Search In this Thesis
   Search In this Thesis  
العنوان
Trust Coding for IoT\
المؤلف
Abd El-Rahman,Alyaa Abdou Hamza
هيئة الاعداد
باحث / علياء عبده حمزة عبد الرحمن
مشرف / أيمن محمد بهاء الدين صادق
مشرف / محمد علي علي صبح
مناقش / هشام عرفات علي
تاريخ النشر
2022.
عدد الصفحات
147p.:
اللغة
الإنجليزية
الدرجة
الدكتوراه
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
1/1/2022
مكان الإجازة
جامعة عين شمس - كلية الهندسة - قسم هندسة الحاسبات والنظم
الفهرس
Only 14 pages are availabe for public view

from 195

from 195

Abstract

The Internet of Things (IoT) provides the ability for humans and computers to learn and interact from billions of things, including devices, sensors, actuators, services, and other Internet-connected objects. IoT devices enable massive opportunities to automate everyday tasks by increasing machine-to-machine interaction. These smart devices have been used in several domains like healthcare, transportation, smart home, smart city, and more. However, this technology has been exposed to many vulnerabilities, which may lead to cybercrime. Since the number of incidents related to IoT devices is alarming, a new investigation approach is needed to handle the crime associated with IoT devices.
Recently, IoT systems are being rapidly developed with adequate consideration of the increasing need to face security challenges. This could be justified because IoT is an open invitation to hackers to control and attack connected IoT devices. In this context, the programming analysis (static and dynamic) technique is used to achieve a trusted coding for IoT that focuses on defending against attacks on these systems. Also, this technique is responsible for analyzing applications’ behavior accurately to support security & privacy.
Program Analysis (PA) is one of the essential security factors which has more than analysis techniques. These techniques successfully build perfect security analysis system (SAS) that can detect malware. There is a struggle remains between security analysts and malware developers. It is a battle that does not end quickly, because malware is always complex as fast as discovery grows. Analysis techniques examine IoT app source code to recognize applications’ security
Consequently, this thesis focuses on two significant contributions:
-The first is to follow the principles of systematic literature reviews to present a detailed and objective overview of a new taxonomy of the program analysis techniques and their related topics. It explains how to build SAS based on various program analysis techniques. Also. It covers SAS types, which play an essential role in identifying the suitable program analysis techniques to be used.
PA and its related topics have been introduced in the presented survey and taxonomy: the sensitivity and analysis characteristics. It gives a new classification of PA techniques. This classification has been created by examining the implemented security analysis system (SAS) that detect various malware applications. More importantly, this survey presents the three types of SAS that used PA methods for the first time. Also, It discussed the related surveys, the performance metrics of PA, IoT Security Issues, and Challenges.
-On the other side, the second contribution is to provide a new hybrid (static and dynamic) SAS based on the model-checking technique and deep learning, called an HSAS-MD analyzer, which focuses on the holistic analysis perspective of IoT apps. It aims to analyze the data of IoT apps by (i) converting the source code of the target applications to the format of a model checker that can deal with it. (ii) detecting any abnormal behavior in the IoT application. (iii) extracting the main static features from it to be tested & classified using a deep learning (CNN algorithm). (iv) verifying app behavior by using model-checking technique. HSAS-MD gives the best results in detecting malware from malicious smartThings applications compared to other SASs. The experimental results of HSAS-MD show that it provides 95%, 94%,91%, and 93%for accuracy, precision, recall, and F-measure, respectively. It also gives the best results in comparing with other analyzers from various criteria.