12
Secure Internet of Things Project Final Yearly Review June 18, 2019 Santa Cruz, CA

Secure Internet of Things Project - Stanford Universityiot.stanford.edu/retreat19/sitp19-intro.pdfRobert Szewczyk (Nest Labs) 2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Secure Internet of Things Project - Stanford Universityiot.stanford.edu/retreat19/sitp19-intro.pdfRobert Szewczyk (Nest Labs) 2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and

Secure Internet of Things Project

Final Yearly ReviewJune 18, 2019

Santa Cruz, CA

Page 2: Secure Internet of Things Project - Stanford Universityiot.stanford.edu/retreat19/sitp19-intro.pdfRobert Szewczyk (Nest Labs) 2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and

Goal

The Secure Internet of Things Project (SITP) is a 5-year collaboration between Stanford, UC Berkeley, and the University of Michigan to research fundamentally new, better ways to secure the Internet of Things and make them easy to use.

Page 3: Secure Internet of Things Project - Stanford Universityiot.stanford.edu/retreat19/sitp19-intro.pdfRobert Szewczyk (Nest Labs) 2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and

Over the Past 5 Years

• 76 publications

• 10 graduated Ph.D. students- Faculty at Princeton, UVA, MIT,

and undecided

• Technology transfer- Prio private data aggregation- Tock operating system- Bugs found in Node.js, Chrome's PDFium- TCPEno- Stellar Consensus Protocol - Bulletproofs

Page 4: Secure Internet of Things Project - Stanford Universityiot.stanford.edu/retreat19/sitp19-intro.pdfRobert Szewczyk (Nest Labs) 2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and

David MazièresStanfordSecurity

Björn HartmannBerkeley

Prototyping

Christos KozyrakisStanford

Cloud Architecture

Greg KovacsStanford

Medical Sensing

Page 5: Secure Internet of Things Project - Stanford Universityiot.stanford.edu/retreat19/sitp19-intro.pdfRobert Szewczyk (Nest Labs) 2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and

3G/4G, TCP/IP

eMbedded devices

Gateways Cloud

End application

IoT: MGC Architecture

6lowpan, ZigBee, ZWave,

Bluetooth, WiFi,

WirelessHART

Page 6: Secure Internet of Things Project - Stanford Universityiot.stanford.edu/retreat19/sitp19-intro.pdfRobert Szewczyk (Nest Labs) 2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and

Today

• Talks from faculty, students, and guests

• Mixture of current work, retrospectives, and future directions

Page 7: Secure Internet of Things Project - Stanford Universityiot.stanford.edu/retreat19/sitp19-intro.pdfRobert Szewczyk (Nest Labs) 2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and

Technical Program9:15-9:45 True2F: Backdoor-resistant authentication tokens, Emma Dautermann

9:45-10:15 Dynamic Multi-Clock Management with Power Clocks, Amit Levy

10:15-10:45 Private Video Analytics as a Cloud Service, Rishabh Poddar

11:15-12:00 A Modular Platform for Nanopower Computing, Pat Pannuto

1:00-2:00 Embedded Networking and Security in Consumer Devices: A Five Year Retrospective, Robert Szewczyk (Nest Labs)

2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT, Sam Kumar

2:30-3:00 Finding Bugs in Very Good Code, Fraser Brown

3:30-4:00 Real-world IoT Deployment and Recent DDoS Attacks, Zakir Durumeric

4:00-4:45 Securing the Internet of Things: Lessons Learned and Looking Forward, Philip Levis

Page 8: Secure Internet of Things Project - Stanford Universityiot.stanford.edu/retreat19/sitp19-intro.pdfRobert Szewczyk (Nest Labs) 2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and

New Cryptosystems9:15-9:45 True2F: Backdoor-resistant authentication tokens, Emma Dautermann

