• All in a day's work: Password cracking for the rest of us 

      Blakstad, Jørgen Wahl; Nergård, Rune; Jaatun, Martin Gilje; Gligoroski, Danilo (Chapter, 2009)
      The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems. Additionally, some of the most popular operating systems such as ...
    • Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects 

      Cruzes, Daniela Soares; Jaatun, Martin Gilje; Bernsmed, Karin; Tøndel, Inger Anne (Journal article; Peer reviewed, 2018)
      The goal of secure software engineering is to create software that keeps performing as intended even when exposed to attacks. Threat modeling is considered to be a key activity, but can be challenging to perform for ...
    • Cyber Security in Smart Meters: Vulnerability Investigation in the Home Area Network Port 

      Fredriksen, Isa Agnete Halmøy (Master thesis, 2018)
      As a part of a modernized electric power system, mechanical electricity meters are being exchanged with smart meters. The smart meters are to be equipped with a communication interface that customers may use to get a better ...
    • Cybersecurity Preparedness Exercises in Smart Grid: Collaboration With Suppliers During Incident Response 

      Langås, Mari; Løfqvist, Sanna (Master thesis, 2021)
      Introduksjonen av informasjons- og kommunikasjonsteknologi (IKT) i det tradisjonelle strømnettet har resultert i et digitalisert strømnett, ofte referert til som smart grid. Smart grid gjør driften og hendelseshåndteringen ...
    • Cybersecurity Preparedness Exercises in Smart Grid: Collaboration With Suppliers During Incident Response 

      Løfqvist, Sanna; Langås, Mari (Master thesis, 2021)
      Introduksjonen av informasjons- og kommunikasjonsteknologi (IKT) i det tradisjonelle strømnettet har resultert i et digitalisert strømnett, ofte referert til som smart grid. Smart grid gjør driften og hendelseshåndteringen ...
    • An Empirical Study of CERT Capacity in the North Sea 

      Jaatun, Martin Gilje; Bodsberg, Lars; Grøtan, Tor Olav; Moe, Marie Elisabeth Gaup (Chapter, 2020)
      This paper documents the results of an empirical study of cyber incident response readiness in the Norwegian petroleum industry. The study addressed the Computer Emergency Response Team (CERT) capacity among various actors ...
    • Er Bug Bounty Programmer en Bærekraftig Behandling for Sikkerhetsmangler? 

      Trond Hønsi (Master thesis, 2020)
      I en verden hvor hackere tar datasystemer som gisler i bytte mot løsepenger, og myndighetene truer med bøter hvis personinformasjon kommer på avveie, blir det stadig viktigere å sikre datasystemene sine mot trusler. Flere ...
    • Implementing a Secure Ad Hoc Network 

      Graarud, Espen Grannes (Master thesis, 2011)
      In emergency situations such as natural disasters the emergency personell shouldbe able to establish communication fast and reliably. Depending on the nature ofthe disaster one cannot rely on existing communication ...
    • Is a Smarter Grid Also Riskier? 

      Bernsmed, Karin; Jaatun, Martin Gilje; Frøystad, Christian (Journal article; Peer reviewed, 2019)
      The smart grid evolution digitalizes the traditional power distribution grid, by integrating information communication technology into its operation and control. A particularly interesting challenge is the integration of ...
    • Monitoring Intrusions and Security Breaches in Highly Distributed Cloud Environments 

      Taheri Monfared, Aryan; Jaatun, Martin Gilje (Chapter, 2011)
      Cloud computing is a new computing model, and security is ranked first among its challenges. This paper reviews existing security monitoring mechanisms compared with new challenges which are caused by this new model. We ...
    • OWASP Top 10 - Do Startups Care? 

      Søhoel, Halldis M; Jaatun, Martin Gilje; Boyd, Colin Alexander (Chapter, 2018)
      In a cut-throat world where time-to-market can be the difference between success and failure, it can be tempting for startups to think “let’s get it to work first, and then we’ll worry about security later.” However, major ...
    • OWASP top ten - What is the state of practice among start-ups? 

      Søhoel, Halldis Margrete (Master thesis, 2018)
      New apps and web services are increasingly serving our everyday needs, and they are appearing at high speed. How secure are all these services? This thesis has tested the security of five web services developed by startups. ...
    • Procedures and Tools to Reset or Recover the Administrator Password on Popular Operating Systems 

      Blakstad, Jørgen Wahl; Nergård, Rune Walsø (Master thesis, 2009)
      Unauthorized access to computers and theft of proprietary information are two problems leading to large economical losses for organizations around the world. Thousands of laptops often containing vital information are lost ...
    • Security in Industrial Networks 

      Sørensen, Jan Tore (Master thesis, 2007)
      A major trend in the automation and power industries is the transition from closed proprietary network solutions to open TCP/IP protocols running on Ethernet technologies. As these industries converge on an all IP platform, ...
    • Security Threats in Demo Steinkjer. Report from the Telenor-SINTEF collaboration project on Smart Grids 

      Tøndel, Inger Anne; Jaatun, Martin Gilje; Bartnes, Maria (SINTEF Rapport;A23351, Research report, 2012)
      This report describes security threats associated with the deployment of an Advanced Metering Infrastructure (AMI) in the Demo Steinkjer demonstration project. The description is based on the first phase of the actual smart ...
    • Simulation of a Secure Ad Hoc Network Routing Protocol 

      Bowitz, Anne Gabrielle (Master thesis, 2011)
      Secure wireless ad hoc networks possess many properties that are highly valuable in e.g. emergency situations and military applications. By using X.509 certificates, the ad hoc routing protocol B.A.T.M.A.N. has been modified ...
    • Software Bill of Materials in Critical Infrastructure 

      Jaatun, Lars Andreassen; Sørlien, Silje Marie; Borgaonkar, Ravishankar Bhaskarrao; Steve, Taylor; Jaatun, Martin Gilje (Chapter, 2023)
      Critical infrastructure today is comprised of cyber-physical systems, and therefore also vulnerable to cyber threats. Many of these threats come from within, through malicious code in software updates or bugs that can be ...
    • Survival by Deception 

      Jaatun, Martin Gilje; Nyre, Åsmund Ahlmann; Sørensen, Jan Tore (Journal article; Peer reviewed, 2007)
      A system with a high degree of availability and survivability can be created via service duplication on disparate server platforms, where a compromise via a previously unknown attack is detected by a voting mechanism. ...
    • Testing and Exploring Vulnerabilities of the Applications Implementing DNP3 Protocol 

      Faruk, A. B. M. Omar (Master thesis, 2008)
      Supervisory Control and Data Acquisition (SCADA) networks control critical infrastructures. They play vital roles for utility companies and the process industry including electricity, natural gas, oil, water, etc. This ...
    • With a Little Help from Your Friends: Collaboration with Vendors During Smart Grid Incident Response Exercises 

      Langås, Mari; Løfqvist, Sanna; Katt, Basel; Haugan, Thomas Sagvold; Jaatun, Martin Gilje (Chapter, 2021)
      The introduction of Information and Communications Technology (ICT) into conventional power grids has resulted in a digitalized smart grid, enabling a more efficient and robust operation. However, it can also lead to ...