2024 Workshop on

Privacy-Preserving and Trustworthy Ubiquitous Computing: 

Challenges and Countermeasures



Workshop at a Glance

The workshop aims to inspire and empower CCI researchers interested in cybersecurity, IoT, pervasive computing, and data to explore new ideas and discuss recent research challenges in the related areas. The workshop strives to foster future collaborations over past work presentations, offering a unique platform for seeding new partnerships and ideas. The event is open to all researchers within 4-VA and CCI networks, including NOVA, Central, Coastal, and Southwest


The workshop will take place on May 3rd, 2024, from 9:00 AM to 1:10 PM. Registered participants can attend the workshop in person at the Gilbert Place Building (Room 4001) at Virginia Tech, as well as via Zoom (links will be provided to registered participants). 


Registration for this workshop participation is free, underscoring our commitment to inclusivity and knowledge-sharing. We will provide coffee and light refreshments during breaks as well as lunch. Participants are encouraged to make their own arrangements for sustenance, transportation, and accommodations.


Registration

Please register to attend the workshop here!


Organizers

Thang Hoang

Virginia Tech

Tran Viet Xuan Phuong

University of Arkansas at Little Rock/ODU

Co-Organizers

Gretchen Matthews

Virginia Tech

Bimal Viswanath

Virginia Tech

Invited Talks

Efficient Indexing and Privacy-Preserving Search for Multi-Dimensional Historical  Blockchain Data

Bikash Chandra Singh, CCI Researcher

School of Cybersecurity

Old Dominion University

Abstract: In blockchain systems, stateful data are stored globally and sequentially in the form of key-value pairs. Indeed, in addition to being one-dimensional, values can be multi-dimensional. However, in blockchain systems, existing works only consider one-dimensional data to implement indexing approaches, as a result, these approaches perform poorly when extended to multi-dimensional and historical data. To overcome these issues, in this paper we propose two new indexing models for blockchain. Additionally, we investigate the use of bloom filters to enhance user privacy when searching for specific items within the blockchain. The first model is Two-tier Deterministic Appended Only Skip List (TDASL) that improves from LineageChain (Ruan et al., 2019, 2021) by using an additional indexing layer on top of a skip list to quickly retrieve the state versions and by using prefixes to query multi-dimensional state versions. The second model is Predefined Partitioned B-plus Tree (PPBPT), which paves the way of adopting B-plus tree in blockchain by addressing the challenge of its heavy reconstruction cost upon updates. To do so, PPBPT copies a predefined B-plus tree, which is used for generating indexes for blockchain historical data, thereby reducing reconstruction costs. We conduct extensive experiments to verify the effectiveness of the proposed approaches under various parameter settings.


Bio: Bikash Chandra Singh currently holds the position of Research Assistant Professor at the School of Cybersecurity, Old Dominion University, Virginia, USA. Previously, he served as a post-doctoral research associate at the Virginia Modelling, Analysis and Simulation Center (VMASC) from November 01, 2022, to September 2023. Prior to this, he was an Associate Professor in the Department of Information and Communication Technology at Islamic University, Bangladesh. Dr. Singh also conducted post-doctoral research at the Department of Electronics and Information Engineering at the Hong Kong Polytechnic University from January 4, 2021, to April 16, 2022. He earned his Doctor of Philosophy (PhD) in Computer Science from the University of Insubria, Italy. His research interests include data privacy and security, differential privacy, machine learning, big data analysis, online social network analysis, 5G systems, cybersecurity in supply chain, and distributed networks, with a particular focus on blockchain technology.