9:45-10:15 Dynamic Multi-Clock Management with Power Clocks, Amit Levy

10:15-10:45 Private Video Analytics as a Cloud Service, Rishabh Poddar

11:15-12:00 A Modular Platform for Nanopower Computing, Pat Pannuto

1:00-2:00 Embedded Networking and Security in Consumer Devices: A Five Year Retrospective, Robert Szewczyk (Nest Labs)

2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT, Sam Kumar

2:30-3:00 Finding Bugs in Very Good Code, Fraser Brown

3:30-4:00 Real-world IoT Deployment and Recent DDoS Attacks, Zakir Durumeric

4:00-4:45 Securing the Internet of Things: Lessons Learned and Looking Forward, Philip Levis

Page 9: Secure Internet of Things Project - Stanford Universityiot.stanford.edu/retreat19/sitp19-intro.pdfRobert Szewczyk (Nest Labs) 2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and

IoT Software and Platforms9:15-9:45 True2F: Backdoor-resistant authentication tokens, Emma Dautermann

9:45-10:15 Dynamic Multi-Clock Management with Power Clocks, Amit Levy

10:15-10:45 Private Video Analytics as a Cloud Service, Rishabh Poddar

11:15-12:00 A Modular Platform for Nanopower Computing, Pat Pannuto

1:00-2:00 Embedded Networking and Security in Consumer Devices: A Five Year Retrospective, Robert Szewczyk (Nest Labs)

2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT, Sam Kumar

2:30-3:00 Finding Bugs in Very Good Code, Fraser Brown

3:30-4:00 Real-world IoT Deployment and Recent DDoS Attacks, Zakir Durumeric

4:00-4:45 Securing the Internet of Things: Lessons Learned and Looking Forward, Philip Levis

Page 10: Secure Internet of Things Project - Stanford Universityiot.stanford.edu/retreat19/sitp19-intro.pdfRobert Szewczyk (Nest Labs) 2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and

Emerging Threats9:15-9:45 True2F: Backdoor-resistant authentication tokens, Emma Dautermann

9:45-10:15 Dynamic Multi-Clock Management with Power Clocks, Amit Levy

10:15-10:45 Private Video Analytics as a Cloud Service, Rishabh Poddar

11:15-12:00 A Modular Platform for Nanopower Computing, Pat Pannuto

1:00-2:00 Embedded Networking and Security in Consumer Devices: A Five Year Retrospective, Robert Szewczyk (Nest Labs)

2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT, Sam Kumar

2:30-3:00 Finding Bugs in Very Good Code, Fraser Brown

3:30-4:00 Real-world IoT Deployment and Recent DDoS Attacks, Zakir Durumeric

4:00-4:45 Securing the Internet of Things: Lessons Learned and Looking Forward, Philip Levis

Page 11: Secure Internet of Things Project - Stanford Universityiot.stanford.edu/retreat19/sitp19-intro.pdfRobert Szewczyk (Nest Labs) 2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and

Bigger Picture9:15-9:45 True2F: Backdoor-resistant authentication tokens, Emma Dautermann

9:45-10:15 Dynamic Multi-Clock Management with Power Clocks, Amit Levy

10:15-10:45 Private Video Analytics as a Cloud Service, Rishabh Poddar

11:15-12:00 A Modular Platform for Nanopower Computing, Pat Pannuto

1:00-2:00 Embedded Networking and Security in Consumer Devices: A Five Year Retrospective, Robert Szewczyk (Nest Labs)

2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT, Sam Kumar

2:30-3:00 Finding Bugs in Very Good Code, Fraser Brown

3:30-4:00 Real-world IoT Deployment and Recent DDoS Attacks, Zakir Durumeric

4:00-4:45 Securing the Internet of Things: Lessons Learned and Looking Forward, Philip Levis

Page 12: Secure Internet of Things Project - Stanford Universityiot.stanford.edu/retreat19/sitp19-intro.pdfRobert Szewczyk (Nest Labs) 2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and

Closing

After the last talk, we'll have a small celebration (with cake) to recognize all of the hard work, research results, generous support, and accomplishments over the past 5 years.