4.5 Article

How Secure Are Checkpoint-Based Defenses in Digital Microfluidic Biochips?

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCAD.2020.2988351

Keywords

Electrodes; Monitoring; Drugs; Software; Computer security; Computer security; control systems; fluid flow control; fluidics; industry applications; microfluidics; security

Funding

  1. Army Research Office [W911NF-17-1-0320]
  2. NSF [CNS-1833622, CNS-1833624]
  3. New York University Center for Cyber Security (CCS)
  4. New York University Abu Dhabi Center for Cyber Security (CCS-AD)

Ask authors/readers for more resources

A digital microfluidic biochip (DMFB) is a miniaturized laboratory capable of implementing biochemical protocols, with a network connection, commonly used in medical diagnosis, drug development, and personalized medicine. Ensuring the security of DMFB CPS is crucial for their successful deployment, and recent research has focused on developing defense mechanisms such as checkpoints to enhance security.
A digital microfluidic biochip (DMFB) is a miniaturized laboratory capable of implementing biochemical protocols. Fully integrated DMFBs consist of a hardware platform, controller, and network connectivity, making it a cyber-physical system (CPS). A DMFB CPS is being advocated for safety-critical applications, such as medical diagnosis, drug development, and personalized medicine. Hence, the security of a DMFB CPS is of immense importance to their successful deployment. Recent research has made progress in devising corresponding defense mechanisms by employing so-called checkpoints (CPs). Existing solutions either rely on probabilistic security analysis that does not consider all possible actions an attacker may use to overcome an applied CP mechanism or rely on exhaustive monitoring of DMFB at all time-steps during the assay execution. For devising a defense scheme that is guaranteed to be secure, an exact analysis of the security of a DMFB is needed. This is not available in the current state-of-the-art. In this article, we address this issue by developing an exact method, which uses the deductive power of satisfiability solvers to verify whether a CP-based defense thwarts the execution of an attack. We demonstrate the usefulness of the proposed method by showcasing two applications on practical bioassays: 1) security analysis of various checkpointing strategies and 2) derivation of a counterexample-guided fool-proof secure CP scheme.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available