Title Slide - cs.cmu.edu

Title Slide Cs Cmu Edu-ppt Download

  • Date:27 Jul 2020
  • Views:15
  • Downloads:0
  • Size:9.01 MB

Share Presentation : Title Slide Cs Cmu Edu

Download and Preview : Title Slide Cs Cmu Edu

Report CopyRight/DMCA Form For : Title Slide Cs Cmu Edu


Transcription:

Challenges and Opportunities inthe Internet of ThingsMartin CarlisleDirector of Academic Affairs and Teaching Professor What is It .
A network of physical devicesembedded with software sensors actuators and the dataprocessing that facilitates it Cloud software and services.
in data centersFog 1 horizontal physical orvirtual resources between smartend devices and the cloudMist an optional lightweight.
Edge network layer of smartend devices and users The NIST Fog Computing Definition https csrc nist gov csrc media... documents sp800 191 draft pdf.
Image from https ayehu com how the intern... will complicate incident respo... What makes it unique Geographical distribution Location awareness.
Mobility Very large number of nodes Heterogeneity Interoperability federation Cyber physical interactions.
Real time analyticsEricsson forecast Wide Area includes cellphone plus unlicensed low power Sigfox LoRa Ingenu .
Short range unlicensed radioup to 100m e g Wi Fi Bluetooth Zigbee plus wiredImages from https www ericsson com en mobi... .
things forecastThere s a vast number ofconnectable things and thenumber that are beingconnected is growing rapidly .
Image from https www emc com leadership d... universe 2014iview internet of... What might you have today And on the town Medical IoT.
Imagine the Future What does this mean for Health Shopping Transportation.
Entertainment Energy Agriculture Manufacturing How do we power it .
Energy harvesting Piezeoelectric materials Photovoltaic Thermal Batteries .
https investorintel com sector... technology metals intel us vul... disconnect rare earth supply Carnegie Mellon Battery Research Lithium Air Batteries Venkat Viswanathan .
Biodegradeable batteries from cuttlefish ink Bettinger and Whitacre https www cmu edu news stories... http iopscience iop org articl... How can they all talk CHOIR.
SIGCOMM 2017 Carnegie Mellon paper by Diana Zhang Swarun Kumar andOsman Yaganhttp conferences sigcomm org s... http conferences sigcomm org s... Key Challenges.
http conferences sigcomm org s... http conferences sigcomm org s... http conferences sigcomm org s... http conferences sigcomm org s... http conferences sigcomm org s... .
Choir Resolving collisionshttp conferences sigcomm org s... Choir Resolving collisionsBecause these are cheap devices they have mismatches in their oscillatorshttp conferences sigcomm org s... .
http conferences sigcomm org s... Choir Resolving Inteferencehttp conferences sigcomm org s... Choir Conclusionhttp conferences sigcomm org s... .
How can they all talk BBCAlgorithm designed to solve the problem of jam resistant communicationEncrypt DecryptResistance ResistanceThe Glowworm hash Increased Speed and Security for BBC Unkeyed Jam Resistance Baird Carlisle Bahn and Smith MILCOM 2012.
New Field of Coding TheoryError detecting codes commu Error correcting codes commXnicXtionConcurrent codes communicationThe Glowworm hash Increased Speed and Security for BBC Unkeyed Jam Resistance Baird Carlisle Bahn and Smith MILCOM 2012.
Superimposed ImagesThe Glowworm hash Increased Speed and Security for BBC Unkeyed Jam Resistance Baird Carlisle Bahn and Smith MILCOM 2012 The Glowworm hash Increased Speed and Security for BBC Unkeyed Jam Resistance Baird Carlisle Bahn and Smith MILCOM 2012 The Glowworm hash Increased Speed and Security for BBC Unkeyed Jam Resistance Baird Carlisle Bahn and Smith MILCOM 2012 BBC Using UWB Pulses .
Message 1011Append zeros 101100Hash prefixes 1 HashBBC also supports CDMA directsequence and frequency hopping.
10110 Hash101100 HashThe Glowworm hash Increased Speed and Security for BBC Unkeyed Jam Resistance Baird Carlisle Bahn and Smith MILCOM 2012 Decoding100 101 110 111.
