dc.contributor.advisor | Costin, Andrei | |
dc.contributor.author | Kolehmainen, Santtu | |
dc.date.accessioned | 2019-05-22T08:11:10Z | |
dc.date.available | 2019-05-22T08:11:10Z | |
dc.date.issued | 2019 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/64101 | |
dc.description.abstract | Purpose of this thesis was to analyze the state of firmware update security within SOHO (Small Office/Home Office) routers as anecdotal claims of insecure routers are common and firmware updates are critical to the overall device security. A case study was performed, where 12 devices were analyzed using network and firmware level analysis. Analyzed devices were found to have trivial vulnerabilities where Man-In-The-Middle attacker could deny further updates or install malicious firmware through the network update mechanism. Results highlight the need for large-scale security analysis of similar devices and more secure development practices. | en |
dc.format.extent | 66 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en | |
dc.subject.other | firmware updates | |
dc.subject.other | embedded systems | |
dc.subject.other | firmware analysis | |
dc.title | Security of firmware update mechanisms within SOHO routers | |
dc.identifier.urn | URN:NBN:fi:jyu-201905222704 | |
dc.type.ontasot | Pro gradu -tutkielma | fi |
dc.type.ontasot | Master’s thesis | en |
dc.contributor.tiedekunta | Informaatioteknologian tiedekunta | fi |
dc.contributor.tiedekunta | Faculty of Information Technology | en |
dc.contributor.laitos | Informaatioteknologia | fi |
dc.contributor.laitos | Information Technology | en |
dc.contributor.yliopisto | Jyväskylän yliopisto | fi |
dc.contributor.yliopisto | University of Jyväskylä | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.rights.copyright | Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty. | fi |
dc.rights.copyright | This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited. | en |
dc.type.publication | masterThesis | |
dc.contributor.oppiainekoodi | 602 | |
dc.subject.yso | sulautettu tietotekniikka | |
dc.subject.yso | takaisinmallinnus | |
dc.subject.yso | turvallisuusanalyysi | |
dc.subject.yso | ubiquitous computing | |
dc.subject.yso | reverse engineering | |
dc.subject.yso | security analysis | |
dc.format.content | fulltext | |
dc.type.okm | G2 | |