Show simple item record

dc.contributor.advisorEl Fakih, Khaled
dc.contributor.authorBhanpurawala, Alifiya
dc.date.accessioned2024-03-11T06:48:52Z
dc.date.available2024-03-11T06:48:52Z
dc.date.issued2023-11
dc.identifier.other35.232-2023.77
dc.identifier.urihttp://hdl.handle.net/11073/25489
dc.descriptionA Master of Science thesis in Computer Engineering by Alifiya Bhanpurawala entitled, “A Formal Assisted Approach for Modeling and Testing Security Attacks in IoT Edge Devices”, submitted in November 2023. Thesis advisor is Dr. Khaled El-Fakih. Soft copy is available (Thesis, Completion Certificate, Approval Signatures, and AUS Archives Consent Form).en_US
dc.description.abstractWith the rapid growth in the number of IoT devices being added to the network, a major concern that arises is the security of these systems. As these devices are resource constrained, safety measures are difficult to implement on the edge. We propose a novel approach for the detection of IoT device attacks based on the use of formal modelling and mutation testing. Namely, we model the behaviour of small IoT devices such as motion sensors and RFID card reader as state machines with timeouts. We also model basic IoT attacks; namely, battery draining, sleep deprivation, data falsification, replay, and man in the middle attacks, as special mutants of these specifications. We also consider tests for detecting actual physical device manipulation. Mutation testing is then used to derive tests that distinguish these attacks from the original specifications. The behaviour of these mutants is tested in real environment by running the tests on the data collected while the edge device is still running. Our experiments show that derived number of attack mutants and tests is small and thus these tests can be executed many times with limited overhead on the physical device. Consequently, our approach is not deterred by related high costs of traditional mutation testing. Furthermore, we demonstrate that the tests generated by our method, encompassing the considered IoT attacks, do not adequately cover mutants derived through conventional mutation code-based operators. This highlights the necessity of employing our method. A framework that implements our approach is presented along with some other relevant case studies.en_US
dc.description.sponsorshipCollege of Engineeringen_US
dc.description.sponsorshipDepartment of Computer Science and Engineeringen_US
dc.language.isoen_USen_US
dc.relation.ispartofseriesMaster of Science in Computer Engineering (MSCoE)en_US
dc.subjectInternet of thingsen_US
dc.subjectEdge devicesen_US
dc.subjectSecurity threatsen_US
dc.subjectMutation testingen_US
dc.subjectSecurity faultsen_US
dc.subjectAttacksen_US
dc.subjectFinite state machines with timeoutsen_US
dc.titleA Formal Assisted Approach for Modeling and Testing Security Attacks in IoT Edge Devicesen_US
dc.typeThesisen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record