kth.sePublications KTH
Change search
Link to record
Permanent link

Direct link
Alternative names
Publications (10 of 150) Show all publications
Süren, E., Heiding, F., Olegård, J. & Lagerström, R. (2023). PatrIoT: practical and agile threat research for IoT. International Journal of Information Security, 22(1), 213-233
Open this publication in new window or tab >>PatrIoT: practical and agile threat research for IoT
2023 (English)In: International Journal of Information Security, ISSN 1615-5262, E-ISSN 1615-5270, Vol. 22, no 1, p. 213-233Article in journal, Editorial material (Refereed) Published
Abstract [en]

The Internet of things (IoT) products, which have been widely adopted, still pose challenges in the modern cybersecurity landscape. Many IoT devices are resource-constrained and almost constantly online. Furthermore, the security features of these devices are less often of concern, and fewer methods, standards, and guidelines are available for testing them. Although a few approaches are available to assess the security posture of IoT products, the ones in use are mostly based on traditional non-IoT-focused techniques and generally lack the attackers' perspective. This study provides a four-stage IoT vulnerability research methodology built on top of four key elements: logical attack surface decomposition, compilation of top 100 weaknesses, lightweight risk scoring, and step-by-step penetration testing guidelines. Our proposed methodology is evaluated with multiple IoT products. The results indicate that PatrIoT allows cyber security practitioners without much experience to advance vulnerability research activities quickly and reduces the risk of critical IoT penetration testing steps being overlooked.

Place, publisher, year, edition, pages
Springer Nature, 2023
National Category
Computer Systems
Identifiers
urn:nbn:se:kth:diva-321646 (URN)10.1007/s10207-022-00633-3 (DOI)000885228800001 ()2-s2.0-85142242003 (Scopus ID)
Note

QC 20221201

Available from: 2022-11-18 Created: 2022-11-18 Last updated: 2023-10-16Bibliographically approved
Heiding, F., Süren, E., Olegård, J. & Lagerström, R. (2023). Penetration testing of connected households. Computers & Security, 126, Article ID 103067.
Open this publication in new window or tab >>Penetration testing of connected households
2023 (English)In: Computers & Security, ISSN 0167-4048, E-ISSN 1872-6208, Vol. 126, article id 103067Article in journal (Refereed) Published
Abstract [en]

Connected devices have become an integral part of modern homes and household devices, such as vac-uum cleaners and refrigerators, are now often connected to networks. This connectivity introduces an entry point for cyber attackers. The plethora of successful cyber attacks against household IoT indicates that the security of these devices, or the security of applications related to these devices, is often lacking. Existing penetration testing studies usually focus on individual devices, and recent studies often men-tion the need for more extensive vulnerability assessments. Therefore, this study investigates the cyber security of devices commonly located in connected homes. Systematic penetration tests were conducted on 22 devices in five categories related to connected homes: smart door locks, smart cameras, smart car adapters/garages, smart appliances, and miscellaneous smart home devices. In total, 17 vulnerabilities were discovered and published as new CVEs. Some CVEs received critical severity rankings from the National Vulnerability Database (NVD), reaching 9.8/10. The devices are already being sold and used worldwide, and the discovered vulnerabilities could lead to severe consequences for residents, such as an attacker gaining physical access to the house. In addition to the published CVEs, 52 weaknesses were discovered that could potentially lead to new CVEs in the future. To our knowledge, this is the most comprehensive study on penetration testing of connected household products.

