Publications

Publications #

Papers #

  1. Süren, E., Heiding, F., Olegård, J., & Lagerström, R. (2023). PatrIoT: practical and agile threat research for IoT. International Journal of Information Security, 22(1), 213-233.
  2. Heiding, F., Süren, E., Olegård, J., & Lagerström, R. (2023). Penetration testing of connected households. Computers & Security, 126, 103067
  3. E. Rencelj Ling et al., Securing Communication and Identifying Threats in RTUs : A Vulnerability Analysis," in ARES ‘22: Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022.

Supervised theses #

  1. L. Bergström and L. Linusson-Hahn, Exploiting Vulnerabilities to Remotely Hijack Children’s Smartwatches, 2024.
  2. M. Siklosi and R. Kihlborg, Security Analysis of Nedis SmartLife Video Doorbell, 2024.
  3. F. Zuber, Hacking the airport X-ray machine, 2024.
  4. E. Wadell Ledin, Security Evaluation of a High-assurance USB sanitation system, 2024.
  5. F. Sannervik, Beyond the Dashboard : Vulnerability analysis of the MG Marvel R In-Vehicle Infotainment System, 2024.
  6. J. Öberg, How safe is safe : Ethical hacking of Verisure’s home alarm system, 2024.
  7. N. Shamaya and G. Tarcheh, Strengthening Cyber Defense: A Comparative Study of Smart Home Infrastructure for Penetration Testing and National Cyber Ranges, 2024.
  8. E. Mickols, Memory corruption in IoT: Extending PatrIoT to hunt memory corruption bugs, 2024.
  9. H. Höglund and R. Henareh, Collaboration platform for penetration tests enhanced with machine learning, 2024.
  10. J. Henning, Pentesting on a WiFi Adapter : A firmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting, 2023.
  11. A. Pétursson, Ethical Hacking of a Ring Doorbell, 2023.
  12. O. Antal, A cybersecurity audit of the Garmin Venu, 2023.
  13. S. Liu, Penetration testing of Sesame Smart door lock, 2023.
  14. Y. Tian, Are Children Safe with Smart Watches? : Security Analysis and Ethical Hacking on Children’s Smart Watches, 2023.
  15. N. Vatn, Underneath the Surface : Threat modeling and penetration testing of a submarine robot, 2023.
  16. A. Lindberg, Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat, 2023.
  17. Y. Wang, An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database, 2023.
  18. S. Feller, A study of Oracle Cloud Infrastructure : Demonstration of the vulnerability or reliability of certain services through penetration attacks, 2023.
  19. H. Stenhav, Security evaluation of the Matrix Server-Server API, 2023.
  20. D. Gustafsson, Password habits of Sweden, 2023.
  21. L. Manfredh, Assessing the security of a Garmin Smartwatch through Ethical hacking, 2022.
  22. J. Ingers and J. Sjöblom, IoT Penetration Testing : Examining the cyber security of connected vehicles, 2022.
  23. H. Mellin, Determining whether the Hövding bicycle airbag is secure against cyber attacks, 2022.
  24. T. Stroeven and F. Söderman, Cybersecurity Evaluation of an IP Camera, 2022.
  25. F. Huang, Ethical hacking of Sennheiser smart headphones, 2022.
  26. A. Winkelmann, Unauthorized Smart Lock Access : Ethical Hacking of Smart Lock Systems, 2022.
  27. J. Slagarp and E. Häggström, Trends and scientometrics in cyber security research, 2022.
  28. F. Bolandi, Automated Security Analysis of Firmware, 2022.
  29. A. Astély and J. Ekroth, Penetration Testing Ten Popular Swedish Android Applications, 2022.
  30. J. Ekenblad and S. Valenzuela, Security evaluation of ten Swedish mobile applications, 2022.
  31. F. Grönberg and B. Thiberg, Integrating the Meta Attack Language in the Cybersecurity Ecosystem: Creating new Security Tools Using Attack Simulation Results, 2022.
  32. X. Liu, Ethical Hacking of a Smart Video Doorbell, 2021.
  33. D. Isabar, Threat Modeling and Penetration Testing of a Yanzi IoT-system : A Survey on the Security of the system’s RF communication, 2021.
  34. N. Hjärne and I. Kols, IoT Security Assessment of a Home Security Camera, 2021.
  35. N. Hellesnes, Ethical Hacking of an IoT camera, 2021.
  36. L. Backlund and L. Ridderström, Hacking and Evaluating the Cybersecurity of an Internet Connected 3D Printer, 2021.
  37. A. Palm and B. Gafvelin, Ethical Hacking of Android Auto in the Context of Road Safety, 2021.
  38. R. Baran and C. Lindén, Etisk hackning : Säkerheten i en nätbutik, 2021.
  39. E. Dzidic and B. Jansson Mbonyimana, Penetration Testinga Saia Unit : A Control System for Water, Ventilation, and Heating in Smart Buildings, 2021.
  40. A. Altin and V. Nicolaou, Race Conditions in Web Applications, 2021.
  41. G. Rubbestad and W. Söderqvist, Hacking a Wi-Fi based drone, 2021.
  42. J. Lokrantz, Etisk hackning av en smart foderautomat, 2021.
  43. R. Achkoudir and Z. Alsaadi, Ethical Hacking of a Smart Plug, 2021.
  44. R. A. Y. Malkhasian, Ethical hacking of Danalock V3 : A cyber security analysis of a consumer IoT device, 2021.
  45. R. Salih, Adagio For The Internet Of Things : IoT penetration testing and security analysis of a smart plug, 2021.
  46. J. Karlsson Malik, Ethical hacking of Garmin’s sports watch, 2021.
  47. H. Georgiev and A. Mustafa, Hacking commercial IP cameras : Home Surveillance, 2021.
  48. J. Larsson, Are modern smart cameras vulnerable to yesterday’s vulnerabilities? : A security evaluation of a smart home camera, 2021.
  49. J. Feng and J. Tornert, Denial-of-service attacks against the Parrot ANAFI drone, 2021.
  50. S. Veijalainen and T. Noreng Karlsson, Evaluating the security of a smart door lock system, 2021.
  51. S. Skoog and G. Malki, Penetrationstestning av IoT-produkter : Etisk hackning av en smart kamera, 2021.
  52. J. Augustsson and J. Carlsson, Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab, 2021.
  53. M. Florez Cardenas and G. Acar, Ethical Hacking of a Smart Fridge : Evaluating the cybersecurity of an IoT device through gray box hacking, 2021.
  54. J. Öberg, Can a robot’s confidentiality be trusted?, 2021.
  55. A. Lindeberg, Hacking Into Someone’s Home using Radio Waves : Ethical Hacking of Securitas’ Alarm System, 2021.
  56. L. Carter, Security Analysis of a Beckhoff CX-9020 Programmable Logic Controller, 2021.
  57. L.-E. Hamid and S. Möller, How Secure is Verisure’s Alarm System?, 2020.