Essays about: "hardware vulnerability"

Showing result 1 - 5 of 9 essays containing the words hardware vulnerability.

  1. 1. Testing IoT Security : A comparison of existing penetration testing frameworks and proposing a generic framework

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Alva Widerberg Palmfeldt; William Mattsson; [2023]
    Keywords : Internet of Things; penetration testing; standardization; framework; vulnerability exploitation;

    Abstract : The Internet of Things (IoT) refers to the billions of physical devices linked to the Internet worldwide, integrating into various systems like healthcare, finance, and transportation. However, the rapid market expansion has led to software and hardware security shortcomings, leaving IoT devices vulnerable to cybercriminals. READ MORE

  2. 2. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  3. 3. Forensic Analysis of the Nintendo Switch

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Jelle van den Berg; Filip Lagerholm; [2020]
    Keywords : Nintendo Switch; forensic analysis; hardware vulnerability; network capture;

    Abstract : In this thesis, we did a forensic analysis of a Nintendo Switch gaming console. It is both a portable and a stationary device, which makes it so that it could contain valuable information about the usage of the console at home and elsewhere. READ MORE

  4. 4. How to design a trustworthy IPsec VPN device employing nested tunnels?

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Alexander Spottka; [2018]
    Keywords : Nesting; IPSec; nested; tunnel; encryption;

    Abstract : Enterprises use site-to-site \textit{Virtual Private Network} (VPN) technology to securely transmit data over insecure networks, such as the Internet. By utilizing commercial VPN products, organizations partially rely on the vendors to keep their communication out of reach from malicious groups or individuals. READ MORE

  5. 5. Vulnerability Analysis of Vagrant Boxes

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Andreas Holmqvist; Fredrik Lycke; [2017]
    Keywords : Vagrant; Static code analysis; Vulnerability;

    Abstract : Virtual machines are often considered more secure than regular machines due to the abstraction from the hardware layer. Abstraction does provide some extra security benefits, but many vulnerabilities that exist on a regular machine still exist on virtual machines. READ MORE