论文标题

一种正式的辅助方法,用于建模和测试物联网边缘设备中的安全攻击

A Formal Assisted Approach for Modeling and Testing Security Attacks in IoT Edge Devices

论文作者

Bhanpurawala, A., El-Fakih, K., Zualkernan, I.

论文摘要

随着将物联网设备数量迅速增长到网络中,出现的主要问题是这些系统的安全性。由于这些设备受到资源的限制,因此安全措施难以在边缘实施。我们提出了一种基于形式建模和突变测试的使用,用于检测物联网设备攻击的新方法。也就是说,我们对小物联网设备(例如运动传感器和RFID读取器)作为状态机的行为进行建模。我们还建模基本的物联网攻击;也就是说,在中间攻击中排出电池,睡眠剥夺,数据伪造,重播和人,作为这些规格的特殊突变体。我们还考虑检测实际物理设备操纵的测试。然后,使用突变测试来得出将这些攻击与原始规格区分开的测试。这些突变体的行为通过对它们的测试进行测试在实际环境中测试。我们的实验表明,派生突变体和测试的数量很小,因此可以在物理设备上的开销有限的情况下执行这些测试多次。因此,我们的方法不会因传统突变测试的高昂成本而阻止。此外,我们还表明,我们的方法得出的测试涵盖了所有物联网攻击并不能很好地覆盖使用基于传统突变代码的操作员得出的突变体,这表明需要使用我们的方法。提出了实现我们方法的框架以及其他一些相关的案例研究。

With the rapid growth in the number of IoT devices being added to the network, a major concern that arises is the security of these systems. As these devices are resource constrained, safety measures are difficult to implement on the edge. We propose a novel approach for the detection of IoT device attacks based on the use of formal modeling and mutation testing. Namely, we model the behavior of small IoT devices such as motion sensors and RFID reader as state machines with timeouts. We also model basic IoT attacks; namely, battery draining, sleep deprivation, data falsification, replay, and man in the middle attacks, as special mutants of these specifications. We also consider tests for detecting actual physical device manipulation. Mutation testing is then used to derive tests that distinguish these attacks from the original specifications. The behavior of these mutants is tested in real environment by running the tests on them. Our experiments show that derived the number of attack mutants and tests is small and thus these tests can be executed many times with limited overhead on the physical device. Consequently, our approach is not deterred by related high costs of traditional mutation testing. In addition, we also show that tests derived by our method which cover all IoT attacks do not provide good coverage of mutants derived using traditional mutation code-based operators and this indicates the need of using our method. A framework that implements our approach is presented along with some other relevant case studies.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源