TOP
Search the Dagstuhl Website
Looking for information on the websites of the individual seminars? - Then please:
Not found what you are looking for? - Some of our services have separate websites, each with its own search option. Please check the following list:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminars
Within this website:
External resources:
  • DOOR (for registering your stay at Dagstuhl)
  • DOSA (for proposing future Dagstuhl Seminars or Dagstuhl Perspectives Workshops)
Publishing
Within this website:
External resources:
dblp
Within this website:
External resources:
  • the dblp Computer Science Bibliography


Dagstuhl Seminar 24312

Security and Privacy of Current and Emerging IoT Devices and Systems

( Jul 28 – Aug 02, 2024 )

(Click in the middle of the image to enlarge)

Permalink
Please use the following short url to reference this page: https://www.dagstuhl.de/24312

Organizers

Contact

Shared Documents

Motivation

Over the past two decades, there has been a significant surge in the popularity of Internet-of-Things (IoT) devices. They have become ubiquitous in various settings, including private (e.g., homes, offices, and factories), semi-private (e.g., rentals and hotels), as well as public (e.g., cultural, entertainment, and transportation). They also play an important role in applications domains, such as military, agriculture, industrial processes, and vehicular automation. In many settings, IoT devices perform safety-critical functions. Furthermore, they are often interconnected and/or connected to the global Internet.

On the lower end, IoT devices are usually constructed using low-end micro-controller units (MCUs), which are subject to constraints on cost, size, and energy. Compared to their higher-end counterparts, these devices tend to lack security features. Due to the sensitive information they collect and their frequent involvement in safety-critical actuation tasks, they represent attractive targets for attacks. These attacks span a wide spectrum of concerns, ranging from privacy associated with sensing to safety and security in the context of actuation. There have even been instances of large-scale device zombification, exemplified by the infamous Mirai botnet.

This Dagstuhl Seminar aims to explore the landscape of attacks on IoT devices, discuss potential research directions for effective countermeasures, and facilitate the relationship between academia and industry in addressing these challenges.

Specific topics to be discussed include:

  1. Balancing mission-criticality, safety, and security in system design
  2. The role of secure hardware (Trusted Computing) in IoT security
  3. Realizing security/privacy services across hardware and software boundaries
  4. Addressing the scalability challenge in securing large IoT deployments
  5. The value of formal methods and verification in IoT security
  6. The lifecycle of digital twins for IoT devices
  7. Security challenges in unattended environments, such as low-orbit satellites
  8. Privacy implications of human/IoT relationships and data collection
  9. Security and privacy challenges in instrumented spaces
  10. Bridging the gap between academic research and industry needs

The seminar aims to foster collaboration between academia and industry to address the evolving security and privacy concerns of IoT devices and systems in an increasingly interconnected world.

Copyright Bruno Crispo, Alexandra Dmitrienko, Gene Tsudik, and Wenyuan Xu

Participants

Please log in to DOOR to see more details.

  • Z. Berkay Celik (Purdue University - West Lafayette, US) [dblp]
  • Alfred Chen (University of California, Irvine, US) [dblp]
  • Bruno Crispo (University of Trento, IT) [dblp]
  • Ivan De Oliveira Nunes (Rochester Institute of Technology, US) [dblp]
  • Xuhua Ding (SMU - Singapore, SG) [dblp]
  • Alexandra Dmitrienko (Universität Würzburg, DE) [dblp]
  • Jan-Erik Ekberg (Huawei Technologies - Helsinki, FI) [dblp]
  • Earlence Fernandes (University of California - San Diego, US) [dblp]
  • Kevin Fu (Northeastern University - Boston, US) [dblp]
  • Jorge Guajardo Merchan (Robert Bosch LLC - Pittsburgh, US) [dblp]
  • David Hock (Infosim - Würzburg, DE) [dblp]
  • Murtuza Jadliwala (University of Texas - San Antonio, US) [dblp]
  • Yongdae Kim (KAIST - Daejeon, KR) [dblp]
  • Farinaz Koushanfar (University of California at San Diego, US) [dblp]
  • Veelasha Moonsamy (Ruhr-Universität Bochum, DE) [dblp]
  • Surya Nepal (CSIRO - Eveleigh, AU) [dblp]
  • Panagiotis Papadimitratos (KTH Royal Institute of Technology - Kista, SE) [dblp]
  • Christina Pöpper (New York University - Abu Dhabi, AE) [dblp]
  • Sara Rampazzi (University of Florida - Gainesville, US) [dblp]
  • Kasper Rasmussen (University of Oxford, GB) [dblp]
  • Stefanie Roos (RPTU Kaiserslautern-Landau, DE) [dblp]
  • Ahmad-Reza Sadeghi (TU Darmstadt, DE) [dblp]
  • Nader Sehatbakhsh (University of California at Los Angeles, US) [dblp]
  • Christoph Sendner (Universität Würzburg, DE) [dblp]
  • Gene Tsudik (University of California - Irvine, US) [dblp]
  • Markus Wamser (Ingenics Digital - Gräfelfing, DE) [dblp]
  • Wenyuan Xu (Zhejiang University - Hangzhou, CN) [dblp]

Classification
  • Cryptography and Security
  • Hardware Architecture

Keywords
  • IoT
  • CPS
  • Smart Devices
  • Security
  • Privacy
  • Mission Criticality
  • Safety
  • Resilience
  • Trusted Computing
  • Computer Architecture