1000 1001 1010 1011 1110 111110000 10110 11100100000 101100The Glowworm hash Increased Speed and Security for BBC Unkeyed Jam Resistance Baird Carlisle Bahn and Smith MILCOM 2012 Decode Tree 5 Messages 1 3 Mark Density.
BBC Glowworm Incredibly fast hash 11 clock cycles per string 1 cycle per hash in FPGA Indistinguishable from all five SHA 3.
finalists using Cramer von Mises testThe Glowworm hash Increased Speed and Security for BBC Unkeyed Jam Resistance Baird Carlisle Bahn and Smith MILCOM 2012 How do we secure them Lots of work needed here Internet of Things.
DEFCON 201647 vulnerabilities in 23 IOT devices Smart door locks Padlocks Thermostats.
Refrigerators Wheelchairs Solar panel arrays Oct 2016 DDoS on Internet1 500 000 DVRs involved in Mirai botnet.
https www dynstatus com incide... InvestigatingStarting at 11 10 UTC on October 21st Friday 2016 we beganmonitoring and mitigating a DDoS attack against our Dyn ManagedDNS infrastructure Some customers may experience increased.
DNS query latency and delayed zone propagation during this time Updates will be posted as information becomes available By attacking DNS prevented users from getting to websiteswithout attacking the websites themselves Main culprit default username passwords.
2 Created by three people The Internet of unsafe Formal Methods VigNAT Formally Verify a stateful network device NetworkAddress Translation with competitive performance and.
reasonable human effort Arseniy Zaostrovnykh Solal Pirelli Luis Pedrosa Katerina Argyraki and GeorgeCandea 2017 A Formally Verified NAT In Proceedings of the Conference of theACM Special Interest Group on Data Communication SIGCOMM 17 Formal Methods VigNAT.
Key ideas Testing is cheap but leaves bugs Symbolic execution and formal algebras areinfeasible combine them Arseniy Zaostrovnykh Solal Pirelli Luis Pedrosa Katerina Argyraki and George.
Candea 2017 A Formally Verified NAT In Proceedings of the Conference of theACM Special Interest Group on Data Communication SIGCOMM 17 Formal Methods VigNAT Arseniy Zaostrovnykh Solal Pirelli Luis Pedrosa Katerina Argyraki and GeorgeCandea 2017 A Formally Verified NAT In Proceedings of the Conference of the.
ACM Special Interest Group on Data Communication SIGCOMM 17 Formal Methods VigNAT Arseniy Zaostrovnykh Solal Pirelli Luis Pedrosa Katerina Argyraki and GeorgeCandea 2017 A Formally Verified NAT In Proceedings of the Conference of theACM Special Interest Group on Data Communication SIGCOMM 17 .
Formal Methods Ironsides Create a DNS server that can beproven free of top securityvulnerabilities Key idea proving correctness is.
hard so prove data flow andexception free instead IRONSIDES DNS With No Single Packet Denial of Service or Remote Code Execution Vulnerabilities MartinCarlisle and Barry Fagin Proceedings of IEEE GLOBECOM December 2012 Proven Security Properties.
IRONSIDES Classic Buffer Overflow Incorrect calculation of buffer size Improper initialization Ineffective statements.
Integer overflow wraparound Information leakage Unvalidated input Proven Security Properties IRONSIDES 2 .
Allocation w o limits resource exhaustion Improper array indexing Null pointer dereferencing Expired pointer dereferencing use after free Type confusion.
Race conditions Incorrect conversions Uncontrolled format strings Proven Security Properties IRONSIDES 3 .
All loops guaranteed toterminate Beware the AIs Adversarial machine learning seeks to take atrained AI and fool it while making the.
difference imperceptible to humans Adversarial Machine Learninghttps arxiv org pdf 1712 07113... But can we do this in thereal world .
Accessorize to a Crime Real and Stealthy Attacks on State of the Art Face Recognition Sharif et al CCS 16 Other Unintended Consequenceshttp repository cmu edu cgi vi... Discussion.
“Of course, not all of those 200 billion things are actually wired and communicating on the Internet, but some 20 billion are. And, by 2020, this number will grow by 50% to 30 billion connected devices.”

Related Presentations