Change search
Link to record
Permanent link

Direct link
BETA
Carlsson, Anders
Publications (10 of 18) Show all publications
Adamov, A., Carlsson, A. & Surmacz, T. (2019). An analysis of lockergoga ransomware. In: 2019 IEEE East-West Design and Test Symposium, EWDTS 2019: . Paper presented at 2019 IEEE East-West Design and Test Symposium, EWDTS, Batumi; Georgia, 13 September 2019 through 16 September. Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>An analysis of lockergoga ransomware
2019 (English)In: 2019 IEEE East-West Design and Test Symposium, EWDTS 2019, Institute of Electrical and Electronics Engineers Inc. , 2019Conference paper, Published paper (Refereed)
Abstract [en]

This paper contains an analysis of the LockerGoga ransomware that was used in the range of targeted cyberattacks in the first half of 2019 against Norsk Hydra-A world top 5 aluminum manufacturer, as well as the US chemical enterprises Hexion, and Momentive-Those companies are only the tip of the iceberg that reported the attack to the public. The ransomware was executed by attackers from inside a corporate network to encrypt the data on enterprise servers and, thus, taking down the information control systems. The intruders asked for a ransom to release a master key and decryption tool that can be used to decrypt the affected files. The purpose of the analysis is to find out tactics and techniques used by the LockerGoga ransomware during the cryptolocker attack as well as an encryption model to answer the question if the encrypted files can be decrypted with or without paying a ransom. The scientific novelty of the paper lies in an analysis methodology that is based on various reverse engineering techniques such as multi-process debugging and using open source code of a cryptographic library to find out a ransomware encryption model. © 2019 IEEE.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2019
Keywords
cryptography, cryptolocker, encryption, LockerGoga, Malware, Malware Analysis, Ransomware, Reverse Engineering, targeted attack, Aluminum alloys, Chemical analysis, Chemical attack, Locks (fasteners), Open source software, Open systems, Sea ice, Chemical enterprise, Corporate networks, Information control systems, Reverse engineering techniques
National Category
Computer Sciences
Identifiers
urn:nbn:se:bth-19011 (URN)10.1109/EWDTS.2019.8884472 (DOI)2-s2.0-85075277685 (Scopus ID)9781728110035 (ISBN)
Conference
2019 IEEE East-West Design and Test Symposium, EWDTS, Batumi; Georgia, 13 September 2019 through 16 September
Available from: 2019-12-13 Created: 2019-12-13 Last updated: 2019-12-13Bibliographically approved
Kuzminykh, I., Carlsson, A., Yevdokymenko, M. & Sokolov, V. Y. (2019). Investigation of the IoT Device Lifetime with Secure Data Transmission. In: Galinina O.,Andreev S.,Koucheryavy Y.,Balandin S. (Ed.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): . Paper presented at 19th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2019, and 12th Conference on Internet of Things and Smart Spaces, ruSMART 2019; St. Petersburg; Russian Federation; 26 August 2019 through 28 August (pp. 16-27). Springer Verlag, 11660
Open this publication in new window or tab >>Investigation of the IoT Device Lifetime with Secure Data Transmission
2019 (English)In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) / [ed] Galinina O.,Andreev S.,Koucheryavy Y.,Balandin S., Springer Verlag , 2019, Vol. 11660, p. 16-27Conference paper, Published paper (Refereed)
Abstract [en]

This paper represents the approach for estimation of the lifetime of the IoT end devices. The novelty of this approach is in the taking into account not only the energy consumption for data transmission, but also for ensuring the security by using the encryption algorithms. The results of the study showed the effect of using data encryption during transmission on the device lifetime depending on the key length and the principles of the algorithm used. © 2019, Springer Nature Switzerland AG.

Place, publisher, year, edition, pages
Springer Verlag, 2019
Keywords
Cryptographic algorithms, Energy efficiency, IoT, Lifetime, Power consumption, Cryptography, Data transfer, Electric power utilization, Energy utilization, Next generation networks, Data encryption, Device lifetime, Encryption algorithms, End-devices, Key lengths, Secure data, Internet of things
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-18767 (URN)10.1007/978-3-030-30859-9_2 (DOI)9783030308582 (ISBN)
Conference
19th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2019, and 12th Conference on Internet of Things and Smart Spaces, ruSMART 2019; St. Petersburg; Russian Federation; 26 August 2019 through 28 August
Available from: 2019-10-21 Created: 2019-10-21 Last updated: 2019-10-21Bibliographically approved
Carlsson, A., Kuzminykh, I. & Gustavsson, R. (2019). Virtual Security Labs Supporting Distance Education in ReSeLa Framework. In: Auer M.E.,Tsiatsos T. (Ed.), Advances in Intelligent Systems and Computing: . Paper presented at 21st International Conference on Interactive Collaborative Learning, ICL 2018; Kos Island; Greece; 25 September 2018 through 28 September (pp. 577-587). Springer Verlag, 917
Open this publication in new window or tab >>Virtual Security Labs Supporting Distance Education in ReSeLa Framework
2019 (English)In: Advances in Intelligent Systems and Computing / [ed] Auer M.E.,Tsiatsos T., Springer Verlag , 2019, Vol. 917, p. 577-587Conference paper, Published paper (Refereed)
Abstract [en]

