Cyber-Physical & IoT Security

Lying at the intersection of engineering and computer science, cyber-physical systems (CPS) are engineered systems built from, and dependent upon, the seamless integration of computation and physical components.

“CPS technologies are transforming the way people interact with engineered systems, just as the Internet has transformed the way people interact with information. New, smart CPS drive innovation and competition in a range of application domains including agriculture, aeronautics, building design, civil infrastructure, energy, environmental quality, healthcare and personalized medicine, manufacturing, and transportation. Moreover, the integration of artificial intelligence with CPS creates new research opportunities with major societal implications.” National Science Foundation

It is estimated that there will be 30 billion IoT devices by 2020. The global market value of IoT is projected to reach $7.1 trillion by 2020. At the same time, advances in CPSs and the Internet-of-Things (IoT) introduce new safety and security threats that require thought leadership to mitigate.

UCI students and faculty are active in cyber-physical systems and IoT security research, including product design, standards development, and the socio-economic impacts of these technologies. With the rapid trend towards direct integration of the physical world into computer-based systems, the potential positive impact of this research is substantial.

Below are several examples of IoT and CPS researchers, and research completed and underway, at UCI today.

Research Faculty
Mohammad Al Faruque

Associate Professor of Electrical Engineering & Computer Science

Alfred Chen

Assistant Professor of Computer Science

Brian Demsky

Professor Electrical Engineering & Computer Science

Ian Harris
Ian Harris

Professor of Computer Science

Alfred Kobsa

Professor of Informatics (Emeritus)​

Zhou Li

Assistant Professor of Electrical Engineering & Computer Science

Sharad Mehrotra
Sharad Mehrotra

Professor of Computer Science

Gene Tsudik
Gene Tsudik

Chancellor's Professor of Computer Science

Selected Research & Publications

Xuhua Ding, Gene Tsudik:
Initializing trust in smart devices via presence attestation. Computer Communications 131: 35-38 (2018)

N. AsokanThomas NymanNorrathep RattanavipanonAhmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.IEEE Trans. on CAD of Integrated Circuits and Systems 37(11): 2290-2300 (2018)

Xavier CarpentKarim EldefrawyNorrathep Rattanavipanon, Gene Tsudik:
Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security. AsiaCCS 2018: 313-327

Xavier CarpentKarim EldefrawyNorrathep RattanavipanonAhmad-Reza Sadeghi, Gene Tsudik:
Reconciling remote attestation and safety-critical operation on simple IoT devices. DAC2018: 90:1-90:6

Xavier CarpentNorrathep Rattanavipanon, Gene Tsudik:
Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malware. HOST 2018: 9-16

Ahmad IbrahimAhmad-Reza Sadeghi, Gene Tsudik:
US-AID: Unattended Scalable Attestation of IoT Devices. SRDS 2018: 21-30 

AsokanThomas NymanNorrathep RattanavipanonAhmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.CoRR abs/1807.05002(2018)

Hailun Tan, Gene Tsudik, Sanjay Jha:
MTRA: Multiple-tier remote attestation in IoT networks. CNS 2017: 1-9

Saeed MirzamohammadiJustin A. ChenArdalan Amiri SaniSharad Mehrotra, Gene Tsudik:
Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices. SenSys 2017: 28:1-28:14

Tigist AberaN. AsokanLucas DaviJan-Erik EkbergThomas NymanAndrew PaverdAhmad-Reza Sadeghi, Gene Tsudik:
C-FLAT: Control-Flow Attestation for Embedded Systems Software.ACM Conference on Computer and Communications Security 2016: 743-754

Franz Ferdinand BrasserKasper Bonne RasmussenAhmad-Reza Sadeghi, Gene Tsudik:
Remote attestation for low-end embedded devices: the prover’s perspective. DAC 2016: 91:1-91:6

Tigist AberaN. AsokanLucas DaviFarinaz KoushanfarAndrew PaverdAhmad-Reza Sadeghi, Gene Tsudik:
Invited – Things, trouble, trust: on building trust in IoT systems. DAC2016: 121:1-121:6

Nisha PanwarShantanu SharmaGuoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Verifiable Round-Robin Scheme for Smart Homes.CoRR abs/1901.08618 (2019)

Mamadou H. DialloNisha PanwarRoberto Yus, Sharad Mehrotra:
Trustworthy Privacy Policy Translation in Untrusted IoT Environments. IoTBDS 2018: 132-143

Mamadou H. DialloNisha Panwar, Sharad Mehrotra, Ardalan Amiri Sani:
Trustworthy Sensing in an Untrusted IoT Environment. PerCom Workshops 2018: 468-471

Sameera GhayyurYan ChenRoberto YusAshwin MachanavajjhalaMichael HayGerome Miklau, Sharad Mehrotra:
IoT-Detective: Analyzing IoT Data Under Differential Privacy. SIGMOD Conference 2018: 1725-1728

Saeed MirzamohammadiJustin A. ChenArdalan Amiri Sani, Sharad Mehrotra, Gene Tsudik:
Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices. SenSys 2017: 28:1-28:14

Rahmadi TrimanandaAli YounisBojun WangBin Xu, Brian Demsky, Guoqing Harry Xu:
Vigilia: Securing Smart Home Edge Computing. SEC 2018: 74-89

Videos
Manufacturing Security
Automotive Security