Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
Secure Internet of Things Project
Final Yearly ReviewJune 18, 2019
Santa Cruz, CA
Goal
The Secure Internet of Things Project (SITP) is a 5-year collaboration between Stanford, UC Berkeley, and the University of Michigan to research fundamentally new, better ways to secure the Internet of Things and make them easy to use.
Over the Past 5 Years
• 76 publications
• 10 graduated Ph.D. students- Faculty at Princeton, UVA, MIT,
and undecided
• Technology transfer- Prio private data aggregation- Tock operating system- Bugs found in Node.js, Chrome's PDFium- TCPEno- Stellar Consensus Protocol - Bulletproofs
David MazièresStanfordSecurity
Björn HartmannBerkeley
Prototyping
Christos KozyrakisStanford
Cloud Architecture
Greg KovacsStanford
Medical Sensing
3G/4G, TCP/IP
eMbedded devices
Gateways Cloud
End application
IoT: MGC Architecture
6lowpan, ZigBee, ZWave,
Bluetooth, WiFi,
WirelessHART
Today
• Talks from faculty, students, and guests
• Mixture of current work, retrospectives, and future directions
Technical Program9:15-9:45 True2F: Backdoor-resistant authentication tokens, Emma Dautermann
9:45-10:15 Dynamic Multi-Clock Management with Power Clocks, Amit Levy
10:15-10:45 Private Video Analytics as a Cloud Service, Rishabh Poddar
11:15-12:00 A Modular Platform for Nanopower Computing, Pat Pannuto
1:00-2:00 Embedded Networking and Security in Consumer Devices: A Five Year Retrospective, Robert Szewczyk (Nest Labs)
2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT, Sam Kumar
2:30-3:00 Finding Bugs in Very Good Code, Fraser Brown
3:30-4:00 Real-world IoT Deployment and Recent DDoS Attacks, Zakir Durumeric
4:00-4:45 Securing the Internet of Things: Lessons Learned and Looking Forward, Philip Levis
New Cryptosystems9:15-9:45 True2F: Backdoor-resistant authentication tokens, Emma Dautermann
9:45-10:15 Dynamic Multi-Clock Management with Power Clocks, Amit Levy
10:15-10:45 Private Video Analytics as a Cloud Service, Rishabh Poddar
11:15-12:00 A Modular Platform for Nanopower Computing, Pat Pannuto
1:00-2:00 Embedded Networking and Security in Consumer Devices: A Five Year Retrospective, Robert Szewczyk (Nest Labs)
2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT, Sam Kumar
2:30-3:00 Finding Bugs in Very Good Code, Fraser Brown
3:30-4:00 Real-world IoT Deployment and Recent DDoS Attacks, Zakir Durumeric
4:00-4:45 Securing the Internet of Things: Lessons Learned and Looking Forward, Philip Levis
IoT Software and Platforms9:15-9:45 True2F: Backdoor-resistant authentication tokens, Emma Dautermann
9:45-10:15 Dynamic Multi-Clock Management with Power Clocks, Amit Levy
10:15-10:45 Private Video Analytics as a Cloud Service, Rishabh Poddar
11:15-12:00 A Modular Platform for Nanopower Computing, Pat Pannuto
1:00-2:00 Embedded Networking and Security in Consumer Devices: A Five Year Retrospective, Robert Szewczyk (Nest Labs)
2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT, Sam Kumar
2:30-3:00 Finding Bugs in Very Good Code, Fraser Brown
3:30-4:00 Real-world IoT Deployment and Recent DDoS Attacks, Zakir Durumeric
4:00-4:45 Securing the Internet of Things: Lessons Learned and Looking Forward, Philip Levis
Emerging Threats9:15-9:45 True2F: Backdoor-resistant authentication tokens, Emma Dautermann
9:45-10:15 Dynamic Multi-Clock Management with Power Clocks, Amit Levy
10:15-10:45 Private Video Analytics as a Cloud Service, Rishabh Poddar
11:15-12:00 A Modular Platform for Nanopower Computing, Pat Pannuto
1:00-2:00 Embedded Networking and Security in Consumer Devices: A Five Year Retrospective, Robert Szewczyk (Nest Labs)
2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT, Sam Kumar
2:30-3:00 Finding Bugs in Very Good Code, Fraser Brown
3:30-4:00 Real-world IoT Deployment and Recent DDoS Attacks, Zakir Durumeric
4:00-4:45 Securing the Internet of Things: Lessons Learned and Looking Forward, Philip Levis
Bigger Picture9:15-9:45 True2F: Backdoor-resistant authentication tokens, Emma Dautermann
9:45-10:15 Dynamic Multi-Clock Management with Power Clocks, Amit Levy
10:15-10:45 Private Video Analytics as a Cloud Service, Rishabh Poddar
11:15-12:00 A Modular Platform for Nanopower Computing, Pat Pannuto
1:00-2:00 Embedded Networking and Security in Consumer Devices: A Five Year Retrospective, Robert Szewczyk (Nest Labs)
2:00-2:30 JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT, Sam Kumar
2:30-3:00 Finding Bugs in Very Good Code, Fraser Brown
3:30-4:00 Real-world IoT Deployment and Recent DDoS Attacks, Zakir Durumeric
4:00-4:45 Securing the Internet of Things: Lessons Learned and Looking Forward, Philip Levis
Closing
After the last talk, we'll have a small celebration (with cake) to recognize all of the hard work, research results, generous support, and accomplishments over the past 5 years.