To meet the high demand of educating the next generation of MSc students in Cyber security, we propose a well-composed curriculum and a configurable cloud based learning support environment ReSeLa. The proposed system is a result of the EU TEMPUS project ENGENSEC and has been extensively validated and tested. © 2019, Springer Nature Switzerland AG.

Place, publisher, year, edition, pages
Springer Verlag, 2019
Series
Advances in Intelligent Systems and Computing, ISSN 2194-5357 ; 917
Keywords
CDIO, Cyber security, Distance learning, OpenStack, Remote lab, Training lab, Virtualization, Computer programming, Computer science, Distance education, Cloud-based, High demand, Learning support, Remote-labs, Virtual security, E-learning
National Category
Computer Sciences
Identifiers
urn:nbn:se:bth-17781 (URN)10.1007/978-3-030-11935-5_55 (DOI)2-s2.0-85063026787 (Scopus ID)9783030119348 (ISBN)
Conference
21st International Conference on Interactive Collaborative Learning, ICL 2018; Kos Island; Greece; 25 September 2018 through 28 September
Available from: 2019-04-05 Created: 2019-04-05 Last updated: 2019-04-05Bibliographically approved
Kuzminykh, I. & Carlsson, A. (2018). Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture. In: Galinina O., Andreev S., Balandin S., Koucheryavy Y. (eds) (Ed.), Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2018, ruSMART 2018. Lecture Notes in Computer Science, vol 11118: . Paper presented at NEW2AN 2018/ruSMART 2018, St. Petersburg (pp. 52-63). Springer, 11118
Open this publication in new window or tab >>Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture
2018 (English)In: Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2018, ruSMART 2018. Lecture Notes in Computer Science, vol 11118 / [ed] Galinina O., Andreev S., Balandin S., Koucheryavy Y. (eds), Springer, 2018, Vol. 11118, p. 52-63Conference paper, Published paper (Refereed)
Abstract [en]

This paper represents new functional architecture for the Internet of Things systems that use an avatar concept in displaying interaction between components of the architecture. Object-oriented representation of “thing” in the avatar concept allows simplify building and deployment of IoT systems over the web network and bind “things” to such application protocols as HTTP, CoAP, and WebSockets mechanism. The assets and stakeholders for ensuring security in IoT were specified. These assets are needed to isolate the risks associated with each of assets of IoT system. Example of Thing Instance’s description and its functionality using JSON format is shown also in the paper.

Place, publisher, year, edition, pages
Springer, 2018
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 11118
Keywords
IoT, Avatar, Thing instance, Threat assessment, Security risk assessment
National Category
Engineering and Technology
Identifiers
urn:nbn:se:bth-17128 (URN)10.1007/978-3-030-01168-0_6 (DOI)000477765900006 ()978-3-030-01167-3 (ISBN)978-3-030-01168-0 (ISBN)
Conference
NEW2AN 2018/ruSMART 2018, St. Petersburg
Available from: 2018-10-15 Created: 2018-10-15 Last updated: 2019-09-10Bibliographically approved
Kuzminykh, I., Carlsson, A., Franksson, R. & Liljegren, A. (2018). Measuring a LoRa Network: Performance, Possibilities and Limitations. In: Galinina O., Andreev S., Balandin S., Koucheryavy Y. (Ed.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): . Paper presented at 18th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2018 and 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018; St. Petersburg; Russian Federation; 27 August 2018 through 29 August 2018 (pp. 116-128). Springer, 11118
Open this publication in new window or tab >>Measuring a LoRa Network: Performance, Possibilities and Limitations
2018 (English)In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) / [ed] Galinina O., Andreev S., Balandin S., Koucheryavy Y., Springer, 2018, Vol. 11118, p. 116-128Conference paper, Published paper (Refereed)
Abstract [en]

