CS 590 IoT/CPS
 Share
The version of the browser you are using is no longer supported. Please upgrade to a supported browser.Dismiss

View only
 
 
ABCDEFGHIJKLMNOPQRSTUVWXYZAAAB
1
CS 590 IoT/CPS Security-- Spring 2020, Presentation Topics and Assignments
Monday-Wednesday 4:30-5:45pm at REC (Recitation Bldg) Rm 309
2
DayDatePaperPresented byNote-taking student(s)Background Paper (Review required)NotesSuggested Reading
3
Monday1/13/2020Course Logistics (Presenter: Prof. Berkay Celik)
4
Wednesday1/15/2020Security Basics (Presenter: Prof. Berkay Celik)
5
1Monday1/20/2020MARTIN LUTHER KING JR. DAY (No Classes)
6
2Wednesday1/22/2020Security Analysis of IoT/CPS Systems (Presenter: Prof. Berkay Celik)
7
3Monday1/27/2020All Things Considered: An Analysis of IoT Devices on Home NetworksMichael (Slide deck is uploaded to Blackboard)Jahandideh, Ozmen Usenix Security 2019Cyber-Physical Systems and Internet
of Things, NIST Special Publication, 2019
Influential Security Papers
8
4Wednesday1/29/2020Guest Presenter:Topic: Principled Frameworks for Analyzing Security and Privacy Postures of Complex Networks and Cyber-Physical SystemsSyed Rafiul Hussain (PostDoc at Purdue) Abu Ishgair, Agarwal
9
5Monday2/3/2020Stealthy Tracking of Autonomous Vehicles with Cache Side ChannelsKhaled (Slide deck is uploaded to Blackboard)Reeves, ShivakumarVehicle Security: Experimental Security Analysis of a Modern Automobile (IEEE SP 2010)Usenix Security 2020Comprehensive Experimental Analyses of Automotive Attack Surfaces, USENIX Security 2011
10
6Wednesday2/5/2020(1) Optimizing Cryptography in Energy Harvesting Applications and (2) Secure application continuity in intermittent systemsOzgur (Slide deck is uploaded to Blackboard)Wei (Haoyang), KhaledPresentation of multiple papers and content from thesis
11
7Monday2/10/2020Detection of Electromagnetic Interference Attacks on Sensor SystemsEman Agarwal, JahandidehIEEE SP 2020Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses
12
8Wednesday2/12/2020Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home PlatformsBasaveshAbu Ishgair USENIX Security 2019Logic Bugs in IoT Platforms and Systems: A Review
13
9Monday2/17/2020Towards Automated Safety Vetting of PLC Code in Real-World PlantsAkashOzmenEmerging Threats in Internet of Things Voice Services (free access through Purdue Libraries)IEEE SP 2019Framework for Cyber-Physical Systems, NIST Special Publication Cyber Physical Systems Security
14
10Wednesday2/19/2020Guest Presenter: Topic: Robotic Vehicle (Drone) SecurityTaegyu Kim PhD student at PurdueSerag, Wei (Haoyang)
15
11Monday2/24/2020Wireless Attacks on Aircraft Instrument Landing SystemsRashidedinReeves USENIX Security 2019
16
12Wednesday2/26/2020Guest Presenter: Securing Safety-critical Systems using Physical and Control InvariantSriharsha Etigowni (PostDoc at Purdue)Wei (Wei)
17
Monday3/2/2020Project Progress presentations/discussions
18
Wednesday3/4/2020
19
13Monday3/9/2020Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming DevicesHaoyang Agarwal, JahandidehCCS 2019
20
14Wednesday3/11/2020
21
Monday3/16/2020Spring Break
22
Wednesday3/18/2020
23
15Monday3/23/2020
24
16Wednesday3/25/2020
25
17Monday3/30/2020
26
18Wednesday4/1/2020
27
19Monday4/6/2020
28
20Wednesday4/8/2020
29
21Monday4/13/2020
30
22Wednesday4/15/2020
31
23Monday4/20/2020
32
24Wednesday4/22/2020
33
25Monday4/27/2020
34
26Wednesday4/29/2020
35
Monday5/4/2020Research Project Presentations
36
Wednesday5/6/2020
37
38
39
40
41
42
Interesting papers assigned:
43
Logic Bugs in IoT Platforms and Systems: A Reviewsuggested to Ozgur
44
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
45
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products
46
47
Transactuations: Where Transactions Meet the Physical World
48
Battery draining attacks against edge computing nodes in IoT networks
49
Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft
50
Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
Loading...