Discovering IoT Physical Channel Vulnerabilities

Muslum Ozgur Ozmen 

Computer Science

Purdue University

Abstract: IoT environments have complex physical interactions between actuators and sensors that create new classes of app interaction vulnerabilities. For instance, an app that turns on the heater interacts with another app that opens the window when the temperature exceeds a threshold and may result in opening the window when the residents are not at home. Unfortunately, existing IoT security measures fail to achieve sufficient fidelity to uncover these vulnerabilities, causing poor accuracy and false alarms. In this talk, I will introduce IoTSeer, which combines app code analysis and dynamic analysis with new security policies to discover physical interaction vulnerabilities among IoT apps. IoTSeer first models each IoT app’s physical behavior through hybrid modeling and proposed a new composition algorithm to construct a model that describes the joint physical behavior of apps. It then leverages optimization-guided falsification to validate if the apps’ composite model adheres to a set of safety and security policies represented with metric temporal logic. Through this effort, we develop formal techniques and tools that enable developers to build safe and secure IoT environments.


Bio: Muslum Ozgur Ozmen is a Ph.D. candidate in the Department of Computer Science at Purdue University, where he is advised by Professor Z. Berkay Celik. He has researched a variety of topics, including IoT security and privacy, mobile robot and self-driving car security, and lightweight cryptography. He received the Diamond Award for academic excellence from the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University. He served at the student advisory council of NSF AI Institute for Agent-based Cyber Threat Intelligence and Operation (ACTION) as the Purdue representative in 2023-2024. He also interned with the cyber-physical systems research team at the Toyota Research Institute North America. He will join SCAI at ASU as an assistant professor in Fall 2024. More information can be obtained at https://ozgurozmen.github.io/.

 Cybersecurity in Cyber-Physical Systems with Intrusion Detection Mechanisms 

Lida Haghnegahdar, CCI Researcher 

School of Cybersecurity

Old Dominion University

Abstract: New cyber-physical systems (CPSs) that integrate the physical and digital (cyber) spaces must be protected on critical infrastructures. The CPS is going to experience big changes. Cyber-physical systems are as core an integral part of Industry 4.0. These systems comprise computational and physical systems that combine engineering models and methods with computer science methodologies. CPS is related to IoT, and both integrate digital computing including network connectivity, physical devices, and systems. Industry 4.0 is emerging with the use of IoT and software-centric technologies across cyber-physical operations, which leads to a larger attack surface and cyberattacks in smart systems. The fourth revolution is creating intelligent systems, connected machines, and networks that can independently exchange information, trigger actions, and control each other autonomously.


Bio: Dr. Lida Haghnegahdar is an Assistant Professor in the Cybersecurity School at Old Dominion University (ODU). She was a recipient of the innovational scientist fellowship to work with the industry on systems optimization projects. Previously, she served as a post-doctoral research scientist at the Center for Agile and Adaptive Additive Manufacturing Center (CAAAM) at the University of North Texas. Her main research interest involves smart manufacturing, cyber- physical systems, cybersecurity, digital supply chain, IoT cloud, smart grid, and distributed systems. Her research focuses on systems computation, intrusion detection, and smart systems that are making lasting impacts considering artificial intelligence (AI) and data analysis

applications.

Health Data Privacy: Challenges and Opportunities

Hailong Zhang

Business Information Technology

Virginia Tech

Abstract: As healthcare systems become increasingly dependent on electronic health records and various digital platforms for managing patient data, ensuring the privacy and security of this sensitive information has become a paramount concern. In this talk, I will outline the main threats to health data privacy, along with the evolving legal frameworks and standards, such as HIPAA, that govern its use. I will also share initial results from a controlled experiment involving over 80 students, highlighting the critical role of education and technology in enforcing robust patient privacy protections. Furthermore, I will explore innovative technologies and practices that are emerging to protect and manage health data. This discussion aims to shed light on how healthcare providers, policymakers, and technologists can work together to develop more secure and private systems for health data management.  


Bio: Hailong Zhang is an Assistant Collegiate Professor in the Business Information Technology Department. He received his Ph.D. in Computer Science and Engineering from the Ohio State University in 2020. Prior to joining VT, he worked as an Assistant Professor in the Department of Computer and Information Sciences at Fordham University. His research interest lies in the general area of security and privacy, where he bridges business, technology, and public policy and law. His research has been published in top-tier computer science conferences and peer-reviewed journals, including USENIX Security Symposium, the International Conference on Software Engineering.