Place, publisher, year, edition, pages
Elsevier BV, 2023
Keywords
Penetration testing, Ethical hacking, Internet of things, Connected households, Smart home, Pentest, Cyber security
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:kth:diva-324051 (URN)10.1016/j.cose.2022.103067 (DOI)000917439700001 ()2-s2.0-85144826963 (Scopus ID)
Note

QC 20230222

Available from: 2023-02-22 Created: 2023-02-22 Last updated: 2025-08-28Bibliographically approved
Heiding, F., Katsikeas, S. & Lagerström, R. (2023). Research communities in cyber security vulnerability assessments: A comprehensive literature review. Computer Science Review, 48, Article ID 100551.
Open this publication in new window or tab >>Research communities in cyber security vulnerability assessments: A comprehensive literature review
2023 (English)In: Computer Science Review, ISSN 1574-0137, E-ISSN 1876-7745, Vol. 48, article id 100551Article, review/survey (Refereed) Published
Abstract [en]

Ethical hacking and vulnerability assessments are gaining rapid momentum as academic fields of study. Still, it is sometimes unclear what research areas are included in the categories and how they fit into the traditional academic framework. Previous studies have reviewed literature in the field, but the attempts use manual analysis and thus fail to provide a comprehensive view of the domain. To better understand how the area is treated within academia, 537,629 related articles from the Scopus database were analyzed. A Python script was used for data mining as well as analysis of the data, and 23,459 articles were included in the final synthesis. The publication dates of the articles ranged from 1975 to 2022. They were authored by 53,495 authors and produced an aggregated total of 836,956 citations. Fifteen research communities were detected using the Louvain community detection algorithm: (smart grids, attack graphs, security testing, software vulnerabilities, Internet of Things (IoT), network vulnerability, vulnerability analysis, Android, cascading failures, authentication, Software-Defined Networking (SDN), spoofing attacks, malware, trust models, and red teaming). In addition, each community had several individual subcommunities, constituting a total of 126. From the trends of the analyzed studies, it is clear that research interest in ethical hacking and vulnerability assessment is increasing.

Place, publisher, year, edition, pages
Elsevier BV, 2023
Keywords
Systematic literature review, SLR, Vulnerability assessment, Ethical hacking, Cybersecurity, Scopus, Penetration testing
National Category
Software Engineering
Identifiers
urn:nbn:se:kth:diva-326627 (URN)10.1016/j.cosrev.2023.100551 (DOI)000969160400001 ()2-s2.0-85151293888 (Scopus ID)
Note

QC 20230509

Available from: 2023-05-09 Created: 2023-05-09 Last updated: 2024-09-18Bibliographically approved
Widel, W., Hacks, S., Ekstedt, M., Johnson, P. & Lagerström, R. (2023). The meta attack language-a formal description. Computers & Security, 130, 103284, Article ID 103284.
Open this publication in new window or tab >>The meta attack language-a formal description
Show others...
2023 (English)In: Computers & Security, ISSN 0167-4048, E-ISSN 1872-6208, Vol. 130, p. 103284-, article id 103284Article in journal (Refereed) Published
Abstract [en]

Nowadays, IT infrastructures are involved in making innumerable aspects of our lives convenient, starting with water or energy distribution systems, and ending with e-commerce solutions and online banking services. In the worst case, cyberattacks on such infrastructures can paralyze whole states and lead to losses in terms of both human lives and money.One of the approaches to increase security of IT infrastructures relies on modeling possible ways of compromising them by potential attackers. To facilitate creation and reusability of such models, domain specific languages (DSLs) can be created. Ideally, a user will employ a DSL for modeling their infrastruc-ture of interest, with the domain-specific threats and attack logic being already encoded in the DSL by the domain experts.The Meta Attack Language (MAL) has been introduced previously as a meta-DSL for development of security-oriented DSLs. In this work, we define formally the syntax and a semantics of MAL to ease a common understanding of MAL's functionalities and enable reference implementations on different tech-nical platforms. It's applicability for modeling and analysis of security of IT infrastructures is illustrated with an example.

