Protecting the Security of Sensor Systems
dc.contributor.author | Bolton, Connor | |
dc.date.accessioned | 2022-05-25T15:17:43Z | |
dc.date.available | 2022-05-25T15:17:43Z | |
dc.date.issued | 2022 | |
dc.date.submitted | 2022 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/172514 | |
dc.description.abstract | Sensors are a ubiquitous part of modern life, providing crucial data about the physical state of the world in application areas including entertainment in smartphones and virtual reality, transportation in aviation or (semi-)autonomous vehicles, manufacturing, smart infrastructure, and more. Thus a crucial aspect of ensuring the availability, integrity, and confidentiality of these applications is to ensure the same qualities in sensor systems. However, research shows how sensors may produce undesirable output that compromises security or privacy due to interaction with physical signals. For example, research shows that microphone output, representing sound, can instead represent light, a completely different quality. Adversaries can use this vector to launch attacks on sensor-reliant systems. This dissertation posits the question, "How is systemic design for mitigating physically-based sensing vulnerabilities possible?" and sets a goal of laying the groundwork to enable such systemic design. This work contributes: Methods, models, and language to categorize and analyze the space of physical sensor security. The primary categorization is between transduction and oversensing vulnerabilities. The Transduction Attack Model (TAM) provides a mathematical model to describe and categorize existing transduction vulnerabilities. For oversensing, the Anti-Oversensing System (OA-Sys) identifies categories of oversensing. Mitigation design patterns for many physical sensor vulnerabilities to aid manufacturers and operating system designers. Specifically, existing mitigations for transduction vulnerabilities are categorized using TAM to reveal common design patterns to mitigate most oversensing vulnerabilities. OA-Sys provides preliminary mitigation designs for common sensor use-cases in smartphones. Specific case studies of how to apply higher-level knowledge on transduction and oversensing vulnerabilities learned in TAM and OA-Sys to specific problems. Blue Note described two transduction vulnerabilities using acoustic waves to interrupt hard disk drive availability. Touchtone Eavesdropping uses motion sensor data to sense user input in smartphones via how motion sensors capture mechanically coupled sound. | |
dc.language.iso | en_US | |
dc.subject | computer science | |
dc.subject | security | |
dc.subject | privacy | |
dc.subject | sensors | |
dc.subject | cyber-physical security | |
dc.title | Protecting the Security of Sensor Systems | |
dc.type | Thesis | |
dc.description.thesisdegreename | PhD | en_US |
dc.description.thesisdegreediscipline | Computer Science & Engineering | |
dc.description.thesisdegreegrantor | University of Michigan, Horace H. Rackham School of Graduate Studies | |
dc.contributor.committeemember | Fu, Kevin | |
dc.contributor.committeemember | Liu, Mingyan | |
dc.contributor.committeemember | Mao, Z Morley | |
dc.contributor.committeemember | Rampazzi, Sara | |
dc.subject.hlbsecondlevel | Computer Science | |
dc.subject.hlbtoplevel | Engineering | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/172514/1/mcbolto_1.pdf | |
dc.identifier.doi | https://dx.doi.org/10.7302/4543 | |
dc.identifier.orcid | 0000-0003-4079-7846 | |
dc.identifier.name-orcid | Bolton, Connor; 0000-0003-4079-7846 | en_US |
dc.working.doi | 10.7302/4543 | en |
dc.owningcollname | Dissertations and Theses (Ph.D. and Master's) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.