Secure Continuous Deployment of Military Software

Examensarbete för masterexamen

Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.12380/242177
Download file(s):
File Description SizeFormat 
242177.pdfFulltext1.36 MBAdobe PDFView/Open
Type: Examensarbete för masterexamen
Master Thesis
Title: Secure Continuous Deployment of Military Software
Authors: Blomquist, Johannes
Härdmark, Johan
Abstract: Continuous deployment of military software over the Internet could introduce many positive features, like shorter development times, better customer tted products and on-demand functionality upgrades. It however also introduces a number of new threats and vulnerabilities that needs to be thoroughly investigated and assessed. This Master Thesis proposes a methodology for how to design and evaluate a system with security in mind that allows the designer to build the system from scratch by adding components to mitigate the discovered vulnerabilities. The methodology is based on Microsoft's thread model, with methods like STRIDE and DREAD. Di erent security protocols and concepts are examined in order to evaluate whether and how continuous deployment could be applied in the military industry. The proposed methodology is not military speci c and could therefore be used by anyone that wants to build a secure system, although the speci c vulnerabilities and their implications presented in this report are with a military setting in mind. As a big Swedish defence contractor, some of the information Saab handles is of sensitive nature with respect to the Swedish national security. By Swedish law any information classi ed as defence secrets have to be handled according to Swedish De- fence Material Administrations (FMV) policies. Parts of these policies are by themselves classi ed as defence secrets and are therefore not allowed to be present in this report. As of this, the solutions proposed will apply to information that does not contain de- fence secrets, but could in other aspects be sensitive, and are based on public protocols, algorithms and products.
Keywords: Informations- och kommunikationsteknik;Data- och informationsvetenskap;Information & Communication Technology;Computer and Information Science
Issue Date: 2015
Publisher: Chalmers tekniska högskola / Institutionen för data- och informationsteknik (Chalmers)
Chalmers University of Technology / Department of Computer Science and Engineering (Chalmers)
URI: https://hdl.handle.net/20.500.12380/242177
Collection:Examensarbeten för masterexamen // Master Theses



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.