Essays about: "dynamic code analysis"

Showing result 1 - 5 of 70 essays containing the words dynamic code analysis.

  1. 1. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Moosbrugger; [2023]
    Keywords : Prototype Pollution Gadgets; Dynamic Taint Analysis; Forced Branch Execution; NodeProf Instrumentation; Truffle GraalJS;

    Abstract : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. READ MORE

  2. 2. Solar Photovoltaic Fire Risks : FE-analysis of fire exposed solar photovoltaic systems and comparison of current legislation and recommendations from different countries

    University essay from Luleå tekniska universitet/Byggkonstruktion och brand

    Author : Elin Bergroth; Greta Torstensson; [2023]
    Keywords : Solar Photovoltaic; National Guidelines; Fire Department; FE-analysis; TASEF; Solceller; Nationella Riktlinjer; Räddningstjänst; FE-analys; TASEF;

    Abstract : The global use of energy increases every day and to meet the growing demand, energy sources are constantly being developed to become more efficient and reliable. During the last decade, the global solar photovoltaics (PV) capacity has increased every year and in 2017, solar PV was the global leading power source of renewable energy. READ MORE

  3. 3. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kevin Engström; Robin Lenz; [2023]
    Keywords : Sandbox detection; analysis evasion; virtual environment; masking;

    Abstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE

  4. 4. Improving Dependability of Space-Cloud Payload Processor by Storage System

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Hassan Said; Stephanie Liza Johansson; [2023]
    Keywords : Fault tolerant; Markov analysis; Onboard processing; SSD array architecture; SSD; EDAC; RAID; Hamming code; Reed Solomon; Dependability evaluation; File systems; ZFS; Ext4.;

    Abstract : Due to the usage of complicated platforms and current high-performance space computing technology, onboard processing in small satellites is expanding. Space-cloud payload processors with Commercial Off-The-Shelf (COTS) components, that are required to be radiation-tolerant, are used to perform the onboard processing. READ MORE

  5. 5. Static Analysis Of Client-Side JavaScript Code To Detect Server-Side Business Logic Vulnerabilities

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Frederick van der Windt; [2023]
    Keywords : JavaScript; Static Analysis; Business Logic Vulnerabilities; Client-side; Fuzzing; Black-box; JavaScript; statisk analys; sårbarheter i affärslogiken; klientsidan; Fuzzing; Black-box;

    Abstract : In the real world, web applications are crucial in various domains, from e-commerce to finance and healthcare. However, these applications are not immune to vulnerabilities, particularly in business logic. Detecting such vulnerabilities can be challenging due to the complexity and diversity of application functionality. READ MORE