A proxy-based solution for securiting remote desktop connections in mission-critical systems

Ron Bitton, Clint Feher, Yuval Elovici, Asaf Shabtai, Gaby Shugol, Raz Tikochinski, Shachar Kur

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Remote desktop protocols (RDPs) are used for connecting and interacting with computers remotely. In recent years, we have witnessed a number of vulnerabilities identified in two widely used remote desktop implementations, Microsoft Remote Desktop and RealVNC, that may expose the connected systems to a new attack vector. Such vulnerabilities are particularly concerning when it comes to mission-critical systems in which a client device with a low trust level connects to the critical system via a remote desktop server. In this preliminary study we propose a proxy-based solution that applies various modules, each of which mitigates a different type of threat, in order to secure remote desktop connections used in missioncritical systems.

Original languageAmerican English
Title of host publicationProceedings - IEEE 18th International Symposium on High Assurance Systems Engineering, HASE 2017
Pages153-156
Number of pages4
ISBN (Electronic)9781509046355
DOIs
StatePublished - 25 Apr 2017
Event18th IEEE International Symposium on High Assurance Systems Engineering, HASE 2017 - Singapore, Singapore
Duration: 12 Jan 201714 Jan 2017

Publication series

NameProceedings of IEEE International Symposium on High Assurance Systems Engineering

Conference

Conference18th IEEE International Symposium on High Assurance Systems Engineering, HASE 2017
Country/TerritorySingapore
CitySingapore
Period12/01/1714/01/17

Keywords

  • Malware
  • Mission-critical system
  • Proxy
  • Remote code execution
  • Remote desktop

All Science Journal Classification (ASJC) codes

  • Software
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'A proxy-based solution for securiting remote desktop connections in mission-critical systems'. Together they form a unique fingerprint.

Cite this