Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Marko Laakso is active.

Publication


Featured researches published by Marko Laakso.


international conference on communications | 2001

System Security Assessment through Specification Mutations and Fault Injection

Rauli Kaksonen; Marko Laakso; Ari Takanen

Numerous information security vulnerabilities exist in contemporary software products. The purpose of this paper is to present a practical approach for software security assessment based on fault injection. The approach has been introduced and applied in a real world case, Wireless Application Protocol gateways. The approach has been effective in systematically uncovering robustness problems in the components tested. The main impact is expected from early elimination of trivial vulnerabilities and elevated awareness in robustness problems and their security implications.


Archive | 2003

Security testing of SIP implementations

Christian Wieser; Marko Laakso; Henning Schulzrinne

The Session Initiation Protocol (SIP) is a signaling protocol for Internet telephony, multimedia conferencing and instant messaging. Although SIP implementations have not yet been widely deployed, the product portfolio is expanding rapidly. We describe a method to assess the robustness of SIP implementation by describing a tool to find vulnerabilities. We prepared the test material and carried out tests against a sample set of existing implementations. Results were reported to the vendors and the test suite was made publicly available. Many of the implementations available for evaluation failed to perform in a robust manner under the test. Some failures had information security implications, and should be considered vulnerabilities.


Ethics and Information Technology | 2004

Agents of responsibility in software vulnerability processes

Ari Takanen; Petri Vuorijärvi; Marko Laakso; Juha Röning

Modern software is infested with flaws having information security aspects. Pervasive computing has made us and our society vulnerable. However, software developers do not fully comprehend what is at stake when faulty software is produced and flaws causing security vulnerabilites are discovered. To address this problem, the main actors involved with software vulnerability processes and the relevant roles inside these groups are identified. This categorisation is illustrated through a fictional case study, which is scrutinised in the light of ethical codes of professional software engineers and common principles of responsibility attribution. The focus of our analysis is on the acute handling of discovered vulnerabilities in software, including reporting, correcting and disclosing these vulnerabilities. We recognise a need for guidelines and mechanisms to facilitate further improvement in resolving processes leading to and in handling software vulnerabilities. In the spirit of disclosive ethics we call for further studies of the complex issues involved.


international conference on emerging security information, systems and technologies | 2008

Vulnerability Dependencies in Antivirus Software

Kreetta Askola; Rauli Puuperä; Pekka Pietikäinen; Juhani Eronen; Marko Laakso; Kimmo Halunen; Juha Röning

In this paper we present an application of the MATINE method for investigating dependencies in antivirus (AV) software and some vulnerabilities arising from these dependencies. Previously, this method has been effectively used to find vulnerabilities in network protocols. Because AV software is as vulnerable as any other software and has a great security impact, we decided to use this method to find vulnerabilities in AV software. These findings may have implications to critical infrastructure, for the use of AV is often considered obligatory. The results were obtained by gathering semantic data on AV vulnerabilities, analysis of the data and content analysis of media follow-up. The results indicate, that different aspects of AV software should be observed in the context of critical infrastructure planning and management.


Archive | 1999

The Vulnerability Process: A Tiger Team Approach to Resolving Vulnerability Cases

Marko Laakso; Ari Takanen; Juha Röning


usenix security symposium | 2008

Experiences with model inference assisted fuzzing

Joachim Viide; Aki Helin; Marko Laakso; Pekka Pietikäinen; Mika Seppänen; Kimmo Halunen; Rauli Puuperä; Juha Röning


International Journal On Advances in Security | 2009

Software Vulnerability vs. Critical Infrastructure - a Case Study of Antivirus Software

Juhani Eronen; Kati Karjalainen; Rauli Puuperä; Erno Kuusela; Kimmo Halunen; Marko Laakso; Juha Röning


Archive | 2000

Running Malicious Code By Exploiting Buffer Overflows: A Survey Of Publicly Available Exploits

Ari Takanen; Marko Laakso; Juhani Eronen; Juha Röning


international conference on software testing verification and validation workshops | 2013

Kepler -- Raising Browser Security Awareness

Thomas Wahlberg; Petri Paakkola; Christian Wieser; Marko Laakso; Juha Röning


Archive | 2013

Système permettant de tester une application informatique

Antti Häyrynen; Marko Laakso; Rauli Kaksonen

Collaboration


Dive into the Marko Laakso's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge