Essays about: "COMPUTER VULNERABILITY"

Showing result 1 - 5 of 34 essays containing the words COMPUTER VULNERABILITY.

  1. 1. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marcus Dypbukt Källman; [2023]
    Keywords : Cybersecurity; PageRank; Attack Graphs; Threat analysis; Threat modelling; Cybersäkerhet; PageRank; Attackgrafer; Hotanalys; Hotmodellering;

    Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE

  2. 2. Detection of Prototype Pollution Using Joern : Joern’s Detection Capability Compared to CodeQL’s

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tobias Fröberg; [2023]
    Keywords : CodeQL; Computer security; JavaScript; Joern; Prototype pollution; Vulnerability detection; CodeQL; Datorsäkerhet; JavaScript; Joern; Prototypförorening; Sårbarhetsdetektering;

    Abstract : JavaScript-built programs are widely used by the general public, but they are also vulnerable to JavaScript-related exploits stemming from the newly discovered prototype pollution vulnerability. Research has been focused on understanding the impact of this vulnerability and finding ways to detect it using code analysis tools. READ MORE

  3. 3. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Henrik Lindblom; [2023]
    Keywords : Computer Security; Operating Systems; Control-flow hijack attacks; Buffer Overflow; Stack; DOS;

    Abstract : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. READ MORE

  4. 4. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Viktor Olofsson; [2023]
    Keywords : control-flow integrity; CFI; control-flow graph; CFG; memory corruption; Android; vulnerability; android vulnerability; computer security;

    Abstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE

  5. 5. A Vulnerability Assessment Approach for Home Networks : A case of Cameroon

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Elvis Etengeneng Tanyi; [2023]
    Keywords : Vulnerability Assessment; Home Networks; Vulnerability scanning; developing countries; Cameroon;

    Abstract : The research highlights the importance of vulnerability assessment in evaluating the effectiveness of security mechanisms in computer and network systems. While vulnerability assessment is commonly practiced by companies and businesses, it is often underlooked in the context of home networks. READ MORE