Low power wide area (LPWA) technologies becomes popular for IoT use cases because LPWA is enable the broad range communications and allows to transmit small amounts of information in a long distance. Among LPWA technologies there are LTE-M, SigFox, LoRa, Symphony Link, Ingenu RPMA, Weightless, and NB-IoT. Currently all these technologies suffer from lack of documentation about deployment recommendation, have non-investigated limitations that can affect implementations and products using such technologies. This paper is focused on the testing of LPWAN LoRa technology to learn how a LoRa network gets affected by different environmental attributes such as distance, height and surrounding area by measuring the signal strength, signal to noise ratio and any resulting packet loss. The series of experiments for various use cases are conducted using a fully deployed LoRa network made up of a gateway and sensor available through the public network. The results will show the LoRa network limitation for such use cases as forest, city, open space. These results allow to give the recommendation for companies during early analysis and design stages of network life circle, and help to choose properly technology for deployment an IoT application.

Place, publisher, year, edition, pages
Springer, 2018
Series
Lecture Notes in Computer Science ; 11118
Keywords
IoT, LoRa, LPWAN, Transmission range, Arduino, Raspberry Pi
National Category
Engineering and Technology
Identifiers
urn:nbn:se:bth-17129 (URN)10.1007/978-3-030-01168-0_11 (DOI)000477765900011 ()978-3-030-01167-3 (ISBN)978-3-030-01168-0 (ISBN)
Conference
18th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2018 and 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018; St. Petersburg; Russian Federation; 27 August 2018 through 29 August 2018
Available from: 2018-10-15 Created: 2018-10-15 Last updated: 2019-09-10Bibliographically approved
Yevdokymenko, M., Shapovalova, A., Voloshchuk, O. & Carlsson, A. (2018). Proactive Approach for Security of the Infocommunication Network Based on Vulnerability Assessment. In: 2018 International Scientific-Practical Conference on Problems of Infocommunications Science and Technology, PIC S and T 2018 - Proceedings: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T). Paper presented at 2018 International Scientific-Practical Conference on Problems of Infocommunications Science and Technology, Kharkiv,OCT 09-12 (pp. 609-612). IEEE, Article ID 8632079.
Open this publication in new window or tab >>Proactive Approach for Security of the Infocommunication Network Based on Vulnerability Assessment
2018 (English)In: 2018 International Scientific-Practical Conference on Problems of Infocommunications Science and Technology, PIC S and T 2018 - Proceedings: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), IEEE , 2018, p. 609-612, article id 8632079Conference paper, Published paper (Refereed)
Abstract [en]

The paper explores methods for assessing vulnerabilities and assessing the spread of an attack in an infocommunication network. A proactive approach to the quantitative assessment of network security, which allows us to assess risks at the user and network level through the presence of vulnerabilities is presented. The proposed solutions will be useful for decision making and will be further integrated into a single metric for displaying the integrated level of security of the infocommunication network.

Place, publisher, year, edition, pages
IEEE, 2018
Keywords
infocommunication network, vulnerability, security, defense analysis, weight
National Category
Computer Systems
Identifiers
urn:nbn:se:bth-17717 (URN)000458659100115 ()
Conference
2018 International Scientific-Practical Conference on Problems of Infocommunications Science and Technology, Kharkiv,OCT 09-12
Available from: 2019-03-08 Created: 2019-03-08 Last updated: 2019-04-04Bibliographically approved
Carlsson, A. & Gustavsson, R. (2018). The art of war in the cyber world. In: 2017 4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T 2017 - Proceedings: . Paper presented at 4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T, Kharkiv, Ukraine (pp. 42-44). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>The art of war in the cyber world
2018 (English)In: 2017 4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T 2017 - Proceedings, Institute of Electrical and Electronics Engineers Inc. , 2018, p. 42-44Conference paper, Published paper (Refereed)
Abstract [en]