Challenges and Opportunities of Privacy-Preserving Computing in Confidential Computing Platforms

Wenjie Xiong

Electrical and Computer Engineering

Virginia Tech

Abstract: With hardware support, confidential computing (CC) is one of the promising solutions for efficient privacy-preserving computing on the cloud. However, the current commercial confidential computing platforms are limited to CPUs and very recently GPUs. Not all the devices will have hardware CC support immediately. In the first part of the talk, I will present SecNDP, a lightweight encryption and verification scheme for a trusted CPU to leverage untrusted Near-Data Processing (NDP) devices to perform computation over ciphertext and verify the correctness of linear operations. Our evaluation shows that SecNDP has performance speedup and energy savings compared with a secure CPU baseline. In the second part of the talk, I will talk about our ongoing work on the analysis of the potential leakages in confidential computing platforms and software mitigations.


Bio: Wenjie Xiong is an Assistant Professor at Virginia Tech. She received her Ph.D. in the Department of Electrical Engineering at Yale University in May 2020, advised by Prof. Jakub Szefer. Her research interests are in computer architecture and hardware security, where she leverages hardware features to enhance the security of computer systems as well as identify and mitigate security vulnerabilities that are rooted in the hardware designs. Her work on covert channel attacks on cache replacement states was selected as an Honorable Mention of IEEE Micro Top Picks 2021 and the featured paper of IEEE Transactions on Computers (TC). Her earlier work on run-time accessible DRAM PUFs was selected as the Top Picks in Hardware and Embedded Security 2019. More details at https://computing.ece.vt.edu/~wenjiex/

Navigating Privacy in the Age of Mixed Reality

Habiba Farrukh

Computer Science

University of California Irvine

Abstract: Mobile mixed reality has become increasingly popular over the last decade with the release of dedicated headsets and apps that blend virtual content into users’ real-world environments. MR apps require an elaborate spatial map of the user’s surroundings in three dimensions (3D), captured via specialized sensors, to localize the MR device and enable realistic assimilation of virtual content in the user’s environment. Unmonitored access of MR apps to the sensor data and in turn spatial information poses serious privacy threats to users as the spatial maps capture detailed geometric and semantic characteristics of users' environments. In this talk, I will demonstrate how sophisticated sensors on MR devices can be exploited to launch a new location inference attack, LocIn, on MR devices. LocIn attack exploits the detailed characteristics embedded in 3D spatial maps to infer a user's indoor location type. It leverages a multi-task approach for training an end-to-end encoder-decoder network that extracts a spatial feature representation for capturing contextual patterns of the user's environment and integrates them into a classification network with a novel unified optimization function to predict the user’s indoor location. 


Bio: Habiba Farrukh is an Assistant Professor in the Computer Science department at the University of California, Irvine. Prior to joining UCI, Habiba received her Ph.D. at Purdue University, where she was advised by Professor Z. Berkay Celik and was a part of the PurSec Lab. Habiba has conducted research on a variety of topics, including mobile and IoT security and privacy and human-centered computing. Her dissertation focused on leveraging multimodal sensing on mobile and IoT devices to provide rigorous security and privacy guarantees for these systems. She received the Bilsland Fellowship for her dissertation in 2022. More information is available at https://habiba-farrukh.github.io/.  



