Cyber-Physical & IoT Security
Lying at the intersection of engineering and computer science, cyber-physical systems (CPS) are engineered systems built from, and dependent upon, the seamless integration of computation and physical components.
“CPS technologies are transforming the way people interact with engineered systems, just as the Internet has transformed the way people interact with information. New, smart CPS drive innovation and competition in a range of application domains including agriculture, aeronautics, building design, civil infrastructure, energy, environmental quality, healthcare and personalized medicine, manufacturing, and transportation. Moreover, the integration of artificial intelligence with CPS creates new research opportunities with major societal implications.” National Science Foundation
It is estimated that there will be 30 billion IoT devices by 2020. The global market value of IoT is projected to reach $7.1 trillion by 2020. At the same time, advances in CPSs and the Internet-of-Things (IoT) introduce new safety and security threats that require thought leadership to mitigate.
UCI students and faculty are active in cyber-physical systems and IoT security research, including product design, standards development, and the socio-economic impacts of these technologies. With the rapid trend towards direct integration of the physical world into computer-based systems, the potential positive impact of this research is substantial.
Below are several examples of IoT and CPS researchers, and research completed and underway, at UCI today.
Research Faculty
Mohammad Al Faruque
Associate Professor of Electrical Engineering & Computer Science
Alfred Chen
Assistant Professor of Computer Science
Brian Demsky
Professor Electrical Engineering & Computer Science
Ian Harris
Professor of Computer Science
Alfred Kobsa
Professor of Informatics (Emeritus)
Zhou Li
Assistant Professor of Electrical Engineering & Computer Science
Sharad Mehrotra
Professor of Computer Science
Gene Tsudik
Chancellor's Professor of Computer Science
Selected Research & Publications
Xuhua Ding, Gene Tsudik:
Initializing trust in smart devices via presence attestation. Computer Communications 131: 35-38 (2018)
N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.IEEE Trans. on CAD of Integrated Circuits and Systems 37(11): 2290-2300 (2018)
Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik:
Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security. AsiaCCS 2018: 313-327
Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
Reconciling remote attestation and safety-critical operation on simple IoT devices. DAC2018: 90:1-90:6
Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik:
Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malware. HOST 2018: 9-16
Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik:
US-AID: Unattended Scalable Attestation of IoT Devices. SRDS 2018: 21-30
Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.CoRR abs/1807.05002(2018)
Hailun Tan, Gene Tsudik, Sanjay Jha:
MTRA: Multiple-tier remote attestation in IoT networks. CNS 2017: 1-9
Saeed Mirzamohammadi, Justin A. Chen, Ardalan Amiri Sani, Sharad Mehrotra, Gene Tsudik:
Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices. SenSys 2017: 28:1-28:14
Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik:
C-FLAT: Control-Flow Attestation for Embedded Systems Software.ACM Conference on Computer and Communications Security 2016: 743-754
Franz Ferdinand Brasser, Kasper Bonne Rasmussen, Ahmad-Reza Sadeghi, Gene Tsudik:
Remote attestation for low-end embedded devices: the prover’s perspective. DAC 2016: 91:1-91:6
Tigist Abera, N. Asokan, Lucas Davi, Farinaz Koushanfar, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik:
Invited – Things, trouble, trust: on building trust in IoT systems. DAC2016: 121:1-121:6
Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Verifiable Round-Robin Scheme for Smart Homes.CoRR abs/1901.08618 (2019)
Mamadou H. Diallo, Nisha Panwar, Roberto Yus, Sharad Mehrotra:
Trustworthy Privacy Policy Translation in Untrusted IoT Environments. IoTBDS 2018: 132-143
Mamadou H. Diallo, Nisha Panwar, Sharad Mehrotra, Ardalan Amiri Sani:
Trustworthy Sensing in an Untrusted IoT Environment. PerCom Workshops 2018: 468-471
Sameera Ghayyur, Yan Chen, Roberto Yus, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau, Sharad Mehrotra:
IoT-Detective: Analyzing IoT Data Under Differential Privacy. SIGMOD Conference 2018: 1725-1728
Saeed Mirzamohammadi, Justin A. Chen, Ardalan Amiri Sani, Sharad Mehrotra, Gene Tsudik:
Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices. SenSys 2017: 28:1-28:14
Rahmadi Trimananda, Ali Younis, Bojun Wang, Bin Xu, Brian Demsky, Guoqing Harry Xu:
Vigilia: Securing Smart Home Edge Computing. SEC 2018: 74-89
Videos
Manufacturing Security
Automotive Security
This website uses cookies to ensure you get the best experience on our website. Read our policy.