TOP
Suche auf der Schloss Dagstuhl Webseite
Sie suchen nach Informationen auf den Webseiten der einzelnen Seminare? - Dann:
Nicht fündig geworden? - Einige unserer Dienste laufen auf separaten Webseiten mit jeweils eigener Suche. Bitte beachten Sie folgende Liste:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminare
Innerhalb dieser Seite:
Externe Seiten:
  • DOOR (zum Registrieren eines Dagstuhl Aufenthaltes)
  • DOSA (zum Beantragen künftiger Dagstuhl Seminare oder Dagstuhl Perspektiven Workshops)
Publishing
Innerhalb dieser Seite:
Externe Seiten:
dblp
Innerhalb dieser Seite:
Externe Seiten:
  • die Informatik-Bibliographiedatenbank dblp


Dagstuhl-Seminar 24312

Security and Privacy of Current and Emerging IoT Devices and Systems

( 28. Jul – 02. Aug, 2024 )

(zum Vergrößern in der Bildmitte klicken)

Permalink
Bitte benutzen Sie folgende Kurz-Url zum Verlinken dieser Seite: https://www.dagstuhl.de/24312

Organisatoren

Kontakt

Gemeinsame Dokumente

Motivation

Over the past two decades, there has been a significant surge in the popularity of Internet-of-Things (IoT) devices. They have become ubiquitous in various settings, including private (e.g., homes, offices, and factories), semi-private (e.g., rentals and hotels), as well as public (e.g., cultural, entertainment, and transportation). They also play an important role in applications domains, such as military, agriculture, industrial processes, and vehicular automation. In many settings, IoT devices perform safety-critical functions. Furthermore, they are often interconnected and/or connected to the global Internet.

On the lower end, IoT devices are usually constructed using low-end micro-controller units (MCUs), which are subject to constraints on cost, size, and energy. Compared to their higher-end counterparts, these devices tend to lack security features. Due to the sensitive information they collect and their frequent involvement in safety-critical actuation tasks, they represent attractive targets for attacks. These attacks span a wide spectrum of concerns, ranging from privacy associated with sensing to safety and security in the context of actuation. There have even been instances of large-scale device zombification, exemplified by the infamous Mirai botnet.

This Dagstuhl Seminar aims to explore the landscape of attacks on IoT devices, discuss potential research directions for effective countermeasures, and facilitate the relationship between academia and industry in addressing these challenges.

Specific topics to be discussed include:

  1. Balancing mission-criticality, safety, and security in system design
  2. The role of secure hardware (Trusted Computing) in IoT security
  3. Realizing security/privacy services across hardware and software boundaries
  4. Addressing the scalability challenge in securing large IoT deployments
  5. The value of formal methods and verification in IoT security
  6. The lifecycle of digital twins for IoT devices
  7. Security challenges in unattended environments, such as low-orbit satellites
  8. Privacy implications of human/IoT relationships and data collection
  9. Security and privacy challenges in instrumented spaces
  10. Bridging the gap between academic research and industry needs

The seminar aims to foster collaboration between academia and industry to address the evolving security and privacy concerns of IoT devices and systems in an increasingly interconnected world.

Copyright Bruno Crispo, Alexandra Dmitrienko, Gene Tsudik, and Wenyuan Xu

Teilnehmer

Please log in to DOOR to see more details.

  • Z. Berkay Celik (Purdue University - West Lafayette, US) [dblp]
  • Alfred Chen (University of California, Irvine, US) [dblp]
  • Bruno Crispo (University of Trento, IT) [dblp]
  • Ivan De Oliveira Nunes (Rochester Institute of Technology, US) [dblp]
  • Xuhua Ding (SMU - Singapore, SG) [dblp]
  • Alexandra Dmitrienko (Universität Würzburg, DE) [dblp]
  • Jan-Erik Ekberg (Huawei Technologies - Helsinki, FI) [dblp]
  • Earlence Fernandes (University of California - San Diego, US) [dblp]
  • Kevin Fu (Northeastern University - Boston, US) [dblp]
  • Jorge Guajardo Merchan (Robert Bosch LLC - Pittsburgh, US) [dblp]
  • David Hock (Infosim - Würzburg, DE) [dblp]
  • Murtuza Jadliwala (University of Texas - San Antonio, US) [dblp]
  • Yongdae Kim (KAIST - Daejeon, KR) [dblp]
  • Farinaz Koushanfar (University of California at San Diego, US) [dblp]
  • Veelasha Moonsamy (Ruhr-Universität Bochum, DE) [dblp]
  • Surya Nepal (CSIRO - Eveleigh, AU) [dblp]
  • Panagiotis Papadimitratos (KTH Royal Institute of Technology - Kista, SE) [dblp]
  • Christina Pöpper (New York University - Abu Dhabi, AE) [dblp]
  • Sara Rampazzi (University of Florida - Gainesville, US) [dblp]
  • Kasper Rasmussen (University of Oxford, GB) [dblp]
  • Stefanie Roos (RPTU Kaiserslautern-Landau, DE) [dblp]
  • Ahmad-Reza Sadeghi (TU Darmstadt, DE) [dblp]
  • Nader Sehatbakhsh (University of California at Los Angeles, US) [dblp]
  • Christoph Sendner (Universität Würzburg, DE) [dblp]
  • Gene Tsudik (University of California - Irvine, US) [dblp]
  • Markus Wamser (Ingenics Digital - Gräfelfing, DE) [dblp]
  • Wenyuan Xu (Zhejiang University - Hangzhou, CN) [dblp]

Klassifikation
  • Cryptography and Security
  • Hardware Architecture

Schlagworte
  • IoT
  • CPS
  • Smart Devices
  • Security
  • Privacy
  • Mission Criticality
  • Safety
  • Resilience
  • Trusted Computing
  • Computer Architecture