Security Analysis of Machine Monitoring Sensor Communication A threat modeling process implementation and evaluation

dc.contributor.authorLjungdahl, Martin
dc.contributor.authorNordström, Michael
dc.contributor.departmentChalmers tekniska högskola / Institutionen för data- och informationsteknik (Chalmers)sv
dc.contributor.departmentChalmers University of Technology / Department of Computer Science and Engineering (Chalmers)en
dc.date.accessioned2019-07-03T13:55:20Z
dc.date.available2019-07-03T13:55:20Z
dc.date.issued2016
dc.description.abstractThe number of small devices that are connected to the Internet is increasing rapidly and the system that controls them are becoming more and more complex. Using these devices in products and system has the potential to lower costs, increase performance and provide new functionality. A substantial amount of these devices are used in "smart homes" or to monitor and control critical electro-mechanical systems. When developing such system often functionally and performance is prioritized in comparison to security and many systems have computer security and network security concerns. To help the developers create secure systems it exist a practice named Threat Modeling in which you work with the system through different stages to find its vulnerabilities. There exist several threat models that are aimed for specific systems of a certain type. It exists limited research about threat models aimed for system consisting of small devices connected to the Internet. In this project a threat modeling process will be conducted and applied on a smartphone/IoT system developed by one of Cybercom’s customer. In addition, the threat modeling process will be evaluated for correctness and applicability when applying it to a smartphone/IoT system and how the process might be improved. Platform specific threat libraries created by accredited sources will be used to for both validation and improvements. Penetration testing will be carried out with a subset of the threats generated by the threat modeling process and from the threat libraries in order to validate the applicability of the threats.
dc.identifier.urihttps://hdl.handle.net/20.500.12380/238297
dc.language.isoeng
dc.setspec.uppsokTechnology
dc.subjectData- och informationsvetenskap
dc.subjectComputer and Information Science
dc.titleSecurity Analysis of Machine Monitoring Sensor Communication A threat modeling process implementation and evaluation
dc.type.degreeExamensarbete för masterexamensv
dc.type.degreeMaster Thesisen
dc.type.uppsokH
local.programmeComputer systems and networks (MPCSN), MSc
Ladda ner
Original bundle
Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
238297.pdf
Storlek:
5.2 MB
Format:
Adobe Portable Document Format
Beskrivning:
Fulltext