Place, publisher, year, edition, pages
Elsevier BV, 2023
Keywords
Threat modeling, Attack simulation, Attack graphs, Domain specific language
National Category
Reliability and Maintenance Computer Systems
Identifiers
urn:nbn:se:kth:diva-329957 (URN)10.1016/j.cose.2023.103284 (DOI)001001451200001 ()2-s2.0-85156202278 (Scopus ID)
Note

QC 20230626

Available from: 2023-06-26 Created: 2023-06-26 Last updated: 2025-08-28Bibliographically approved
Ekstedt, M., Afzal, Z., Mukherjee, P., Hacks, S. & Lagerström, R. (2023). Yet another cybersecurity risk assessment framework. International Journal of Information Security, 22(6), 1713-1729
Open this publication in new window or tab >>Yet another cybersecurity risk assessment framework
Show others...
2023 (English)In: International Journal of Information Security, ISSN 1615-5262, E-ISSN 1615-5270, Vol. 22, no 6, p. 1713-1729Article in journal (Refereed) Published
Abstract [en]

IT systems pervade our society more and more, and we become heavily dependent on them. At the same time, these systems are increasingly targeted in cyberattacks, making us vulnerable. Enterprise and cybersecurity responsibles face the problem of defining techniques that raise the level of security. They need to decide which mechanism provides the most efficient defense with limited resources. Basically, the risks need to be assessed to determine the best cost-to-benefit ratio. One way to achieve this is through threat modeling; however, threat modeling is not commonly used in the enterprise IT risk domain. Furthermore, the existing threat modeling methods have shortcomings. This paper introduces a metamodel-based approach named Yet Another Cybersecurity Risk Assessment Framework (Yacraf). Yacraf aims to enable comprehensive risk assessment for organizations with more decision support. The paper includes a risk calculation formalization and also an example showing how an organization can use and benefit from Yacraf.

Place, publisher, year, edition, pages
Springer Nature, 2023
Keywords
Attack tree, Enterprise IT risk, Risk assessment, Threat modeling
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:kth:diva-338542 (URN)10.1007/s10207-023-00713-y (DOI)001027329600001 ()2-s2.0-85164669184 (Scopus ID)
Note

QC 20231108

Available from: 2023-11-08 Created: 2023-11-08 Last updated: 2023-11-08Bibliographically approved
Engström, V., Johnson, P., Lagerström, R., Ringdahl, E. & Wällstedt, M. (2022). Automated Security Assessments of Amazon Web Service Environments. ACM Transactions on Privacy and Security, 26(2), 1-31, Article ID 20.
Open this publication in new window or tab >>Automated Security Assessments of Amazon Web Service Environments
Show others...
2022 (English)In: ACM Transactions on Privacy and Security, ISSN 2471-2566, Vol. 26, no 2, p. 1-31, article id 20Article in journal (Refereed) Published
Abstract [en]

Migrating enterprises and business capabilities to cloud platforms like Amazon Web Services (AWS) has become increasingly common. However, securing cloud operations, especially at large scales, can quickly become intractable. Customer-side issues such as service misconfigurations, data breaches, and insecure changes are prevalent. Furthermore, cloud-specific tactics and techniques paired with application vulnerabilities create a large and complex search space. Various solutions and modeling languages for cloud security assessments exist. However, no single one appeared sufficiently cloud-centered and holistic. Many also did not account for tactical security dimensions. This article, therefore, presents a domain-specific modeling language for AWS environments. When used to model AWS environments, manually or automatically, the language automatically constructs and traverses attack graphs to assess security. Assessments, therefore, require minimal security expertise from the user. The modeling language was primarily tested on four third-party AWS environments through securiCAD Vanguard, a commercial tool built around the AWS modeling language. The language was validated further by measuring performance on models provided by anonymous end users and a comparison with a similar open source assessment tool. As of March 2020, the modeling language could represent essential AWS structures, cloud tactics, and threats. However, the tests highlighted certain shortcomings. Data collection steps, such as planted credentials, and some missing tactics were obvious. Nevertheless, the issues covered by the DSL were already reminiscent of common issues with real-world precedents. Future additions to attacker tactics and addressing data collection should yield considerable improvements.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2022
Keywords
Attack simulation, threat modeling, cloud security, enterprise modeling, automatic security assessment, attack graphs, domain-specific language
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-324723 (URN)10.1145/3570903 (DOI)000970870300010 ()2-s2.0-85154572778 (Scopus ID)
Note