Enabling Zero Trust Within Enterprise Network Infrastructures Through In-Network Computing 

Peng Gao, CCI Fellow

Computer Science

Virginia Tech

Abstract: Modern targeted attacks such as Advanced Persistent Threats use multiple hosts as stepping stones and move laterally across them to deeply penetrate the network, resulting in huge data breaches and devastating financial losses in many companies and organizations. To defend against these sophisticated attacks, zero trust security has emerged as a set of new security paradigms, radically shifting from the traditional "castle-and-moat" network security model that assumes implicit trust within network perimeters. Motivated by the U.S. White House-issued Executive Order EO-14028 and Memo M-22-09, zero trust has recently gained wide attention. However, realizing a zero trust architecture in current enterprise networks presents multiple challenges. In this talk, I will shed light on our recent works on building novel in-network defenses to architect existing networks with zero trust principles. I will mainly discuss P4Control, a novel network defense system that enables fine-grained, least-privilege network access control over information flows across hosts in a network, preventing cross-host attack traffic in real time. Enabled by the recently proposed programmable switches and eBPF technologies, P4Control is the first work that uses programmable data planes to enforce complex secrecy and integrity policies at line rate. Remarkably, P4Control can be seamlessly integrated into the existing network infrastructure with minimal modifications and overhead, transforming it into a defense backbone.


Bio: Peng Gao is an Assistant Professor in the Department of Computer Science at Virginia Tech. He is a Commonwealth Cyber Initiative (CCI) Faculty Fellow. He was a Postdoctoral Researcher at the University of California, Berkeley. He received his Ph.D. from Princeton University. His research interest lies in security and privacy issues in systems and networks. His work centers on creating scalable, secure, intelligent, and trustworthy systems to solve real-world challenges, with publications at multiple top-tier conferences (e.g., IEEE S&P, USENIX Security, USENIX ATC, ACM CCS, ICDE, and ICSE), patents, and industry deployments. He is the recipient of several awards (e.g., 2018 CSAW Applied Research Finalist, 2020 Microsoft Security AI Research Award, 2020 Amazon Research Award, 2021 Cisco Research Award, and 2022 Amazon - Virginia Tech Initiative Faculty Research Award). More details at: https://people.cs.vt.edu/penggao/

Secure Lightweight Computation for Machine/Federated Learning on Smart Internet-of-Things 

Phuong Tran, CCI Researcher

Computer Science

University of Arkansas at Little Rock

Abstract: In recent years, we have witnessed a remarkable proliferation of networked intelligent devices - collectively known as the Internet of Things (IoT). The “smartness” of IoT is empowered by data-driven and learning-based techniques to enhance cognition, prediction, and decision-making. It often requires a sheer amount of data from various organizations and end users to be collected, transmitted, and processed. Privacy is a fundamental hurdle to such collective data aggregation and analysis across different entities. We need the new modern cryptography schemes to integrate into the IoT system, which not only achieve the efficiency but also guarantee data protection. In this talk, we begin with the stories of Functional Encryption, as the power tool of modern cryptography, and we go through the seminal schemes. Based on the mechanism of Functional Encryption, we will discuss how to design lightweight computation for secure evaluating/retrieval data and privacy-preserving federated learning in IoT Environments. This goal will lead to the generation of new crypto models for IoT devices supporting Artificial Intelligence.



Bio:  Tran Viet Xuan Phuong is currently Assistant Professor at University of Arkansas at Little Rock. Before that she was a Research Assistant Professor at the School of Cybersecurity, University of Old Dominion University, USA. From 2018-2021, she was a Research Fellow at the School of Computing and Information Technology, University of Wollongong, Australia, and a Contributed Fellow CSIRO – Data61 of the Australian Government,  and a Postdoc Researcher at Old Dominion University, USA, from 2017-2018. She obtained her Ph.D. in Cryptology and Cybersecurity at the University of Wollongong, Australia, in 2016. Her main research interests include applied cryptography for machine learning, such as federated learning and deep learning, blockchain security, and IoT cybersecurity. She has published in the top tier of cryptography/security conferences and journals, including ACM CCS, ESORICS, IEEE INFOCOM, ACM ASIACCS, IEEE TIFS, IEEE TII, Design Codes and Cryptography, etc.



Sponsors