Essays about: "Vulnerabilities"

Showing result 21 - 25 of 630 essays containing the word Vulnerabilities.

  1. 21. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Mah Noor; Syeda Hina Murad; [2023]
    Keywords : Smart contract; Blockchain; Ethereum; attacks; security vulnerabilities; security audits;

    Abstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE

  2. 22. Testing IoT Security : A comparison of existing penetration testing frameworks and proposing a generic framework

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Alva Widerberg Palmfeldt; William Mattsson; [2023]
    Keywords : Internet of Things; penetration testing; standardization; framework; vulnerability exploitation;

    Abstract : The Internet of Things (IoT) refers to the billions of physical devices linked to the Internet worldwide, integrating into various systems like healthcare, finance, and transportation. However, the rapid market expansion has led to software and hardware security shortcomings, leaving IoT devices vulnerable to cybercriminals. READ MORE

  3. 23. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Holmquist; [2023]
    Keywords : Bluetooth; Android; Common Criteria; Automated dynamic security evaluation; Mobile device security; Bluetooth; Android; Common Criteria; Automatiserad dynamisk s¨akerhetstestning; S¨akerhet f¨or mobila enheter;

    Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE

  4. 24. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Moosbrugger; [2023]
    Keywords : Prototype Pollution Gadgets; Dynamic Taint Analysis; Forced Branch Execution; NodeProf Instrumentation; Truffle GraalJS;

    Abstract : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. READ MORE

  5. 25. Security evaluation of the Matrix Server-Server API

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hîvron Stenhav; [2023]
    Keywords : Security; Ethical hacking; Open-Source; Matrix; Penetration testing; Threat modelling; API; Säkerhet; Etisk hackning; Öppen källkod; Matrix; Penetrationstesting; Hotmodellering; API;

    Abstract : This thesis presents a comprehensive security analysis of the Server-Server API of the Matrix protocol, providing a detailed examination of its vulnerabilities and contributing a significant body of knowledge to the cybersecurity field. The research focused exclusively on the Server-Server API of the Matrix protocol. READ MORE