Essays about: "skadlig kod"
Showing result 1 - 5 of 14 essays containing the words skadlig kod.
-
1. GitBark : A Rule-Based Framework for Maintaining Integrity in Source Code Repositories
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In today’s digital landscape, maintaining the integrity of source code is crucial for delivering reliable and trustworthy software solutions. However, the increasing prevalence of attacks targeting source code repositories and version control systems (VCSs) poses significant challenges to source code integrity. READ MORE
-
2. Testing the Security of a Kubernetes Cluster in a Production Environment
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Enterprise grade Kubernetes solutions which are offered by large corporations like Microsoft have become very popular in the most recent years. To protect the integrity of customer information, which resides on shared resources in the Kubernetes cloud, adequate security measures need to be in place. READ MORE
-
3. Utilizing user centered design to mitigate security threats
University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och DesignAbstract : As technology advances and is more and more intertwined with our everyday lives, the security of these systems becomes very important. Abraham Maslow famously put safety needs as the second level of his hierarchy of needs, its importance second only to physical needs such as air, food and sleep. READ MORE
-
4. Decompilation of WebAssembly using Datalog
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With 92% of today’s browsers supporting WebAssembly the need for decompilers to discover malicious code is greater than ever. The introduction of the Datalog to C++ compiler Soufflé, in 2016, enables the implementation of effective Datalog-based decompilers. READ MORE
-
5. Increased evasion resilience in modern PDF malware detectors : Using a more evasive training dataset
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The large scale usage of the PDF coupled with its versatility has made the format an attractive target for carrying and deploying malware. Traditional antivirus software struggles against new malware and PDF's vast obfuscation options. In the search of better detection systems, machine learning based detectors have been developed. READ MORE