The paper focus on cyber weapons used in Advanced Persistent Threat (ATP) attacks in present and future cyber warfare. The combined use of propaganda and cyber warfare supports military operations on the ground and is exemplified with the ongoing Russian hybrid warfare in Ukraine. New models and methods to develop future trustworthy critical infrastructures in our societies are presented. Some mitigation ideas to meet the challenges of future hybrid warfare are also discussed. © 2017 IEEE.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2018
Keywords
ATP attack vectors, critical infrastruct-ures, espionage, false information, Network Function Virtualization (NFV), Software Defined Networks (SDN), Computer crime, Military operations, Art of war, Attack vector, Cyber warfare, Cyber worlds, Ukraine, Network function virtualization
National Category
Computer Sciences
Identifiers
urn:nbn:se:bth-16169 (URN)10.1109/INFOCOMMST.2017.8246345 (DOI)2-s2.0-85046084448 (Scopus ID)9781538609835 (ISBN)
Conference
4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T, Kharkiv, Ukraine
Available from: 2018-05-11 Created: 2018-05-11 Last updated: 2018-05-14Bibliographically approved
Kuzminykh, I., Sokolov, V. & Carlsson, A. (2017). Scheme for dynamic channel allocation with interference reduction in wireless sensor network. In: IEEE (Ed.), 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T): . Paper presented at 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, Ukraine (pp. 564-568). IEEE
Open this publication in new window or tab >>Scheme for dynamic channel allocation with interference reduction in wireless sensor network
2017 (English)In: 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T) / [ed] IEEE, IEEE, 2017, p. 564-568Conference paper, Published paper (Refereed)
Abstract [en]

he paper introduces a new scheme of dynamic interference free channel allocation. The scheme is based on additional spectral analyzers in wireless networks IEEE 802.11. Design and implementation is presented.

Place, publisher, year, edition, pages
IEEE, 2017
Keywords
Transceivers, Channel allocation, Interference, Reflection, Antenna theory, Cognitive radio, Wireless fidelity
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-15950 (URN)10.1109/INFOCOMMST.2017.8246463 (DOI)000426514100127 ()978-1-5386-0983-5 (ISBN)
Conference
4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, Ukraine
Available from: 2018-03-14 Created: 2018-03-14 Last updated: 2018-05-11Bibliographically approved
Kuzminykh, I., Snihurov, A. & Carlsson, A. (2017). Testing of communication range in ZigBee technology. In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2017 - Proceedings: . Paper presented at 14th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2017; Lviv - Polyana; Ukraine (pp. 133-136). Institute of Electrical and Electronics Engineers (IEEE), Article ID 7916102.
Open this publication in new window or tab >>Testing of communication range in ZigBee technology
2017 (English)In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2017 - Proceedings, Institute of Electrical and Electronics Engineers (IEEE), 2017, p. 133-136, article id 7916102Conference paper, Published paper (Refereed)
Abstract [en]

- In the rapidly growing Internet of Things (loT) applications from personal electronics to industrial machines and sensors are getting wirelessly connected to the Internet. Many well-known communication technologies such as WiFi, ZigBee, Bluetooth and cellular are used for transfer data in IoT. The choice of corresponding technology or combination of technologies depends on application or other factors such as data requirements, communication range, security and power demands, battery life. In this paper we will focus on ZigBee wireless technology and testing ZigBee end devices in order to see how transmission range impacts on quality parameters. © 2017 IEEE.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2017
Keywords
Computer aided design, Microelectronics, Wireless telecommunication, systemsZigbee
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-14675 (URN)10.1109/CADSM.2017.7916102 (DOI)000403602400032 ()9781509050444 (ISBN)
Conference
14th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2017; Lviv - Polyana; Ukraine
Available from: 2017-06-22 Created: 2017-06-22 Last updated: 2017-09-21Bibliographically approved
Kuzminykh, I., Snihurov, A. & Carlsson, A. (2017). Testing of communication range in ZigBee technology. In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM): . Paper presented at 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Lviv, Ukraine. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Testing of communication range in ZigBee technology
2017 (English)In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Institute of Electrical and Electronics Engineers (IEEE), 2017Conference paper, Published paper (Refereed)
Abstract [en]

Abstract:In the rapidly growing Internet of Things (loT) applications from personal electronics to industrial machines and sensors are getting wirelessly connected to the Internet. Many well-known communication technologies such as WiFi, ZigBee, Bluetooth and cellular are used for transfer data in IoT. The choice of corresponding technology or combination of technologies depends on application or other factors such as data requirements, communication range, security and power demands, battery life. In this paper we will focus on ZigBee wireless technology and testing ZigBee end devices in order to see how transmission range impacts on quality parameters.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2017
Keywords
ZigBee, Wireless sensor networks, Wireless communication, Universal Serial Bus, IoT, X-CTU, Communication system security
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-15951 (URN)10.1109/CADSM.2017.7916102 (DOI)978-1-5090-5045-1 (ISBN)978-1-5090-5046-8 (ISBN)
Conference
14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Lviv, Ukraine
Available from: 2018-03-14 Created: 2018-03-14 Last updated: 2018-03-27Bibliographically approved
Organisations

Search in DiVA

Show all publications