QC 20230529

Available from: 2023-03-13 Created: 2023-03-13 Last updated: 2025-12-19Bibliographically approved
Xiong, W., Legrand, E., Åberg, O. & Lagerström, R. (2022). Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix. Software and Systems Modeling, 21(1), 157-177
Open this publication in new window or tab >>Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix
2022 (English)In: Software and Systems Modeling, ISSN 1619-1366, E-ISSN 1619-1374, Vol. 21, no 1, p. 157-177Article in journal (Refereed) Published
Abstract [en]

Enterprise systems are growing in complexity, and the adoption of cloud and mobile services has greatly increased the attack surface. To proactively address these security issues in enterprise systems, this paper proposes a threat modeling language for enterprise security based on the MITRE Enterprise ATT&CK Matrix. It is designed using the Meta Attack Language framework and focuses on describing system assets, attack steps, defenses, and asset associations. The attack steps in the language represent adversary techniques as listed and described by MITRE. This entity-relationship model describes enterprise IT systems as a whole; by using available tools, the proposed language enables attack simulations on its system model instances. These simulations can be used to investigate security settings and architectural changes that might be implemented to secure the system more effectively. Our proposed language is tested with a number of unit and integration tests. This is visualized in the paper with two real cyber attacks modeled and simulated.

Place, publisher, year, edition, pages
Springer, 2022
National Category
Computer Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-297591 (URN)10.1007/s10270-021-00898-7 (DOI)000663233900001 ()2-s2.0-85108228568 (Scopus ID)
Funder
VinnovaSwedish Energy Agency
Note

QC 20210621

Available from: 2021-06-18 Created: 2021-06-18 Last updated: 2024-01-17Bibliographically approved
Mohamed, A., Wang, F., Butun, I., Qadir, J., Lagerström, R., Gastaldo, P. & Caviglia, D. D. (2022). Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks. Sensors, 22(9), 3498, Article ID 3498.
Open this publication in new window or tab >>Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks
Show others...
2022 (English)In: Sensors, E-ISSN 1424-8220, Vol. 22, no 9, p. 3498-, article id 3498Article in journal (Refereed) Published
Abstract [en]

The Internet of Things (IoT) has disrupted the IT landscape drastically, and Long Range Wide Area Network (LoRaWAN) is one specification that enables these IoT devices to have access to the Internet. Former security analyses have suggested that the gateways in LoRaWAN in their current state are susceptible to a wide variety of malicious attacks, which can be notoriously difficult to mitigate since gateways are seen as obedient relays by design. These attacks, if not addressed, can cause malfunctions and loss of efficiency in the network traffic. As a solution to this unique problem, this paper presents a novel certificate authentication technique that enhances the cyber security of gateways in the LoRaWAN network. The proposed technique considers a public key infrastructure (PKI) solution that considers a two-tier certificate authority (CA) setup, such as a root-CA and intermediate-CA. This solution is promising, as the simulation results validate that about 66.67% of the packets that are arriving from an illegitimate gateway (GW) are discarded in our implemented secure and reliable solution.

Place, publisher, year, edition, pages
MDPI AG, 2022
Keywords
cybersecurity, LoRaWAN, security, vulnerabilities, gateway, attacks, authentication
National Category
Computer Systems
Identifiers
urn:nbn:se:kth:diva-313088 (URN)10.3390/s22093498 (DOI)000794727900001 ()35591187 (PubMedID)2-s2.0-85129417067 (Scopus ID)
Note

