Hardening legacy IoT-devices by retrofitting security measures

Uusia haavoittuvuuksia löydetään jatkuvasti vanhentuneista IoT-laitteista, joiden tuki on loppunut. Tavallisesti valmistajat lopettavat tällaisten laitteiden tukemisen, vaikka ne olisivat edelleen laajasti käytössä. Tässä pro gradu -tutkielmassa tutkitaan näiden laitteiden kovettamista tietoturvajär...

Full description

Bibliographic Details
Main Author: Laamanen, Jami
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Master's thesis
Language:eng
Published: 2019
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/73463
_version_ 1826225691266383872
author Laamanen, Jami
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Laamanen, Jami Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Laamanen, Jami Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Laamanen, Jami
datasource_str_mv jyx
description Uusia haavoittuvuuksia löydetään jatkuvasti vanhentuneista IoT-laitteista, joiden tuki on loppunut. Tavallisesti valmistajat lopettavat tällaisten laitteiden tukemisen, vaikka ne olisivat edelleen laajasti käytössä. Tässä pro gradu -tutkielmassa tutkitaan näiden laitteiden kovettamista tietoturvajärjestelmien jälkiasennuksella. Jäkiasennusta kovetusstrategiana tutkittiin tapaustutkimuksella, jossa WAF ja SSL-päätevälityspalvelin asennettiin emuloituun reititinympäristöön. Tämän kokeen tuloksena todettiin, että IoT-laitteita voidaan turvata tunnetuilta haavoittuvuuksilta jälkiasentamalla tietoturvajärjestelmiä. Huomattavaa oli kuitenkin sopivien järjestelmien puute, joka estää tämän strategian käyttämisen todellisissa tilanteissa. Tutkielmassa esitetään myös joitain toivottavia ominaisuuksia helposti jälkiasennettavissa oleville tietoturvajärjestelmille. Tällä kartoitetaan uusien järjestelmien kehitystä. New vulnerabilities for outdated and unsupported IoT-devices are discovered on a regular basis. Usually, manufacturers stop updating these devices even though they might still be widely used. To secure these devices, the hardening ability of retrofitted security measures is studied in this thesis. Retrofitting as a hardening strategy was examined by conducting a case study where a WAF and an SSL termination proxy were installed into an emulated router firmware environment. Based on the experiments, retrofitting was found to be able to harden devices against known vulnerabilities. However, a distinct lack of suitable software was identified as a key issue for the wide-spread adoption of this strategy, and more research is needed to reach the maturity required for real-world use scenarios. By providing some guidelines on the desired qualities of retrofittable embedded security measures, this thesis paves the way for a novel hardening strategy.
first_indexed 2020-12-28T21:01:46Z
format Pro gradu
fullrecord [{"key": "dc.contributor.advisor", "value": "Costin, Andrei", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Laamanen, Jami", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-12-28T11:10:22Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-12-28T11:10:22Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/73463", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Uusia haavoittuvuuksia l\u00f6ydet\u00e4\u00e4n jatkuvasti vanhentuneista IoT-laitteista, joiden tuki on loppunut. Tavallisesti valmistajat lopettavat t\u00e4llaisten laitteiden tukemisen, vaikka ne olisivat edelleen laajasti k\u00e4yt\u00f6ss\u00e4. T\u00e4ss\u00e4 pro gradu -tutkielmassa tutkitaan n\u00e4iden laitteiden kovettamista tietoturvaj\u00e4rjestelmien j\u00e4lkiasennuksella. J\u00e4kiasennusta kovetusstrategiana tutkittiin tapaustutkimuksella, jossa WAF ja SSL-p\u00e4\u00e4tev\u00e4lityspalvelin asennettiin emuloituun reititinymp\u00e4rist\u00f6\u00f6n. T\u00e4m\u00e4n kokeen tuloksena todettiin, ett\u00e4 IoT-laitteita voidaan turvata tunnetuilta haavoittuvuuksilta j\u00e4lkiasentamalla tietoturvaj\u00e4rjestelmi\u00e4. Huomattavaa oli kuitenkin sopivien j\u00e4rjestelmien puute, joka est\u00e4\u00e4 t\u00e4m\u00e4n strategian k\u00e4ytt\u00e4misen todellisissa tilanteissa. Tutkielmassa esitet\u00e4\u00e4n my\u00f6s joitain toivottavia ominaisuuksia helposti j\u00e4lkiasennettavissa oleville tietoturvaj\u00e4rjestelmille. T\u00e4ll\u00e4 kartoitetaan uusien j\u00e4rjestelmien kehityst\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "New vulnerabilities for outdated and unsupported IoT-devices are discovered on a regular basis. Usually, manufacturers stop updating these devices even though they might still be widely used. To secure these devices, the hardening ability of retrofitted security measures is studied in this thesis. Retrofitting as a hardening strategy was examined by conducting a case study where a WAF and an SSL termination proxy were installed into an emulated router firmware environment. Based on the experiments, retrofitting was found to be able to harden devices against known vulnerabilities. However, a distinct lack of suitable software was identified as a key issue for the wide-spread adoption of this strategy, and more research is needed to reach the maturity required for real-world use scenarios. By providing some guidelines on the desired qualities of retrofittable embedded security measures, this thesis paves the way for a novel hardening strategy.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-12-28T11:10:22Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-12-28T11:10:22Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "64", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "firmware", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "hardening", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "retrofitting", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "SSL termination proxy", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "WAF", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Hardening legacy IoT-devices by retrofitting security measures", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202012287395", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "emulointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "emulation", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet of things", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston <a href=\"https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat\">arkistoty\u00f6asemalta</a>.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "<br><br>The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival <a href=\"https://kirjasto.jyu.fi/en/workspaces/facilities\">workstation</a> at Jyv\u00e4skyl\u00e4 University Library reserved for the use of archival materials.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_73463
language eng
last_indexed 2025-02-18T10:54:10Z
main_date 2019-01-01T00:00:00Z
main_date_str 2019
publishDate 2019
record_format qdc
source_str_mv jyx
spellingShingle Laamanen, Jami Hardening legacy IoT-devices by retrofitting security measures firmware hardening retrofitting SSL termination proxy WAF Tietotekniikka Mathematical Information Technology 602 emulointi esineiden internet kyberturvallisuus emulation Internet of things cyber security
title Hardening legacy IoT-devices by retrofitting security measures
title_full Hardening legacy IoT-devices by retrofitting security measures
title_fullStr Hardening legacy IoT-devices by retrofitting security measures Hardening legacy IoT-devices by retrofitting security measures
title_full_unstemmed Hardening legacy IoT-devices by retrofitting security measures Hardening legacy IoT-devices by retrofitting security measures
title_short Hardening legacy IoT-devices by retrofitting security measures
title_sort hardening legacy iot devices by retrofitting security measures
title_txtP Hardening legacy IoT-devices by retrofitting security measures
topic firmware hardening retrofitting SSL termination proxy WAF Tietotekniikka Mathematical Information Technology 602 emulointi esineiden internet kyberturvallisuus emulation Internet of things cyber security
topic_facet 602 Internet of things Mathematical Information Technology SSL termination proxy Tietotekniikka WAF cyber security emulation emulointi esineiden internet firmware hardening kyberturvallisuus retrofitting
url https://jyx.jyu.fi/handle/123456789/73463 http://www.urn.fi/URN:NBN:fi:jyu-202012287395
work_keys_str_mv AT laamanenjami hardeninglegacyiotdevicesbyretrofittingsecuritymeasures