Marko Laakso
University of Oulu
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Marko Laakso.
international conference on communications | 2001
Rauli Kaksonen; Marko Laakso; Ari Takanen
Numerous information security vulnerabilities exist in contemporary software products. The purpose of this paper is to present a practical approach for software security assessment based on fault injection. The approach has been introduced and applied in a real world case, Wireless Application Protocol gateways. The approach has been effective in systematically uncovering robustness problems in the components tested. The main impact is expected from early elimination of trivial vulnerabilities and elevated awareness in robustness problems and their security implications.
Archive | 2003
Christian Wieser; Marko Laakso; Henning Schulzrinne
The Session Initiation Protocol (SIP) is a signaling protocol for Internet telephony, multimedia conferencing and instant messaging. Although SIP implementations have not yet been widely deployed, the product portfolio is expanding rapidly. We describe a method to assess the robustness of SIP implementation by describing a tool to find vulnerabilities. We prepared the test material and carried out tests against a sample set of existing implementations. Results were reported to the vendors and the test suite was made publicly available. Many of the implementations available for evaluation failed to perform in a robust manner under the test. Some failures had information security implications, and should be considered vulnerabilities.
Ethics and Information Technology | 2004
Ari Takanen; Petri Vuorijärvi; Marko Laakso; Juha Röning
Modern software is infested with flaws having information security aspects. Pervasive computing has made us and our society vulnerable. However, software developers do not fully comprehend what is at stake when faulty software is produced and flaws causing security vulnerabilites are discovered. To address this problem, the main actors involved with software vulnerability processes and the relevant roles inside these groups are identified. This categorisation is illustrated through a fictional case study, which is scrutinised in the light of ethical codes of professional software engineers and common principles of responsibility attribution. The focus of our analysis is on the acute handling of discovered vulnerabilities in software, including reporting, correcting and disclosing these vulnerabilities. We recognise a need for guidelines and mechanisms to facilitate further improvement in resolving processes leading to and in handling software vulnerabilities. In the spirit of disclosive ethics we call for further studies of the complex issues involved.
international conference on emerging security information, systems and technologies | 2008
Kreetta Askola; Rauli Puuperä; Pekka Pietikäinen; Juhani Eronen; Marko Laakso; Kimmo Halunen; Juha Röning
In this paper we present an application of the MATINE method for investigating dependencies in antivirus (AV) software and some vulnerabilities arising from these dependencies. Previously, this method has been effectively used to find vulnerabilities in network protocols. Because AV software is as vulnerable as any other software and has a great security impact, we decided to use this method to find vulnerabilities in AV software. These findings may have implications to critical infrastructure, for the use of AV is often considered obligatory. The results were obtained by gathering semantic data on AV vulnerabilities, analysis of the data and content analysis of media follow-up. The results indicate, that different aspects of AV software should be observed in the context of critical infrastructure planning and management.
Archive | 1999
Marko Laakso; Ari Takanen; Juha Röning
usenix security symposium | 2008
Joachim Viide; Aki Helin; Marko Laakso; Pekka Pietikäinen; Mika Seppänen; Kimmo Halunen; Rauli Puuperä; Juha Röning
International Journal On Advances in Security | 2009
Juhani Eronen; Kati Karjalainen; Rauli Puuperä; Erno Kuusela; Kimmo Halunen; Marko Laakso; Juha Röning
Archive | 2000
Ari Takanen; Marko Laakso; Juhani Eronen; Juha Röning
international conference on software testing verification and validation workshops | 2013
Thomas Wahlberg; Petri Paakkola; Christian Wieser; Marko Laakso; Juha Röning
Archive | 2013
Antti Häyrynen; Marko Laakso; Rauli Kaksonen