Essays about: "trådlösa attacker"

Showing result 1 - 5 of 10 essays containing the words trådlösa attacker.

  1. 1. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Afruz Bakhshiyeva; Gabriel Berefelt; [2022]
    Keywords : Connected vehicle; hacking; pentest; eavesdropping; security; Tesla Model 3; Volvo XC40; MG Marvel R; automotive cybersecurity; interception attacks; passive attacks; wireless attacks; Wi-Fi attacks; attack surface; relay attack; port scan; man-in-the-middle attack; Uppkopplade fordon; hacking; avlyssning; säkerhet; Tesla Model 3; Volvo XC40; MG Marvel R; fordonscybersäkerhet; avlyssningsattacker; passiva attacker; trådlösa attacker; Wi-Fi-attacker; attackyta; relä-attack; port-skanning; mannen-i-mitten attack;

    Abstract : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. READ MORE

  2. 2. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  3. 3. Penetration testing wireless keyboards : Are your devices vulnerable?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Tomsic; [2022]
    Keywords : Wireless keyboards; penetration testing; radio frequency analysis; Crazyradio; MouseJack; Enhanced ShockBurst; Trådlösa tangentbord; penetrationstest; radiofrekvensanalys; Crazyradio; MouseJack; Enhanced ShockBurst;

    Abstract : With an ever-increasing amount of cyberespionage and cybercrime, any potential attack vector into a computer system is worthy of investigation. One such vector could be through the wireless keyboard the user themselves use and trust. READ MORE

  4. 4. Parasitic Tracking Mobile Wireless Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bowen Xu; [2021]
    Keywords : Location privacy attack and evaluation; mobile network simulation; parasitic attacker; Heuristic LSTM;

    Abstract : Along with the growth and popularity of mobile networks, users enjoy more convenient connection and communication. However, exposure of user presence in mobile networks is becoming a major concern and motivated a plethora of LPPM Location Privacy Protection Mechanisms (LPPMs) have been proposed and analysed, notably considering powerful adversaries with rich data at their disposal, e. READ MORE

  5. 5. Far Field Electromagnetic Side Channel Analysis of AES

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zihao Zhao; [2020]
    Keywords : Side-channel analysis; far-feild electromagnetic emission; AES;

    Abstract : Side-Channel Attacks (SCAs) have become a realistic threat to implementations of cryptographic algorithms. By utilizing the unintentionally leaked side-channel information during the execution of a cryptographic algorithm, it is possible to bypass the theoretical strength of the algorithm and extract its secret key. READ MORE