Show simple item record

Protecting the Security of Sensor Systems

dc.contributor.authorBolton, Connor
dc.date.accessioned2022-05-25T15:17:43Z
dc.date.available2022-05-25T15:17:43Z
dc.date.issued2022
dc.date.submitted2022
dc.identifier.urihttps://hdl.handle.net/2027.42/172514
dc.description.abstractSensors are a ubiquitous part of modern life, providing crucial data about the physical state of the world in application areas including entertainment in smartphones and virtual reality, transportation in aviation or (semi-)autonomous vehicles, manufacturing, smart infrastructure, and more. Thus a crucial aspect of ensuring the availability, integrity, and confidentiality of these applications is to ensure the same qualities in sensor systems. However, research shows how sensors may produce undesirable output that compromises security or privacy due to interaction with physical signals. For example, research shows that microphone output, representing sound, can instead represent light, a completely different quality. Adversaries can use this vector to launch attacks on sensor-reliant systems. This dissertation posits the question, "How is systemic design for mitigating physically-based sensing vulnerabilities possible?" and sets a goal of laying the groundwork to enable such systemic design. This work contributes: Methods, models, and language to categorize and analyze the space of physical sensor security. The primary categorization is between transduction and oversensing vulnerabilities. The Transduction Attack Model (TAM) provides a mathematical model to describe and categorize existing transduction vulnerabilities. For oversensing, the Anti-Oversensing System (OA-Sys) identifies categories of oversensing. Mitigation design patterns for many physical sensor vulnerabilities to aid manufacturers and operating system designers. Specifically, existing mitigations for transduction vulnerabilities are categorized using TAM to reveal common design patterns to mitigate most oversensing vulnerabilities. OA-Sys provides preliminary mitigation designs for common sensor use-cases in smartphones. Specific case studies of how to apply higher-level knowledge on transduction and oversensing vulnerabilities learned in TAM and OA-Sys to specific problems. Blue Note described two transduction vulnerabilities using acoustic waves to interrupt hard disk drive availability. Touchtone Eavesdropping uses motion sensor data to sense user input in smartphones via how motion sensors capture mechanically coupled sound.
dc.language.isoen_US
dc.subjectcomputer science
dc.subjectsecurity
dc.subjectprivacy
dc.subjectsensors
dc.subjectcyber-physical security
dc.titleProtecting the Security of Sensor Systems
dc.typeThesis
dc.description.thesisdegreenamePhDen_US
dc.description.thesisdegreedisciplineComputer Science & Engineering
dc.description.thesisdegreegrantorUniversity of Michigan, Horace H. Rackham School of Graduate Studies
dc.contributor.committeememberFu, Kevin
dc.contributor.committeememberLiu, Mingyan
dc.contributor.committeememberMao, Z Morley
dc.contributor.committeememberRampazzi, Sara
dc.subject.hlbsecondlevelComputer Science
dc.subject.hlbtoplevelEngineering
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/172514/1/mcbolto_1.pdf
dc.identifier.doihttps://dx.doi.org/10.7302/4543
dc.identifier.orcid0000-0003-4079-7846
dc.identifier.name-orcidBolton, Connor; 0000-0003-4079-7846en_US
dc.working.doi10.7302/4543en
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.