The use of CVE -related databases in improving the cybersecurity of embedded systems
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Cybersecurity is an important core concept for all information systems currently being used. It is a subject that has become more relevant with each passing year as information systems become more and more prevalent in our everyday use. It is also often a very poorly understood concept by the general public, which contributes to the fact that the most severe cybersecurity threats most information system face are directly or indirectly caused by negligence by non-malicious humans, i.e. mistakes due to poorly understood practices and concepts. The subject of cybersecurity is heavily research, but there is always room for more research especially concerning more specific parts of information systems, like the embedded systems. This study focuses on embedded systems and their cybersecurity trends through the lens of CVE -entries. Embedded systems are generally defined as small and simple, but also critical, parts of larger systems, that are responsible for certain dedicated functions, which also contributes to their specific cybersecurity vulnerabilities. ...
MetadataShow full item record
- Pro gradu -tutkielmat 
Showing items with similar title or keywords.
On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Mission-Critical Systems Khandker, Syed; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)Automatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology and a critical component of next-generation air transportation systems. It significantly simplifies aircraft surveillance technology ...
Simola, Jussi; Lehto, Martti (Academic Conferences International, 2020)The research will find out feature-based functionalities concerning the national cybersecurity system HAVARO and how the system is possible to implement to the EU level early warning system. The research based on interviews, ...
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Peregrine Technical Solutions, 2020)Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine ...
Myllyla, Juuso; Costin, Andrei (FRUCT Oy, 2021)Cyber attacks have become harder to detect, causing the average detection time of a successful data breach to be over six months and typically costing the target organization nearly four million dollars. The attacks are ...
Cybersecurity attacks on software logic and error handling within ADS-B implementations : systematic testing of resilience and countermeasures Khandker, Syed; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2021)Automatic Dependent Surveillance-Broadcast (ADS-B) is a cornerstone of the next-generation digital sky and is now mandated in several countries. However, there have been many reports of serious security vulnerabilities in ...