Publications
Some recent selected publications from the Software Systems Architecture and Security (SSAS) group.
Journal publications
Conference publications
Open-access computer programs
Pontus Johnson, Mathias Ekstedt, and Robert Lagerström, ” The Meta Attack Language (MAL) .” Including MAL based languages such as coreLang, vehicleLang, cloudLang, enterpriseLang, powerLang.
Pontus Johnson, Robert Lagerström, and Mathias Ekstedt, “ A Meta Language for Threat Modeling and Attack Simulations ,” in Proc. of the International Conference on Availability, Reliability and Security (ARES 2018) and the joint International Workshop on Cyber Threat Intelligence (WCTI 2018), 2018.
Other programs and tools can be found on the KTH SSAS github page .
Master Theses
Hjert, Adrian and Salomonsson, Viktor, Braking Bad – Remote Attack Vector Analysis on the MG Marvel R, 2025
Bergström, Lukas and Linusson-Hahn, Lage, Exploiting Vulnerabilities to Remotely Hijack Children’s Smartwatches, 2024
Korduner Ekroth, Johan, A Penetration Testing Study on a Connected Vehicle Penetration testing of current smart thermostats, 2024
Sannervik, Filip, Beyond the Dashboard – Vulnerability analysis of the MG Marvel R IVI, 2024
Wadell Ledin, Erik, Security Evaluation of a High-assurance USB sanitation system, 2024
Wallin Forsell, Fredrik, Cyber Security Assessment of Distribution System Operators, 2024
Öberg, Joakim, How safe is safe – Ethical hacking of Verisure’s home alarm system, 2024
Shamaya, Nina and Tarcheh, Gergo, Strengthening Cyber Defense – Comparative Study of Smart-Home Pen-testing vs Cyber Ranges, 2024
Siklosi, Martin and Olsson Kihlborg, Robert, Security Analysis of Nedis SmartLife Video Doorbell, 2024
Lundén, Viktor, Automated Threat Modelling in an Existing Medical System, 2024
Mickols, Erik, Memory corruption in IoT – Extending PatrIoT to hunt bugs, 2024
Hussain, Adeel, Cybersecurity Analysis of Charge-Amps “Dawn” EV Chargebox Systems, 2024
Antal, Oliver, A cybersecurity audit of the Garmin Venu, 2023
Feller, Shanly, A study of Oracle Cloud Infrastructure (penetration attacks), 2023
Ethical hacking of a network security camera, 2023
Henning, Johan, Pentesting on a WiFi Adapter, 2023
Karlberg, Pontus, Is your camera spying on you? – A security evaluation of a smart camera, 2023
Liu, Shuyuan, Penetration testing of Sesame Smart door lock, 2023
Pétursson, Arnar, Ethical Hacking of a Ring Doorbell, 2023
Stenhav, Hîvron, Security evaluation of the Matrix Server-Server API, 2023
Tian, Yaqi, Are Children Safe with Smart Watches? – Security Analysis and Ethical Hacking, 2023
Vatn, Niklas, Underneath the Surface – Threat modelling & pen-testing of a submarine robot, 2023
Zhou, Ziyang, Evaluating Security Mechanisms of Substation Automation Systems
Hacking the airport X-ray machine, 2023