Todentamisen ohittaminen tutkimuksen nykytilanne

Tässä tutkimuksessa tehtiin systemaattinen kirjallisuuskartoitus selvittämään todentamisen ohittamiseen liittyvän tutkimuksen nykytilannetta, vertaillen julkaisuja ja samalla aikavälillä havaittuja haavoittuvuuksia. Tutkitut julkaisut kuvasivat pääasiassa ratkaisuja todentamisen ohittamisen estämise...

Full description

Bibliographic Details
Main Author: Turunen, Pinja
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Master's thesis
Language:fin
Published: 2022
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/81418
_version_ 1826225722336739328
author Turunen, Pinja
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Turunen, Pinja Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Turunen, Pinja Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Turunen, Pinja
datasource_str_mv jyx
description Tässä tutkimuksessa tehtiin systemaattinen kirjallisuuskartoitus selvittämään todentamisen ohittamiseen liittyvän tutkimuksen nykytilannetta, vertaillen julkaisuja ja samalla aikavälillä havaittuja haavoittuvuuksia. Tutkitut julkaisut kuvasivat pääasiassa ratkaisuja todentamisen ohittamisen estämiseksi, mutta myös hyökkäyksiä läpikäyviä julkaisuja oli paljon. Tutkimuksessa yleisimpiä käsiteltyjä aihealueita olivat laitteisiin ja yhteyksiin liittyvä todentamisen ohittaminen sekä biometrisen todentamisen haavoittuvuudet. Aiheeseen liittyvissä väärän todennuksen (CWE-287) alakategorioissa julkaisuista ja haavoittuvuuksista yleisin oli todentamisen ohittaminen huijaamisen kautta. Toisena julkaisuista oli toiston kautta todentamisen ohittaminen. Haavoittuvuuksissa toisiksi yleisimpänä oleva vaihtoehtoisen reitin tai kanavan käyttäminen sen sijaan esiintyi vähemmän julkaisuissa, mahdollisesti kaivaten lisätutkimusta. A systematic mapping study was conducted to assess the current status of research on authentication bypass, comparing studies and vulnerabilities occurring around the same time. Found studies mostly described solutions to prevent authentication bypass, but many also described attacks. In the research, the most common topics were authentication bypass in devices and connections, and vulnerabilities of biometric authentication. In the subcategories of improper authentication (CWE-287) relating to authentication bypass, the most common one in studies and vulnerabilities was authentication bypass by spoofing. The second in studies was bypass by capture-replay. In vulnerabilities, the second most common was bypass by alternate path or channel, which appeared less in studies, possibly needing further research.
first_indexed 2022-06-02T20:00:48Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "H\u00e4m\u00e4l\u00e4inen, Timo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Turunen, Pinja", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-06-02T06:51:52Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-06-02T06:51:52Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/81418", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkimuksessa tehtiin systemaattinen kirjallisuuskartoitus selvitt\u00e4m\u00e4\u00e4n todentamisen ohittamiseen liittyv\u00e4n tutkimuksen nykytilannetta, vertaillen julkaisuja ja samalla aikav\u00e4lill\u00e4 havaittuja haavoittuvuuksia. Tutkitut julkaisut kuvasivat p\u00e4\u00e4asiassa ratkaisuja todentamisen ohittamisen est\u00e4miseksi, mutta my\u00f6s hy\u00f6kk\u00e4yksi\u00e4 l\u00e4pik\u00e4yvi\u00e4 julkaisuja oli paljon. Tutkimuksessa yleisimpi\u00e4 k\u00e4siteltyj\u00e4 aihealueita olivat laitteisiin ja yhteyksiin liittyv\u00e4 todentamisen ohittaminen sek\u00e4 biometrisen todentamisen haavoittuvuudet. Aiheeseen liittyviss\u00e4 v\u00e4\u00e4r\u00e4n todennuksen (CWE-287) alakategorioissa julkaisuista ja haavoittuvuuksista yleisin oli todentamisen ohittaminen huijaamisen kautta. Toisena julkaisuista oli toiston kautta todentamisen ohittaminen. Haavoittuvuuksissa toisiksi yleisimp\u00e4n\u00e4 oleva vaihtoehtoisen reitin tai kanavan k\u00e4ytt\u00e4minen sen sijaan esiintyi v\u00e4hemm\u00e4n julkaisuissa, mahdollisesti kaivaten lis\u00e4tutkimusta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "A systematic mapping study was conducted to assess the current status of research on authentication bypass, comparing studies and vulnerabilities occurring around the same time. Found studies mostly described solutions to prevent authentication bypass, but many also described attacks. In the research, the most common topics were authentication bypass in devices and connections, and vulnerabilities of biometric authentication. In the subcategories of improper authentication (CWE-287) relating to authentication bypass, the most common one in studies and vulnerabilities was authentication bypass by spoofing. The second in studies was bypass by capture-replay. In vulnerabilities, the second most common was bypass by alternate path or channel, which appeared less in studies, possibly needing further research.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2022-06-02T06:51:52Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-06-02T06:51:52Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "75", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "ohittaminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "hy\u00f6kk\u00e4ys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kirjallisuuskartoitus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Todentamisen ohittaminen : tutkimuksen nykytilanne", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202206023040", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haavoittuvuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "todentaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_81418
language fin
last_indexed 2025-02-18T10:55:49Z
main_date 2022-01-01T00:00:00Z
main_date_str 2022
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/ef3b667a-2263-4b93-bc32-112665d9753e\/download","text":"URN:NBN:fi:jyu-202206023040.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2022
record_format qdc
source_str_mv jyx
spellingShingle Turunen, Pinja Todentamisen ohittaminen : tutkimuksen nykytilanne ohittaminen hyökkäys kirjallisuuskartoitus Tietotekniikka Mathematical Information Technology 602 haavoittuvuus todentaminen
title Todentamisen ohittaminen : tutkimuksen nykytilanne
title_full Todentamisen ohittaminen : tutkimuksen nykytilanne
title_fullStr Todentamisen ohittaminen : tutkimuksen nykytilanne Todentamisen ohittaminen : tutkimuksen nykytilanne
title_full_unstemmed Todentamisen ohittaminen : tutkimuksen nykytilanne Todentamisen ohittaminen : tutkimuksen nykytilanne
title_short Todentamisen ohittaminen
title_sort todentamisen ohittaminen tutkimuksen nykytilanne
title_sub tutkimuksen nykytilanne
title_txtP Todentamisen ohittaminen : tutkimuksen nykytilanne
topic ohittaminen hyökkäys kirjallisuuskartoitus Tietotekniikka Mathematical Information Technology 602 haavoittuvuus todentaminen
topic_facet 602 Mathematical Information Technology Tietotekniikka haavoittuvuus hyökkäys kirjallisuuskartoitus ohittaminen todentaminen
url https://jyx.jyu.fi/handle/123456789/81418 http://www.urn.fi/URN:NBN:fi:jyu-202206023040
work_keys_str_mv AT turunenpinja todentamisenohittaminentutkimuksennykytilanne