About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

IoT device profiling: From MUD files to S×C contracts

From

Örebro University1

Department of Applied Mathematics and Computer Science, Technical University of Denmark2

Embedded Systems Engineering, Department of Applied Mathematics and Computer Science, Technical University of Denmark3

Security is a serious, and often neglected, issue in the Internet of Things (IoT). In order to improve IoT security, researchers proposed to use Security-by-Contract (S×C), a paradigm originally designed for mobile application platforms. However, S×C assumes that manufacturers equip their devices with security contracts, which makes hard to integrate legacy devices with S×C.

In this paper, we explore a method to extract S×C contracts from legacy devices' Manufacturer Usage Descriptions (MUDs). We tested our solution on 28 different MUD files, and we show that it is possible to create basic S×C contracts, paving the way to complete extraction tools.

Language: English
Publisher: Gesellschaft fur Informatik (GI)
Year: 2020
Pages: 143-154
Proceedings: Open Identity Summit 2020
Series: Lecture Notes in Informatics (lni), Proceedings - Series of the Gesellschaft Fur Informatik (gi)
ISBN: 3885796996 and 9783885796992
ISSN: 16175468
Types: Conference paper
ORCIDs: Dragoni, Nicola

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis