kth.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (5 of 5) Show all publications
Süren, E., Heiding, F., Olegård, J. & Lagerström, R. (2023). PatrIoT: practical and agile threat research for IoT. International Journal of Information Security, 22(1), 213-233
Open this publication in new window or tab >>PatrIoT: practical and agile threat research for IoT
2023 (English)In: International Journal of Information Security, ISSN 1615-5262, E-ISSN 1615-5270, Vol. 22, no 1, p. 213-233Article in journal, Editorial material (Refereed) Published
Abstract [en]

The Internet of things (IoT) products, which have been widely adopted, still pose challenges in the modern cybersecurity landscape. Many IoT devices are resource-constrained and almost constantly online. Furthermore, the security features of these devices are less often of concern, and fewer methods, standards, and guidelines are available for testing them. Although a few approaches are available to assess the security posture of IoT products, the ones in use are mostly based on traditional non-IoT-focused techniques and generally lack the attackers' perspective. This study provides a four-stage IoT vulnerability research methodology built on top of four key elements: logical attack surface decomposition, compilation of top 100 weaknesses, lightweight risk scoring, and step-by-step penetration testing guidelines. Our proposed methodology is evaluated with multiple IoT products. The results indicate that PatrIoT allows cyber security practitioners without much experience to advance vulnerability research activities quickly and reduces the risk of critical IoT penetration testing steps being overlooked.

Place, publisher, year, edition, pages
Springer Nature, 2023
National Category
Computer Systems
Identifiers
urn:nbn:se:kth:diva-321646 (URN)10.1007/s10207-022-00633-3 (DOI)000885228800001 ()2-s2.0-85142242003 (Scopus ID)
Note

QC 20221201

Available from: 2022-11-18 Created: 2022-11-18 Last updated: 2023-10-16Bibliographically approved
Heiding, F., Süren, E., Olegård, J. & Lagerström, R. (2023). Penetration testing of connected households. Computers & security (Print), 126, Article ID 103067.
Open this publication in new window or tab >>Penetration testing of connected households
2023 (English)In: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 126, article id 103067Article in journal (Refereed) Published
Abstract [en]

Connected devices have become an integral part of modern homes and household devices, such as vac-uum cleaners and refrigerators, are now often connected to networks. This connectivity introduces an entry point for cyber attackers. The plethora of successful cyber attacks against household IoT indicates that the security of these devices, or the security of applications related to these devices, is often lacking. Existing penetration testing studies usually focus on individual devices, and recent studies often men-tion the need for more extensive vulnerability assessments. Therefore, this study investigates the cyber security of devices commonly located in connected homes. Systematic penetration tests were conducted on 22 devices in five categories related to connected homes: smart door locks, smart cameras, smart car adapters/garages, smart appliances, and miscellaneous smart home devices. In total, 17 vulnerabilities were discovered and published as new CVEs. Some CVEs received critical severity rankings from the National Vulnerability Database (NVD), reaching 9.8/10. The devices are already being sold and used worldwide, and the discovered vulnerabilities could lead to severe consequences for residents, such as an attacker gaining physical access to the house. In addition to the published CVEs, 52 weaknesses were discovered that could potentially lead to new CVEs in the future. To our knowledge, this is the most comprehensive study on penetration testing of connected household products.

Place, publisher, year, edition, pages
Elsevier BV, 2023
Keywords
Penetration testing, Ethical hacking, Internet of things, Connected households, Smart home, Pentest, Cyber security
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:kth:diva-324051 (URN)10.1016/j.cose.2022.103067 (DOI)000917439700001 ()2-s2.0-85144826963 (Scopus ID)
Note

QC 20230222

Available from: 2023-02-22 Created: 2023-02-22 Last updated: 2024-09-18Bibliographically approved
Rencelj Ling, E., Urrea Cabus, J. E., Butun, I., Lagerström, R. & Olegård, J. (2022). Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis. In: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security: . Paper presented at the 17th International Conference on Availability, Reliability and Security, August 23 to August 26, 2022. Austria. Association for Computing Machinery (ACM), Article ID 74.
Open this publication in new window or tab >>Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis
Show others...
2022 (English)In: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, Association for Computing Machinery (ACM) , 2022, p. -7, article id 74Conference paper, Published paper (Refereed)
Abstract [en]

This paper investigates methods to secure Remote Terminal Units (RTUs) which are the building blocks of a smart grid systems - the next generation version to replace the power grid systems that are being used today. RTUs are identified as the heart of automation and control (SCADA) systems by the systems engineers. As such, security and maintaining nominal operability of such devices has prime importance, especially for the industrial automation networks such as the smart grid. A way of measuring the security of systems and networks is executing a series of cybersecurity weakness assessment tests called penetration testing. Another way of such an assessment is called vulnerability analysis by threat modelling which involves careful investigation and modelling of each and every component of a network/system under investigation. This article, aims at marrying these two methodologies for the vulnerability assessment of the RTUs in a methodological and scientific way.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2022
Keywords
SCADA, smart grid, power grid, RTU, threat modelling, attack graph, penetration testing
National Category
Computer Systems
Research subject
Computer Science; Electrical Engineering
Identifiers
urn:nbn:se:kth:diva-316684 (URN)10.1145/3538969.3544483 (DOI)2-s2.0-85136953128 (Scopus ID)
Conference
the 17th International Conference on Availability, Reliability and Security, August 23 to August 26, 2022. Austria
Note

QC 20220830

Available from: 2022-08-29 Created: 2022-08-29 Last updated: 2023-06-08Bibliographically approved
Shalaginov, A., Iqbal, A. & Olegård, J. (2020). IoT Digital Forensics Readiness in the Edge: A Roadmap for Acquiring Digital Evidences from Intelligent Smart Applications. In: Lect. Notes Comput. Sci.: . Paper presented at EDGE 2020: Edge Computing – EDGE 2020 , 18 September 2020 through 20 September 2020 (pp. 1-17). Springer Science and Business Media Deutschland GmbH, 12407
Open this publication in new window or tab >>IoT Digital Forensics Readiness in the Edge: A Roadmap for Acquiring Digital Evidences from Intelligent Smart Applications
2020 (English)In: Lect. Notes Comput. Sci., Springer Science and Business Media Deutschland GmbH , 2020, Vol. 12407, p. 1-17Conference paper, Published paper (Refereed)
Abstract [en]

Entering the era of the Internet of Things, the traditional Computer Forensics is no longer as trivial as decades ago with a rather limited pool of possible computer components. It has been demonstrated recently how the complexity and advancement of IoT are being used by malicious actors attack digital and physical infrastructures and systems. The investigative methodology, therefore, faces multiple challenges related to the fact that billions of interconnected devices generate tiny pieces of data that easily comprehend the Big Data paradigm. As a result, Computer Forensics is no longer a simple methodology of the straightforward process. In this paper, we study the complexity and readiness of community-accepted devices in a smart application towards assistance in criminal investigations. In particular, we present a clear methodology and involved tools related to Smart Applications. Relevant artefacts are discussed and analysed using the prism of the Digital Forensics Process. This research contributes towards increased awareness of the IoT Forensics in the Edge, corresponding challenges and opportunities.

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2020
Keywords
Computer forensics, Edge computing, Electronic crime countermeasures, Computer components, Criminal investigation, Digital evidence, Roadmap, Smart applications, Traditional computers, Internet of things
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-285321 (URN)10.1007/978-3-030-59824-2_1 (DOI)2-s2.0-85092075608 (Scopus ID)
Conference
EDGE 2020: Edge Computing – EDGE 2020 , 18 September 2020 through 20 September 2020
Note

QC 20201202

Available from: 2020-12-02 Created: 2020-12-02 Last updated: 2024-01-10Bibliographically approved
Iqbal, A., Olegård, J., Ghimire, R., Jamshir, S. & Shalaginov, A. (2020). Smart Home Forensics: An Exploratory Study on Smart Plug Forensic Analysis. In: Wu, XT Jermaine, C Xiong, L Hu, XH Kotevska, O Lu, SY Xu, WJ Aluru, S Zhai, CX Al-Masri, E Chen, ZY Saltz, J (Ed.), 2020 IEEE International conference on big data (big data): . Paper presented at 8th IEEE International Conference on Big Data (Big Data), DEC 10-13, 2020, ELECTR NETWORK (pp. 2283-2290). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Smart Home Forensics: An Exploratory Study on Smart Plug Forensic Analysis
Show others...
2020 (English)In: 2020 IEEE International conference on big data (big data) / [ed] Wu, XT Jermaine, C Xiong, L Hu, XH Kotevska, O Lu, SY Xu, WJ Aluru, S Zhai, CX Al-Masri, E Chen, ZY Saltz, J, Institute of Electrical and Electronics Engineers (IEEE) , 2020, p. 2283-2290Conference paper, Published paper (Refereed)
Abstract [en]

Connectivity as a whole and the Internet of Things (IoT) has influenced a great many things in the past decade. Among those, the most prominent is our daily life routines, which have increasingly started to depend on technology. A Smart Home, being a central part, has gained more importance from a forensic perspective since it affects many lives and can be an easy target for cybercrimes. In this work in progress paper, we explore the feasibility of conducting forensic analysis on different Smart Plugs and what sort of challenges are encountered in such a forensic investigation. We also review current related work for forensic analysis of Smart Plugs.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2020
Series
IEEE International Conference on Big Data, ISSN 2639-1589
Keywords
Smart Plug, Smart Outlet, Smart Home, Cyber Forensics, Digital Forensics, Forensic analysis, Threat analysis, IoT, Smart Things
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-299079 (URN)10.1109/BigData50022.2020.9378183 (DOI)000662554702052 ()2-s2.0-85103855439 (Scopus ID)
Conference
8th IEEE International Conference on Big Data (Big Data), DEC 10-13, 2020, ELECTR NETWORK
Note

QC 20210802

Available from: 2021-08-02 Created: 2021-08-02 Last updated: 2023-02-27Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-9082-4318

Search in DiVA

Show all publications