My research focuses on embedded security: the art and science of creating embedded systems resistant to attack. Medical devices, autonomous vehicles, and the Internet of Things depend crucially on embedded security.
› Link to Download Publications & Bibliography ‹
My research on RFID security and privacy led me to the broader
problem of securing medical treatments and keeping medical information
private. Implantable medical devices increasingly use wireless
communication for monitoring patients in hospitals and homes. Such
medical devices include heart rate sensors, pacemakers,
defibrillators, drug delivery systems, and neurostimulators. These
devices can contain sensitive personal data and other health-related
information. In addition to sensing events, pacemakers and
implantable cardiac defibrillators (ICDs) treat chronic disease with
electrical therapy that can be wirelessly modified. Thus, patients
will desire strong security and privacy to gain confidence in these
emerging therapies and infrastructure for collecting
telemetry. Yet there is little understanding of how to model or
mitigate malicious threats against such untrusted
infrastructure.
My approach to improving the security and privacy of pervasive healthcare involves the design and implementation of zero-power security modules for implantable devices, vulnerability analysis, threat modeling, and patient studies.
› Link to Download Publications & Bibliography ‹
My research investigates security and privacy for pervasive
computation by analyzing the limits of computation on RFID-based
systems and discovering methods to adapt cryptographic systems to this
constrained environment. RFID tags belong to a class of inexpensive
wireless devices that identify and authenticate objects and people—in short, devices that must label things securely. Radio-Frequency
Identification (RFID) tags, contactless smartcards, and low-resource
sensors represent a class of computing devices that promises to be the
most numerous in the world. A unifying characteristic of these devices
is that they do not perform autonomous computation and often lack
internal power sources. Nomadic tags respond automatically to reader
interrogation, and thus they have highly sporadic network
connectivity. Extending the network to new physical dimensions,
pervasive devices promise to serve as the fingertips of the
next-generation Internet.
My approach to RFID security and privacy consists of vulnerability analysis and discovery of energy-aware abstractions on microwatt-powered devices. The contributions include the Mementos system to execute long-running code on tags that reboot constantly; a security analysis of RFID-enabled credit cards and related cryptographic protocols; a quantification of the limits of computation and cryptography on an RF-powered, Ultra-High Frequency RFID tag; and development of practical and inexpensive ways to harvest true random numbers and fingerprints without additional RFID tag circuitry.
› Link to Download Publications & Bibliography ‹
› Link to Download Publications & Bibliography ‹
Client authentication has been a continuous source of problems on the
Web. Although many well-studied techniques exist for authentication,
Web sites continue to use extremely weak authentication schemes,
especially in non-enterprise environments such as store fronts. These
weaknesses often result from careless use of authenticators within Web
cookies. Of the twenty-seven sites we investigated, we weakened the
client authentication on two systems, gained unauthorized access on
eight, and extracted the secret key used to mint authenticators from
one.
We provide a description of the limitations, requirements, and security models specific to Web client authentication. This includes the introduction of the interrogative adversary, a surprisingly powerful adversary that can adaptively query a Web site.
We provide a set of hints for designing a secure client authentication scheme. Using these hints, we present the design and analysis of a simple authentication scheme secure against forgeries by the interrogative adversary. In conjunction with SSL, our scheme is secure against forgeries by the active adversary.
Web cookies: Not just a privacy risk.
by
Emil Sit and
Kevin Fu.
Communications of the ACM, 44(9), September
2001.
[Publication Link]
Dos and don'ts of client authentication on the web.
by
Kevin Fu,
Emil Sit,
Kendra Smith, and
Nick Feamster.
In Proceedings of the 10th USENIX Security Symposium, Washington, D.C., August
2001. An extended version is available as MIT-LCS-TR-818 (Best Student Paper Award)
[Publication Link]