QC 20220531

Available from: 2022-05-31 Created: 2022-05-31 Last updated: 2022-06-25Bibliographically approved
Rencelj Ling, E., Urrea Cabus, J. E., Butun, I., Lagerström, R. & Olegård, J. (2022). Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis. In: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security: . Paper presented at the 17th International Conference on Availability, Reliability and Security, August 23 to August 26, 2022. Austria. Association for Computing Machinery (ACM), Article ID 74.
Open this publication in new window or tab >>Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis
Show others...
2022 (English)In: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, Association for Computing Machinery (ACM) , 2022, p. -7, article id 74Conference paper, Published paper (Refereed)
Abstract [en]

This paper investigates methods to secure Remote Terminal Units (RTUs) which are the building blocks of a smart grid systems - the next generation version to replace the power grid systems that are being used today. RTUs are identified as the heart of automation and control (SCADA) systems by the systems engineers. As such, security and maintaining nominal operability of such devices has prime importance, especially for the industrial automation networks such as the smart grid. A way of measuring the security of systems and networks is executing a series of cybersecurity weakness assessment tests called penetration testing. Another way of such an assessment is called vulnerability analysis by threat modelling which involves careful investigation and modelling of each and every component of a network/system under investigation. This article, aims at marrying these two methodologies for the vulnerability assessment of the RTUs in a methodological and scientific way.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2022
Keywords
SCADA, smart grid, power grid, RTU, threat modelling, attack graph, penetration testing
National Category
Computer Systems
Research subject
Computer Science; Electrical Engineering
Identifiers
urn:nbn:se:kth:diva-316684 (URN)10.1145/3538969.3544483 (DOI)001122620500074 ()2-s2.0-85136953128 (Scopus ID)
Conference
the 17th International Conference on Availability, Reliability and Security, August 23 to August 26, 2022. Austria
Note

QC 20220830

Available from: 2022-08-29 Created: 2022-08-29 Last updated: 2025-12-08Bibliographically approved
Urrea Cabus, J. E., Butun, I. & Lagerström, R. (2022). Security Considerations for Remote Terminal Units. In: Prof. Dr. Milan Bjelica (Ed.), 2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC), May 25-26 2022, Novi Sad,  Serbia: . Paper presented at 2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC), May 25-26 2022, Novi Sad,  Serbia (pp. 47-52). Novi Sad, Serbia: Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Security Considerations for Remote Terminal Units
2022 (English)In: 2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC), May 25-26 2022, Novi Sad,  Serbia / [ed] Prof. Dr. Milan Bjelica, Novi Sad, Serbia: Institute of Electrical and Electronics Engineers Inc. , 2022, p. 47-52Conference paper, Published paper (Refereed)
Abstract [en]

Carbon-neutral societies are moving closer tousing renewable electricity as their primary source of energy. Indeed, decarbonization, decentralization, and digitization areall aspects of a paradigm change in burgeoning power systems. Furthermore, the design, fault rate, load demand, and climate all have a role in the complexity of the electrical network. This research 1 looks at its use and deployment in network security, with a particular emphasis on the vulnerabilities of RTU frameworks. The necessity for risk management in today’s environment, the requirement for a networked power grid, and the hardware and software components of the SCADA system have been thoroughly examined. Finally, a literature review of interoperable power grids with detailed specifics of RTU deployment was provided.

Place, publisher, year, edition, pages
Novi Sad, Serbia: Institute of Electrical and Electronics Engineers Inc., 2022
Keywords
Cyberattack, Reliability, Remote Terminal Unit, SCADA
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Information and Communication Technology; Electrical Engineering; Industrial Information and Control Systems
Identifiers
urn:nbn:se:kth:diva-321322 (URN)10.1109/ZINC55034.2022.9840542 (DOI)001367244400010 ()2-s2.0-85136390369 (Scopus ID)
Conference
2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC), May 25-26 2022, Novi Sad,  Serbia
Projects
EnergyShield
Funder
EU, Horizon 2020, 832907
Note

QC 20220613

QC 20230626

Available from: 2022-11-10 Created: 2022-11-10 Last updated: 2025-12-08Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-3089-3885

Search in DiVA

Show all publications