Essays about: "External vulnerabilities"

Showing result 1 - 5 of 17 essays containing the words External vulnerabilities.

  1. 1. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Mah Noor; Syeda Hina Murad; [2023]
    Keywords : Smart contract; Blockchain; Ethereum; attacks; security vulnerabilities; security audits;

    Abstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE

  2. 2. Exploring the Security Implications of a Decentralized Internet : Vulnerabilities in Web3 and Blockchain-Based Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erik Blondell; [2023]
    Keywords : Blockchain; Web3; security; smart contracts; vulnerabilities; Blockchain; säkerhet; Web3; smart-contracts; sårbarheter;

    Abstract : The internet has evolved from an information-based reading platform to a read-and-write platform which is dominated by a handful of organizations. This centralization has led to a movement suggesting a new shift using blockchain technology to create a decentralised internet. READ MORE

  3. 3. Robust BECCS deployment strategies under deep uncertainty : A case study of Stockholm Exergi

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Oscar Stenström; [2023]
    Keywords : Bioenergy carbon capture and storage; BECCS; decision making under deep uncertainty; DMDU; Dynamic Adaptive Planning; DAP; Robust Decision Making; RDM; Bioenergy carbon capture and storage; BECCS; decision making under deep uncertainty; DMDU; Dynamic Adaptive Planning; DAP; Robust Decision Making; RDM;

    Abstract : The most recent IPCC assessment shows that negative emissions (NEs) and carbon dioxide removal (CDR) technologies are becoming increasingly important in scenarios that limit global warming to 2 °C or lower. In these scenarios, one key set of CDR technologies is bioenergy carbon capure and storage (BECCS). READ MORE

  4. 4. Understanding the Norwegian Petroleum Industry: How does Oil explain Norwegian Public Expenditure and Social Spending? How vulnerable is it to shocks?

    University essay from Lunds universitet/Ekonomisk-historiska institutionen

    Author : Ignacio Ruesta Boceta; [2023]
    Keywords : Norway; Social Public Spending; Oil Exports; VEC; Impulse Response; External vulnerabilities; Business and Economics;

    Abstract : There are few people who deny that Norway's social welfare was achieved after Oil Discoveries. But there is concern about the sustainability of the Norwegian economy regarding the volatility of the Oil market. READ MORE

  5. 5. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE