of control leading to severe upper body injury and death. Work required to release the ski boot from the ski binding is a parameter that influences the tendency for inadvertent release. The project utilized Suh’s Axiomatic method for the design of a device that measures work to release through the simultaneous measurements of torque and displacement. The optical mouse is tested and recommended as a low cost displacement sensor
A survey on the application of deep learning for code injection detection
Abstract Code injection is one of the top cyber security attack vectors in the modern world. To overcome the limitations of conventional signature-based detection techniques, and to complement them when appropriate, multiple machine learning approaches have been proposed. While analysing these approaches, the surveys focus predominantly on the general intrusion detection, which can be further applied to specific vulnerabilities. In addition, among the machine learning steps, data preprocessing, being highly critical in the data analysis process, appears to be the least researched in the context of Network Intrusion Detection, namely in code injection. The goal of this survey is to fill in the gap through analysing and classifying the existing machine learning techniques applied to the code injection attack detection, with special attention to Deep Learning. Our analysis reveals that the way the input data is preprocessed considerably impacts the performance and attack detection rate. The proposed full preprocessing cycle demonstrates how various machine-learning-based approaches for detection of code injection attacks take advantage of different input data preprocessing techniques. The most used machine learning methods and preprocessing stages have been also identified
- …