Publications
#
Papers
#
- Süren, E., Heiding, F., Olegård, J., & Lagerström, R. (2023). PatrIoT: practical and agile threat research for IoT. International Journal of Information Security, 22(1), 213-233.
- Heiding, F., Süren, E., Olegård, J., & Lagerström, R. (2023). Penetration testing of connected households. Computers & Security, 126, 103067
- E. Rencelj Ling et al., Securing Communication and Identifying Threats in RTUs : A Vulnerability Analysis," in ARES ‘22: Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022.
Supervised theses
#
- L. Bergström and L. Linusson-Hahn, Exploiting Vulnerabilities to Remotely Hijack Children’s Smartwatches, 2024.
- M. Siklosi and R. Kihlborg, Security Analysis of Nedis SmartLife Video Doorbell, 2024.
- F. Zuber, Hacking the airport X-ray machine, 2024.
- E. Wadell Ledin, Security Evaluation of a High-assurance USB sanitation system, 2024.
- F. Sannervik, Beyond the Dashboard: Vulnerability analysis of the MG Marvel R In-Vehicle Infotainment System, 2024.
- J. Öberg, How safe is safe: Ethical hacking of Verisure’s home alarm system, 2024.
- N. Shamaya and G. Tarcheh, Strengthening Cyber Defense: A Comparative Study of Smart Home Infrastructure for Penetration Testing and National Cyber Ranges, 2024.
- E. Mickols, Memory corruption in IoT: Extending PatrIoT to hunt memory corruption bugs, 2024.
- H. Höglund and R. Henareh, Collaboration platform for penetration tests enhanced with machine learning, 2024.
- J. Henning, Pentesting on a WiFi Adapter: A firmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting, 2023.
- A. Pétursson, Ethical Hacking of a Ring Doorbell, 2023.
- O. Antal, A cybersecurity audit of the Garmin Venu, 2023.
- S. Liu, Penetration testing of Sesame Smart door lock, 2023.
- Y. Tian, Are Children Safe with Smart Watches?: Security Analysis and Ethical Hacking on Children’s Smart Watches, 2023.
- N. Vatn, Underneath the Surface: Threat modeling and penetration testing of a submarine robot, 2023.
- A. Lindberg, Penetration testing of current smart thermostats: Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat, 2023.
- Y. Wang, An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database, 2023.
- S. Feller, A study of Oracle Cloud Infrastructure: Demonstration of the vulnerability or reliability of certain services through penetration attacks, 2023.
- H. Stenhav, Security evaluation of the Matrix Server-Server API, 2023.
- D. Gustafsson, Password habits of Sweden, 2023.
- T. D. Sundström and J. Nilsson, Ethical hacking of a premium robot vacuum: Penetration testing of the Roborock S7 robot vacuum cleaner, 2022.
- L. Manfredh, Assessing the security of a Garmin Smartwatch through Ethical hacking, 2022.
- J. Ingers and J. Sjöblom, IoT Penetration Testing: Examining the cyber security of connected vehicles, 2022.
- H. Mellin, Determining whether the Hövding bicycle airbag is secure against cyber attacks, 2022.
- T. Stroeven and F. Söderman, Cybersecurity Evaluation of an IP Camera, 2022.
- F. Huang, Ethical hacking of Sennheiser smart headphones, 2022.
- A. Winkelmann, Unauthorized Smart Lock Access: Ethical Hacking of Smart Lock Systems, 2022.
- J. Slagarp and E. Häggström, Trends and scientometrics in cyber security research, 2022.
- F. Bolandi, Automated Security Analysis of Firmware, 2022.
- A. Astély and J. Ekroth, Penetration Testing Ten Popular Swedish Android Applications, 2022.
- J. Ekenblad and S. Valenzuela, Security evaluation of ten Swedish mobile applications, 2022.
- F. Grönberg and B. Thiberg, Integrating the Meta Attack Language in the Cybersecurity Ecosystem: Creating new Security Tools Using Attack Simulation Results, 2022.
- X. Liu, Ethical Hacking of a Smart Video Doorbell, 2021.
- D. Isabar, Threat Modeling and Penetration Testing of a Yanzi IoT-system: A Survey on the Security of the system’s RF communication, 2021.
- N. Hjärne and I. Kols, IoT Security Assessment of a Home Security Camera, 2021.
- N. Hellesnes, Ethical Hacking of an IoT camera, 2021.
