Essays about: "MITM-attack"
Showing result 1 - 5 of 6 essays containing the word MITM-attack.
-
1. Penetration testing of Sesame Smart door lock
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Internet of things (IoT) device has been widely used in various fields, and its market is expanding rapidly. However, the growing usage of IoT devices also brings more security concerns. The smart door lock is one of the smart home IoT devices that need to be designed securely. READ MORE
-
2. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. READ MORE
-
3. Security Auditing and Testing of two Android Client-Server Applications
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : How secure is your application? How can you evaluate if it is secure? The threats are many and may be hard to find. In a world where things are more and more automated; how does manual labour contribute to security auditing applications? This study aims to assess two proof of concept Android client-server applications, developed by students to suit the needs of a fictitious Police Department and Fire Department, respectively. READ MORE
-
4. Data tampering in Vehicle CAN Bus networks
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The paradigm of the automotive industry has changed, over the course of the last10-15 years. Electronics and software, have introduced in many dierents parts ofa vehicle and the drive-by-wire it is taking over the vehicle functions. Connectivityfunctionalities are increasing in the context of the automotive industry as well. READ MORE
-
5. Ethical hacking of IoT devices: OBD-II dongles
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The subject area of this project is IT security related to cars, specifically the security of devices connected through a cars OBD-II connector. The aim of the project is to see the security level of the AutoPi OBD-II unit and to analyse where potential vulnerabilities are likely to occur when in use. READ MORE