University of Jyväskylä | JYX Digital Repository

  • English  | Give feedback |
    • suomi
    • English
 
  • Login
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  • JYX
  • Opinnäytteet
  • Pro gradu -tutkielmat
  • View Item
JYX > Opinnäytteet > Pro gradu -tutkielmat > View Item

Hardening legacy IoT-devices by retrofitting security measures

Thumbnail
812.9 Kb

Authors
Laamanen, Jami
Date
2019
Discipline
TietotekniikkaMathematical Information Technology
Access restrictions


The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyväskylä University Library reserved for the use of archival materials.
You can request a copy of this thesis here
Copyright
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.

 
Uusia haavoittuvuuksia löydetään jatkuvasti vanhentuneista IoT-laitteista, joiden tuki on loppunut. Tavallisesti valmistajat lopettavat tällaisten laitteiden tukemisen, vaikka ne olisivat edelleen laajasti käytössä. Tässä pro gradu -tutkielmassa tutkitaan näiden laitteiden kovettamista tietoturvajärjestelmien jälkiasennuksella. Jäkiasennusta kovetusstrategiana tutkittiin tapaustutkimuksella, jossa WAF ja SSL-päätevälityspalvelin asennettiin emuloituun reititinympäristöön. Tämän kokeen tuloksena todettiin, että IoT-laitteita voidaan turvata tunnetuilta haavoittuvuuksilta jälkiasentamalla tietoturvajärjestelmiä. Huomattavaa oli kuitenkin sopivien järjestelmien puute, joka estää tämän strategian käyttämisen todellisissa tilanteissa. Tutkielmassa esitetään myös joitain toivottavia ominaisuuksia helposti jälkiasennettavissa oleville tietoturvajärjestelmille. Tällä kartoitetaan uusien järjestelmien kehitystä.
 
New vulnerabilities for outdated and unsupported IoT-devices are discovered on a regular basis. Usually, manufacturers stop updating these devices even though they might still be widely used. To secure these devices, the hardening ability of retrofitted security measures is studied in this thesis. Retrofitting as a hardening strategy was examined by conducting a case study where a WAF and an SSL termination proxy were installed into an emulated router firmware environment. Based on the experiments, retrofitting was found to be able to harden devices against known vulnerabilities. However, a distinct lack of suitable software was identified as a key issue for the wide-spread adoption of this strategy, and more research is needed to reach the maturity required for real-world use scenarios. By providing some guidelines on the desired qualities of retrofittable embedded security measures, this thesis paves the way for a novel hardening strategy.
 
Keywords
firmware hardening retrofitting SSL termination proxy WAF emulointi esineiden internet kyberturvallisuus emulation Internet of things cyber security
URI

http://urn.fi/URN:NBN:fi:jyu-202012287395

Metadata
Show full item record
Collections
  • Pro gradu -tutkielmat [24512]

Related items

Showing items with similar title or keywords.

  • HALE-IoT : HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants 

    Carrillo-Mondejar, J.; Turtiainen, Hannu; Costin, Andrei; Martinez, J.L.; Suarez-Tangil, G. (IEEE, 2022)
    Internet-Of-Things (IoT) devices and their firmware are notorious for their lifelong vulnerabilities. As device infection increases, vendors also fail to release patches at a competitive pace. Despite security in IoT being ...
  • Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems 

    Costin, Andrei (Springer, 2022)
    In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security ...
  • Capture The Flag -mallin soveltuminen kyberturvallisuuden opetukseen 

    Tarakkamäki, Aleksi (2020)
    Kyberturvallisuus on noussut jatkuvasti tärkeämmäksi osa-alueeksi nykypäiväisessä yhteiskunnassa. Jatkuva kehitys tuo mukanaan uusia haavoittuvuuksia, joiden avulla voidaan toteuttaa kyberuhkia. Toisaalta myös kyberturvallisuuden ...
  • RD Velho IoT Security model : secure technology, process and tools 

    Kellomäki, Tarmo (2019)
    Esineiden Internetin (IoT) laitteiden määrä on kasvanut dramaattisesti viime vuosina ja arvioiden mukaan laitteiden määrä tulee kasvamaan eksponentiaalisesti tulevina vuosina. IoT-liiketoiminnassa IoT-laitteiden skaalautuvuutta ...
  • Architecture-independent matching of stripped binary code files using BERT and a Siamese neural network 

    Lampinen, Kenneth (2020)
    The proliferation of IoT devices brings many cyber security challenges. Identifying executable code with known vulnerabilities is one of them, this despite the fact that open source code is commonly used in IoT firmware. ...
  • Browse materials
  • Browse materials
  • Articles
  • Conferences and seminars
  • Electronic books
  • Historical maps
  • Journals
  • Tunes and musical notes
  • Photographs
  • Presentations and posters
  • Publication series
  • Research reports
  • Research data
  • Study materials
  • Theses

Browse

All of JYXCollection listBy Issue DateAuthorsSubjectsPublished inDepartmentDiscipline

My Account

Login

Statistics

View Usage Statistics
  • How to publish in JYX?
  • Self-archiving
  • Publish Your Thesis Online
  • Publishing Your Dissertation
  • Publication services

Open Science at the JYU
 
Data Protection Description

Accessibility Statement

Unless otherwise specified, publicly available JYX metadata (excluding abstracts) may be freely reused under the CC0 waiver.
Open Science Centre