Movatterモバイル変換


[0]ホーム

URL:


Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation,member institutions, and all contributors.Donate
arxiv logo>cs> arXiv:2210.05623
arXiv logo
Cornell University Logo

Computer Science > Cryptography and Security

arXiv:2210.05623 (cs)
[Submitted on 11 Oct 2022]

Title:A Formal Assisted Approach for Modeling and Testing Security Attacks in IoT Edge Devices

View PDF
Abstract:With the rapid growth in the number of IoT devices being added to the network, a major concern that arises is the security of these systems. As these devices are resource constrained, safety measures are difficult to implement on the edge. We propose a novel approach for the detection of IoT device attacks based on the use of formal modeling and mutation testing. Namely, we model the behavior of small IoT devices such as motion sensors and RFID reader as state machines with timeouts. We also model basic IoT attacks; namely, battery draining, sleep deprivation, data falsification, replay, and man in the middle attacks, as special mutants of these specifications. We also consider tests for detecting actual physical device manipulation. Mutation testing is then used to derive tests that distinguish these attacks from the original specifications. The behavior of these mutants is tested in real environment by running the tests on them. Our experiments show that derived the number of attack mutants and tests is small and thus these tests can be executed many times with limited overhead on the physical device. Consequently, our approach is not deterred by related high costs of traditional mutation testing. In addition, we also show that tests derived by our method which cover all IoT attacks do not provide good coverage of mutants derived using traditional mutation code-based operators and this indicates the need of using our method. A framework that implements our approach is presented along with some other relevant case studies.
Subjects:Cryptography and Security (cs.CR); Software Engineering (cs.SE)
Cite as:arXiv:2210.05623 [cs.CR]
 (orarXiv:2210.05623v1 [cs.CR] for this version)
 https://doi.org/10.48550/arXiv.2210.05623
arXiv-issued DOI via DataCite

Submission history

From: Khaled El-Fakih [view email]
[v1] Tue, 11 Oct 2022 17:09:02 UTC (1,282 KB)
Full-text links:

Access Paper:

  • View PDF
  • Other Formats
Current browse context:
cs.CR
Change to browse by:
export BibTeX citation

Bookmark

BibSonomy logoReddit logo

Bibliographic and Citation Tools

Bibliographic Explorer(What is the Explorer?)
Connected Papers(What is Connected Papers?)
scite Smart Citations(What are Smart Citations?)

Code, Data and Media Associated with this Article

CatalyzeX Code Finder for Papers(What is CatalyzeX?)
Hugging Face(What is Huggingface?)
Papers with Code(What is Papers with Code?)

Demos

Hugging Face Spaces(What is Spaces?)

Recommenders and Search Tools

Influence Flower(What are Influence Flowers?)
CORE Recommender(What is CORE?)

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community?Learn more about arXivLabs.

Which authors of this paper are endorsers? |Disable MathJax (What is MathJax?)

[8]ページ先頭

©2009-2025 Movatter.jp