- L. Backlund and L. Ridderström, Hacking and Evaluating the Cybersecurity of an Internet Connected 3D Printer, 2021.
- A. Palm and B. Gafvelin, Ethical Hacking of Android Auto in the Context of Road Safety, 2021.
- R. Baran and C. Lindén, Etisk hackning: Säkerheten i en nätbutik, 2021.
- E. Dzidic and B. Jansson Mbonyimana, Penetration Testinga Saia Unit: A Control System for Water, Ventilation, and Heating in Smart Buildings, 2021.
- A. Altin and V. Nicolaou, Race Conditions in Web Applications, 2021.
- G. Rubbestad and W. Söderqvist, Hacking a Wi-Fi based drone, 2021.
- J. Lokrantz, Etisk hackning av en smart foderautomat, 2021.
- R. Achkoudir and Z. Alsaadi, Ethical Hacking of a Smart Plug, 2021.
- R. A. Y. Malkhasian, Ethical hacking of Danalock V3: A cyber security analysis of a consumer IoT device, 2021.
- R. Salih, Adagio For The Internet Of Things: IoT penetration testing and security analysis of a smart plug, 2021.
- J. Karlsson Malik, Ethical hacking of Garmin’s sports watch, 2021.
- H. Georgiev and A. Mustafa, Hacking commercial IP cameras: Home Surveillance, 2021.
- J. Larsson, Are modern smart cameras vulnerable to yesterday’s vulnerabilities?: A security evaluation of a smart home camera, 2021.
- J. Feng and J. Tornert, Denial-of-service attacks against the Parrot ANAFI drone, 2021.
- S. Veijalainen and T. Noreng Karlsson, Evaluating the security of a smart door lock system, 2021.
- S. Skoog and G. Malki, Penetrationstestning av IoT-produkter: Etisk hackning av en smart kamera, 2021.
- J. Augustsson and J. Carlsson, Clean Code: Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab, 2021.
- M. Florez Cardenas and G. Acar, Ethical Hacking of a Smart Fridge: Evaluating the cybersecurity of an IoT device through gray box hacking, 2021.
- J. Öberg, Can a robot’s confidentiality be trusted?, 2021.
- A. Lindeberg, Hacking Into Someone’s Home using Radio Waves: Ethical Hacking of Securitas’ Alarm System, 2021.
- L. Carter, Security Analysis of a Beckhoff CX-9020 Programmable Logic Controller, 2021.
- L. E. Hamid and S. Möller, How Secure is Verisure’s Alarm System?, 2020.
- C. Torgilsman and E. Bröndum, Ethical Hacking of a Robot Vacuum Cleaner, 2020.
- F. Radholm and N. Abefelt, Ethical Hacking of an IoT-device: Threat Assessment and Penetration Testing A Survey on Security of a Smart Refrigerator, 2020.
- T. H. Gran and E. Mickols, Hacking a Commercial Drone, 2020.
- A. Borg and C. A. Francke, IoT Pentesting: Obtaining the Firmware of a Smart Lock, 2020.
- V. Edström and E. Zeynalli, Penetration testing a civilian drone: Reverse engineering software in search for security vulnerabilities, 2020.
- D. Galal and M. Tillberg, Security Test of iZettle’s Reader 2: A card terminal for safe payments?, 2020.
- A. Westman and F. Wilén, IoT-lang : Threat Modeling for Internet of Things, 2020.
- M. Berner, Where’s My Car? Ethical Hacking of a Smart Garage, 2020.
- E. Good, Security Analysis of a Siemens SICAM CMIC Remote Terminal Unit, 2020.
- D. C. Ortiz, Ethical Hacking Of An Industrial Control System, 2020.
- L. Christensen and D. Dannberg, Ethical hacking of IoT devices: OBD-II dongles, 2019.
- C. Robberts and J. Toft, Finding Vulnerabilities in IoT Devices: Ethical Hacking of Electronic Locks, 2019.
- A. Wallström and M. A. Omer, Implementing Security Techniques to Lower the Probability of IoT-devices Getting Hacked, 2019.
- L. C. Booth and M. Mayrany, IoT Penetration Testing: Hacking an Electric Scooter, 2019.
- A. Burdzovic and J. Matsson, IoT Penetration Testing: Security analysis of a car dongle, 2019.
- A. L. Forsberg and T. Olsson, IoT Offensive Security Penetration Testing: Hacking a Smart Robot Vacuum Cleaner, 2019.
- A. Viderberg, Security evaluation of smart door locks, 2019.