CS 590 IoT/CPS
 Share
The version of the browser you are using is no longer supported. Please upgrade to a supported browser.Dismiss

View only
 
 
 
ABCDEFGHIJKLMNOPQRSTUVWXYZAAAB
1
CS 590 IoT/CPS Security-- Spring 2020, Presentation Topics and Assignments
Monday-Wednesday 4:30-5:45pm at REC (Recitation Bldg) Rm 309
2
CS 590 REMOTE MEETING INSTRUCTIONS: Meeting number:649 620 514 Meeting password:CS590
Meeting link:
https://purdue.webex.com/purdue/j.php?MTID=m5c827bc2d14ea5f58cf72feea6273698
Host key: 647869
Video address:
Dial 649620514@purdue.webex.com
You can also dial 173.243.2.68 and enter your meeting number.
Notes: Here is a quick tutorial on how to join Webex meetings (https://www.youtube.com/watch?v=fE5FnEUKtaE)
3
DayDatePaperPresented byNote-taking student(s)Background Paper (Review required)NotesSuggested Reading
4
Monday1/13/2020Course Logistics (Presenter: Prof. Berkay Celik)
5
Wednesday1/15/2020Security Basics (Presenter: Prof. Berkay Celik)
6
1Monday1/20/2020MARTIN LUTHER KING JR. DAY (No Classes)
7
2Wednesday1/22/2020Security Analysis of IoT/CPS Systems (Presenter: Prof. Berkay Celik)
8
3Monday1/27/2020All Things Considered: An Analysis of IoT Devices on Home NetworksMichael (Slide deck is uploaded to Blackboard)Jahandideh, Ozmen Usenix Security 2019Cyber-Physical Systems and Internet
of Things, NIST Special Publication, 2019
Influential Security Papers
9
4Wednesday1/29/2020Guest Presenter:Topic: Principled Frameworks for Analyzing Security and Privacy Postures of Complex Networks and Cyber-Physical SystemsSyed Rafiul Hussain (PostDoc at Purdue) Abu Ishgair, Agarwal
10
5Monday2/3/2020Stealthy Tracking of Autonomous Vehicles with Cache Side ChannelsKhaled (Slide deck is uploaded to Blackboard)Reeves, ShivakumarVehicle Security: Experimental Security Analysis of a Modern Automobile (IEEE SP 2010)Usenix Security 2020Comprehensive Experimental Analyses of Automotive Attack Surfaces, USENIX Security 2011
11
6Wednesday2/5/2020(1) Optimizing Cryptography in Energy Harvesting Applications and (2) Secure application continuity in intermittent systemsOzgur (Slide deck is uploaded to Blackboard)Wei (Haoyang), KhaledPresentation of multiple papers and content from thesis
12
7Monday2/10/2020Detection of Electromagnetic Interference Attacks on Sensor SystemsEman Agarwal, JahandidehIEEE SP 2020Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses
13
8Wednesday2/12/2020Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home PlatformsBasaveshAbu Ishgair USENIX Security 2019
14
9Monday2/17/2020Towards Automated Safety Vetting of PLC Code in Real-World PlantsAkashOzmenEmerging Threats in Internet of Things Voice Services (free access through Purdue Libraries)IEEE SP 2019Framework for Cyber-Physical Systems, NIST Special Publication Cyber Physical Systems Security
15
10Wednesday2/19/2020Guest Presenter: Topic: Robotic Vehicle (Drone) SecurityTaegyu Kim (PhD student at Purdue)Serag, Wei (Haoyang)
16
11Monday2/24/2020Wireless Attacks on Aircraft Instrument Landing SystemsRashidedinWei (Wei) USENIX Security 2019
17
12Wednesday2/26/2020Guest Presenter: Securing Safety-critical Systems using Physical and Control InvariantSriharsha Etigowni (PostDoc at Purdue)Ozmen
18
Monday3/2/2020Project Progress presentations/discussions
March 2 Presenters: Ozgur, Bash
19
Wednesday3/4/2020CERIAS Presentation: Physics-Based Approaches for creating Cyber Resilient Systems (Matt Mickelson)
20
Monday3/9/2020Project Progress presentations/discussions
March 9 Presenters:
Rashidedin-Haoyang, Wei (Wei), Eman, Akash, Michael
21
13Wednesday3/11/2020Lecture is postponed
22
Monday3/16/2020Spring Break
23
Wednesday3/18/2020
24
14Monday3/23/2020Guest Presenter: Fuzzing (a software vulnerability discovery technique)Prashast Srivastava (PhD student at Purdue)OzmenThe Art, Science, and Engineering of Fuzzing: A Survey
25
15Wednesday3/25/2020Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming DevicesHaoyang BasaveshCCS 2019
26
16Monday3/30/2020Battery draining attacks against edge computing nodes in IoT networksWei WeiWei (Haoyang), KhaledProgram Analysis of Commodity IoT Apps for
Security and Privacy: Challenges and Opportunities (access through Purdue Libraries)
-
27
17Wednesday4/1/2020Charting the Atack Surface of Trigger-Action IoT PlatformsOzgurReevesCCS 2019
28
18Monday4/6/2020
Logic Bugs in IoT Platforms and Systems: A Review
Michael JahandideharXiv 2020Logic Bugs in IoT Platforms and Systems: A Review
29
19Wednesday4/8/2020Autonomous Vehicle Security: Problems and ChallengesKhaled Abu Ishgair---
30
20Monday4/13/2020Injecting Inaudible Commands into Over-the-air Voice Controlled SystemsBasaveshWei (Wei)NDSS 2020
31
21Wednesday4/15/2020DeepXplore: Automated Whitebox Testing of Deep Learning SystemsRashedAgarwalTowards the Science of Security and Privacy in Machine LearningSOSP 2017
32
22Monday4/20/2020Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant SystemsEmanOzmenIEEE SP 2019
33
23Wednesday4/22/2020Towards a Natural Perspective of Smart Homes for Practical Security and Safety AnalysesWei (Haoyang)Abu IshgairIEEE SP 2020
34
24Monday4/27/2020Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical SystemAkashBasaveshIEEE SP 2018
35
25Wednesday4/29/2020Wrap up
36
Tuesday5/5/2020Final Research Project Presentations - Project Report Submissions -- Tue 01:00p - 03:00p REC 309
Presentation Schedule: Akash (1-1:20pm), Eman (1:20-1:40pm), Basavesh (1:40-2pm), Rashed and Hoayong (2-20pm), Ozgur (2:20-2:40), and Wei (2:40-3pm).
37
38
39
40
41
42
43
44
45
Papers proposed
46
Logic Bugs in IoT Platforms and Systems: A Review
47
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
48
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products
49
Can Bus security
50
Transactuations: Where Transactions Meet the Physical World
51
Battery draining attacks against edge computing nodes in IoT networks
52
Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft
53
Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors
54
Towards a Natural Perspective of Smart Homes for
Practical Security and Safety Analyses
55
CCS1928 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics
56
SoK: A Minimalist Approach to Formalizing Analog Sensor Security
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100