Award Abstract # 2145744
CAREER: A Model-Guided and Holistic Approach for Peripheral Security

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: PURDUE UNIVERSITY
Initial Amendment Date: January 24, 2022
Latest Amendment Date: December 20, 2024
Award Number: 2145744
Award Instrument: Continuing Grant
Program Manager: Sol Greenspan
sgreensp@nsf.gov
 (703)292-7841
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: February 1, 2022
End Date: January 31, 2027 (Estimated)
Total Intended Award Amount: $524,676.00
Total Awarded Amount to Date: $415,188.00
Funds Obligated to Date: FY 2022 = $100,642.00
FY 2023 = $102,638.00

FY 2024 = $104,795.00

FY 2025 = $107,113.00
History of Investigator:
  • Jing Tian (Principal Investigator)
Recipient Sponsored Research Office: Purdue University
2550 NORTHWESTERN AVE # 1100
WEST LAFAYETTE
IN  US  47906-1332
(765)494-1055
Sponsor Congressional District: 04
Primary Place of Performance: Purdue University
305 N. University Street
West Lafayette
IN  US  47907-2107
Primary Place of Performance
Congressional District:
04
Unique Entity Identifier (UEI): YRXVL4JYCEF5
Parent UEI: YRXVL4JYCEF5
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01002526DB NSF RESEARCH & RELATED ACTIVIT
01002223DB NSF RESEARCH & RELATED ACTIVIT

01002324DB NSF RESEARCH & RELATED ACTIVIT

01002627DB NSF RESEARCH & RELATED ACTIVIT

01002425DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 025Z, 1045
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Modern peripherals devices such as USB keyboards and drives, Bluetooth speakers and headsets, complement users' computer systems with rich functionality and have become an integral part of daily life. While peripheral devices offer a "Plug'n'Play" solution to ease their usage in different scenarios, attacks from these devices are increasing due to their "Trust-by-default" treatment and direct interactions with the low-level parts of the target machines (e.g., operating systems). For instance, a USB drive found in the parking lot could take complete control of an industrial control system once plugged, while a Bluetooth speaker could intercept all the network traffic of a user's laptop once connected. This work aims to systematically improve peripheral security by discovering and reducing vulnerabilities that could enable peripheral attacks ahead of time, detecting malicious tampering within peripheral devices once connected, and responding to peripheral attacks timely with assurance.

This project seeks to address the broad research challenge of enabling a trustworthy and formally-verified peripheral ecosystem and designing next-gen secure peripheral devices and operating systems. Rather than targeting a specific peripheral attack, this project focuses on developing a model-guided and holistic approach for peripheral security in general, including both USB and Bluetooth, leveraging ?models? extracted from peripheral specifications and stack implementations as key prior knowledge, and covering the whole life cycle of peripheral security, including pre-attack, runtime, and post-attack stages. As such, model-guided fuzzing, debloating, and formal verification reduces the attack surface exposed to peripheral devices; model-based firmware analysis, fingerprinting, and authentication enables runtime integrity of peripheral devices; model-guided provenance, patching, and formal implementation allows for immediate and assured responding actions against peripheral attacks. This project will assess all these considerations within a combination of real-world applications (e.g., Android USB security) and specification enhancements (e.g., Bluetooth security and privacy), and generalize the knowledge for securing both peripheral devices and host machines across hardware, firmware, and software stacks.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Kim, K and Kim, S and Butler, K.R. and Bianchi, A and Kennell, R and Tian, D.J. "Fuzz The Power: Dual-role State Guided Black-box Fuzzing for {USB} Power Delivery" USENIX Security Symposium , 2023 Citation Details
Kim, Sungwoo and Yeo, Gisu and Kim, Taegyu and Rhee, Junghwan "John" and Jeon, Yuseok and Bianchi, Antonio and Xu, Dongyan and Tian, Dave (Jing) "ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs" Asia CCS'22 , 2022 https://doi.org/10.1145/3488932.3523263 Citation Details
Nguyen, Trung and Kim, Kyungtae and Bianchi, Antonio and Tian, Dave (Jing) "TruEMU: an extensible, open-source, whole-system iOS emulator" Blackhat USA'22 , 2022 Citation Details
Wu, Jianliang and Traynor, Patrick and Xu, Dongyan and Tian, Dave Jing and Bianchi, Antonio "Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations" , 2024 Citation Details
Peng, Hui and Yao Zhihao and Sani, Amiri Ardalan and Tian, Dave (Jing) and Payer, Mathias "GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation" USENIX Security'23 , 2023 Citation Details
Wu, Jianliang and Wu, Ruoyu and Xu, Dongyan and Tian, Dave Jing and Bianchi, Antonio "SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth" , 2024 https://doi.org/10.1109/SP54263.2024.00023 Citation Details
Wu, Xiaolong and Tian, Dave Jing and Kim, Chung Hwan "Building GPU TEEs using CPU Secure Enclaves with GEVisor" , 2023 https://doi.org/10.1145/3620678.3624659 Citation Details
Zhu, Weidong and Hernandez, Grant and Garcia, Washington and Tian, Dave Jing and Rampazzi, Sara and Butler, Kevin "Minding the Semantic Gap for Effective Storage-Based Ransomware Defense" , 2024 Citation Details
Zou, Muqi and Khan, Arslan and Wu, Ruoyu and Gao, Han and Bianchi, Antonio and Tian, Dave Jing "D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation" , 2024 Citation Details

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page