Publications
#
Papers
#
- Süren, E., Heiding, F., Olegård, J., & Lagerström, R. (2023). PatrIoT: practical and agile threat research for IoT. International Journal of Information Security, 22(1), 213-233.
- Heiding, F., Süren, E., Olegård, J., & Lagerström, R. (2023). Penetration testing of connected households. Computers & Security, 126, 103067
- E. Rencelj Ling et al., Securing Communication and Identifying Threats in RTUs : A Vulnerability Analysis," in ARES ‘22: Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022.
Supervised theses
#
- L. Bergström and L. Linusson-Hahn, Exploiting Vulnerabilities to Remotely Hijack Children’s Smartwatches, 2024.
- M. Siklosi and R. Kihlborg, Security Analysis of Nedis SmartLife Video Doorbell, 2024.
- F. Zuber, Hacking the airport X-ray machine, 2024.
- E. Wadell Ledin, Security Evaluation of a High-assurance USB sanitation system, 2024.
- F. Sannervik, Beyond the Dashboard : Vulnerability analysis of the MG Marvel R In-Vehicle Infotainment System, 2024.
- J. Öberg, How safe is safe : Ethical hacking of Verisure’s home alarm system, 2024.
- N. Shamaya and G. Tarcheh, Strengthening Cyber Defense: A Comparative Study of Smart Home Infrastructure for Penetration Testing and National Cyber Ranges, 2024.
- E. Mickols, Memory corruption in IoT: Extending PatrIoT to hunt memory corruption bugs, 2024.
- H. Höglund and R. Henareh, Collaboration platform for penetration tests enhanced with machine learning, 2024.
- J. Henning, Pentesting on a WiFi Adapter : A firmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting, 2023.
- A. Pétursson, Ethical Hacking of a Ring Doorbell, 2023.
- O. Antal, A cybersecurity audit of the Garmin Venu, 2023.
- S. Liu, Penetration testing of Sesame Smart door lock, 2023.
- Y. Tian, Are Children Safe with Smart Watches? : Security Analysis and Ethical Hacking on Children’s Smart Watches, 2023.
- N. Vatn, Underneath the Surface : Threat modeling and penetration testing of a submarine robot, 2023.
- A. Lindberg, Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat, 2023.
- Y. Wang, An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database, 2023.
- S. Feller, A study of Oracle Cloud Infrastructure : Demonstration of the vulnerability or reliability of certain services through penetration attacks, 2023.
- H. Stenhav, Security evaluation of the Matrix Server-Server API, 2023.
- D. Gustafsson, Password habits of Sweden, 2023.
- L. Manfredh, Assessing the security of a Garmin Smartwatch through Ethical hacking, 2022.
- J. Ingers and J. Sjöblom, IoT Penetration Testing : Examining the cyber security of connected vehicles, 2022.
- H. Mellin, Determining whether the Hövding bicycle airbag is secure against cyber attacks, 2022.
- T. Stroeven and F. Söderman, Cybersecurity Evaluation of an IP Camera, 2022.
- F. Huang, Ethical hacking of Sennheiser smart headphones, 2022.
- A. Winkelmann, Unauthorized Smart Lock Access : Ethical Hacking of Smart Lock Systems, 2022.
- J. Slagarp and E. Häggström, Trends and scientometrics in cyber security research, 2022.
- F. Bolandi, Automated Security Analysis of Firmware, 2022.
- A. Astély and J. Ekroth, Penetration Testing Ten Popular Swedish Android Applications, 2022.
- J. Ekenblad and S. Valenzuela, Security evaluation of ten Swedish mobile applications, 2022.
- F. Grönberg and B. Thiberg, Integrating the Meta Attack Language in the Cybersecurity Ecosystem: Creating new Security Tools Using Attack Simulation Results, 2022.
- X. Liu, Ethical Hacking of a Smart Video Doorbell, 2021.
- D. Isabar, Threat Modeling and Penetration Testing of a Yanzi IoT-system : A Survey on the Security of the system’s RF communication, 2021.
- N. Hjärne and I. Kols, IoT Security Assessment of a Home Security Camera, 2021.
- N. Hellesnes, Ethical Hacking of an IoT camera, 2021.
- L. Backlund and L. Ridderström, Hacking and Evaluating the Cybersecurity of an Internet Connected 3D Printer, 2021.
- A. Palm and B. Gafvelin, Ethical Hacking of Android Auto in the Context of Road Safety, 2021.
- R. Baran and C. Lindén, Etisk hackning : Säkerheten i en nätbutik, 2021.
- E. Dzidic and B. Jansson Mbonyimana, Penetration Testinga Saia Unit : A Control System for Water, Ventilation, and Heating in Smart Buildings, 2021.
- A. Altin and V. Nicolaou, Race Conditions in Web Applications, 2021.
- G. Rubbestad and W. Söderqvist, Hacking a Wi-Fi based drone, 2021.
- J. Lokrantz, Etisk hackning av en smart foderautomat, 2021.
- R. Achkoudir and Z. Alsaadi, Ethical Hacking of a Smart Plug, 2021.
- R. A. Y. Malkhasian, Ethical hacking of Danalock V3 : A cyber security analysis of a consumer IoT device, 2021.
- R. Salih, Adagio For The Internet Of Things : IoT penetration testing and security analysis of a smart plug, 2021.
- J. Karlsson Malik, Ethical hacking of Garmin’s sports watch, 2021.
- H. Georgiev and A. Mustafa, Hacking commercial IP cameras : Home Surveillance, 2021.
- J. Larsson, Are modern smart cameras vulnerable to yesterday’s vulnerabilities? : A security evaluation of a smart home camera, 2021.
- J. Feng and J. Tornert, Denial-of-service attacks against the Parrot ANAFI drone, 2021.
- S. Veijalainen and T. Noreng Karlsson, Evaluating the security of a smart door lock system, 2021.
- S. Skoog and G. Malki, Penetrationstestning av IoT-produkter : Etisk hackning av en smart kamera, 2021.
- J. Augustsson and J. Carlsson, Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab, 2021.
- M. Florez Cardenas and G. Acar, Ethical Hacking of a Smart Fridge : Evaluating the cybersecurity of an IoT device through gray box hacking, 2021.
- J. Öberg, Can a robot’s confidentiality be trusted?, 2021.
- A. Lindeberg, Hacking Into Someone’s Home using Radio Waves : Ethical Hacking of Securitas’ Alarm System, 2021.
- L. Carter, Security Analysis of a Beckhoff CX-9020 Programmable Logic Controller, 2021.
- L.-E. Hamid and S. Möller, How Secure is Verisure’s Alarm System?, 2020.