dc.contributor.author | Ghafoor, Imran | |
dc.contributor.author | Supervised by Dr. Baber Aslam. | |
dc.date.accessioned | 2020-10-26T05:36:21Z | |
dc.date.available | 2020-10-26T05:36:21Z | |
dc.date.issued | 2014-09 | |
dc.identifier.other | TIS-180 | |
dc.identifier.other | MSIS-09 | |
dc.identifier.uri | http://10.250.8.41:8080/xmlui/handle/123456789/4796 | |
dc.description.abstract | Attack of “Stuxnet” on Iranian Nuclear Program highlighted the need of Cyber-security and Information Security for Embedded Systems. Information security protocols and standards were originally developed for standard PCs, whereas embedded systems are designed with limited memory and computing resources. Therefore tailored-down versions of information security protocols were deployed for embedded communication security. Embedded systems are now-a-days required to communicate over the internet. Secure socket layer (SSL) or Transport layer security (TLS) provides secure communication channels. Internet-of-Things (IoT) regime, where virtually every device will be connected and communicating over the internet will be using primarily SSL/TLS to secure communications. OpenSSL is an open source implementation of SSL/TLS protocol widely used to secure online communications. OpenSSL is prone to security vulnerabilities with ‘Heartbleed’ being the latest. The prime focus of this research is a detailed Analysis of Heartbleed bug found in OpenSSL also referred as CVE-2014-0160. It was investigated that Heartbleed originated from the introduction of Heartbeat functionality into the Feb-2010 release of OpenSSL. A simple memory length check failure on Heartbeat request can cause server to return up to 64K bytes of memory that might contain sensitive information. The patch to the Heartbleed bug is the implementation of this memory checking mechanism. Patch for OpenSSL was implemented and was found to be safe from Heartbleed attack. OpenSSL has been implemented on STM32 microcontroller to secure embedded devices communication. Heartbleed bug was observed and the system was found to be vulnerable. The vulnerability was tested again after implementing a suggested patch on OpenSSL. The patched version of OpenSSL was found to be secure from Heartbleed bug. The research recommends measures to secure the device after patching for Heartbleed. Recommended future work on this topic is to investigate/analyze patched version of OpenSSL for heartbeat type potential vulnerabilities. | en_US |
dc.language.iso | en | en_US |
dc.publisher | MCS | en_US |
dc.title | Analysis of heartbleed vulnerability in openssl implementation for embedded systems | en_US |
dc.type | Thesis | en_US |