ICME: An Informed Consent Management Engine for Conformance in Smart Building Environments
Fri 27 Aug 2021 07:20 - 07:25 - Dependability—Vulnerabilities 2 Chair(s): Ramy Shahin
Smart buildings can reveal highly sensitive insights about their inhabitants and expose them to new privacy threats and vulnerabilities. Yet, convenience overrides privacy concerns and most people remain ignorant about this issue. We propose a novel \textit{Informed Consent Management Engine} (ICME) that aims to: (a) increase users' awareness about privacy issues and data collection practices in their smart building environments, (b) provide fine-grained visibility into privacy conformance and infringement by these devices, (c) recommend and visualise corrective user actions through "digital nudging", and (d) support the monitoring and management of personal data disclosure in a shared space. We present a reference architecture for ICME that can be used by software engineers to implement diverse end-user consent management solutions for smart buildings. We also provide a proof-of-concept prototype to demonstrate how the ICME approach works in a shared smart workplace. Demo: \url{https://youtu.be/5y6CdyWAdgY}
Thu 26 AugDisplayed time zone: Athens change
19:00 - 20:00 | Dependability—Vulnerabilities 2Research Papers / Demonstrations +12h Chair(s): Domenico Bianculli University of Luxembourg | ||
19:00 10mPaper | Identifying Casualty Changes in Software Patches Research Papers Adriana Sejfia University of Southern California, Yixue Zhao University of Massachusetts at Amherst, Nenad Medvidović University of Southern California DOI Media Attached | ||
19:10 10mPaper | ACHyb: A Hybrid Analysis Approach to Detect Kernel Access Control Vulnerabilities Research Papers Yang Hu The University of Texas at Austin, Wenxi Wang University of Texas at Austin, Casen Hunger University of Texas at Austin, Riley Wood University of Texas at Austin, Sarfraz Khurshid University of Texas at Austin, Mohit Tiwari University of Texas at Austin DOI | ||
19:20 5mPaper | ICME: An Informed Consent Management Engine for Conformance in Smart Building Environments Demonstrations Chehara Pathmabandu Monash University, John Grundy Monash University, Mohan Baruwal Chhetri CSIRO’s Data61, Zubair Baig Deakin University DOI Media Attached | ||
19:25 5mPaper | CrossVul: A Cross-Language Vulnerability Dataset with Commit Data Demonstrations Georgios Nikitopoulos University of Thessaly, Konstantina Dritsa Athens University of Economics and Business, Panos Louridas Athens University of Economics and Business, Dimitris Mitropoulos University of Athens DOI | ||
19:30 30mLive Q&A | Q&A (Dependability—Vulnerabilities 2) Research Papers |
Fri 27 AugDisplayed time zone: Athens change
07:00 - 08:00 | Dependability—Vulnerabilities 2Demonstrations / Research Papers Chair(s): Ramy Shahin University of Toronto | ||
07:00 10mPaper | Identifying Casualty Changes in Software Patches Research Papers Adriana Sejfia University of Southern California, Yixue Zhao University of Massachusetts at Amherst, Nenad Medvidović University of Southern California DOI Media Attached | ||
07:10 10mPaper | ACHyb: A Hybrid Analysis Approach to Detect Kernel Access Control Vulnerabilities Research Papers Yang Hu The University of Texas at Austin, Wenxi Wang University of Texas at Austin, Casen Hunger University of Texas at Austin, Riley Wood University of Texas at Austin, Sarfraz Khurshid University of Texas at Austin, Mohit Tiwari University of Texas at Austin DOI | ||
07:20 5mPaper | ICME: An Informed Consent Management Engine for Conformance in Smart Building Environments Demonstrations Chehara Pathmabandu Monash University, John Grundy Monash University, Mohan Baruwal Chhetri CSIRO’s Data61, Zubair Baig Deakin University DOI Media Attached | ||
07:25 5mPaper | CrossVul: A Cross-Language Vulnerability Dataset with Commit Data Demonstrations Georgios Nikitopoulos University of Thessaly, Konstantina Dritsa Athens University of Economics and Business, Panos Louridas Athens University of Economics and Business, Dimitris Mitropoulos University of Athens DOI | ||
07:30 30mLive Q&A | Q&A (Dependability—Vulnerabilities 2) Research Papers |