Essays about: "Replay-attack"

Showing result 1 - 5 of 9 essays containing the word Replay-attack.

  1. 1. Penetration testing of Sesame Smart door lock

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shuyuan Liu; [2023]
    Keywords : IoT; Smart door lock; State consistency; MITM attack; Replay attack; Reverse engineering; GPS spoofing; DoS attack; IoT; smart dörrlås; tillståndskonsistens; MITM-attack; Replay-attack; Reverse engineering; GPS-spoofing; DoS attack;

    Abstract : The Internet of things (IoT) device has been widely used in various fields, and its market is expanding rapidly. However, the growing usage of IoT devices also brings more security concerns. The smart door lock is one of the smart home IoT devices that need to be designed securely. READ MORE

  2. 2. Distributed Relay/Replay Attacks on GNSS Signals

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Malte Lenhart; [2022]
    Keywords : Global Navigation Satellite System GNSS ; Spoofing; Relay Replay Attack; Software Defined Radio SDR ; Security; Satellitnavigeringssystem; Spoofing; Relay Replay Attack; Software Defined Radio SDR ; Säkerhet;

    Abstract : In modern society, Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon by many systems, among others in critical infrastructure, for navigation and time synchronization. To overcome the prevailing vulnerable state of civilian GNSSs, many detection schemes for different attack types (i.e. READ MORE

  3. 3. Adagio For The Internet Of Things : IoT penetration testing and security analysis of a smart plug

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Raman Salih; [2021]
    Keywords : ;

    Abstract : The emergence of the Internet of Things (IoT) shows us that more and more devices will be connected to the internet for all types of different purposes. One of those devices, the smart plug, have been rapidly deployed because of the ease it brings users into achieving home automation by turning their previous dumb devices smart by giving them the means of controlling the devices remotely. READ MORE

  4. 4. Understanding the MicroScope Microarchitectural Replay Attack Through a New Implementation

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Clara Tillman; [2021]
    Keywords : ;

    Abstract : Side-channel attacks, where information is extracted through analysis of the implementation of a computer system by a malicious adversary, constitute security vulnerabilities that may be hard to mitigate. They however suffer from noise originating from, for example, other processes or frequent cache evictions, which forces an attacker to repeat the attack a large number of times in order to obtain useful information. READ MORE

  5. 5. Modelling and Security Analysis of Internet Connected Cars

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fredrik Krantz; [2018]
    Keywords : ;

    Abstract : With more and more Internet connected devices comes the question, are they secure enough. If such a thing as a vehicle were to be hacked there could be dire consequences. For example if someone acquired remote control of the brakes and steering of a vehicle they could be controlled with illicit intent. READ MORE