Essays about: "Replay-attack"
Showing result 1 - 5 of 9 essays containing the word Replay-attack.
-
1. Penetration testing of Sesame Smart door lock
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Internet of things (IoT) device has been widely used in various fields, and its market is expanding rapidly. However, the growing usage of IoT devices also brings more security concerns. The smart door lock is one of the smart home IoT devices that need to be designed securely. READ MORE
-
2. Distributed Relay/Replay Attacks on GNSS Signals
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In modern society, Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon by many systems, among others in critical infrastructure, for navigation and time synchronization. To overcome the prevailing vulnerable state of civilian GNSSs, many detection schemes for different attack types (i.e. READ MORE
-
3. Adagio For The Internet Of Things : IoT penetration testing and security analysis of a smart plug
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The emergence of the Internet of Things (IoT) shows us that more and more devices will be connected to the internet for all types of different purposes. One of those devices, the smart plug, have been rapidly deployed because of the ease it brings users into achieving home automation by turning their previous dumb devices smart by giving them the means of controlling the devices remotely. READ MORE
-
4. Understanding the MicroScope Microarchitectural Replay Attack Through a New Implementation
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Side-channel attacks, where information is extracted through analysis of the implementation of a computer system by a malicious adversary, constitute security vulnerabilities that may be hard to mitigate. They however suffer from noise originating from, for example, other processes or frequent cache evictions, which forces an attacker to repeat the attack a large number of times in order to obtain useful information. READ MORE
-
5. Modelling and Security Analysis of Internet Connected Cars
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With more and more Internet connected devices comes the question, are they secure enough. If such a thing as a vehicle were to be hacked there could be dire consequences. For example if someone acquired remote control of the brakes and steering of a vehicle they could be controlled with illicit intent. READ MORE