Essays about: "validation threats"

Showing result 1 - 5 of 16 essays containing the words validation threats.

  1. 1. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Mah Noor; Syeda Hina Murad; [2023]
    Keywords : Smart contract; Blockchain; Ethereum; attacks; security vulnerabilities; security audits;

    Abstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE

  2. 2. Investigating the influence of the tidal regime on harbour porpoise Phocoena phocoena distribution in Mount’s Bay, Cornwall

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Duncan Jones; [2023]
    Keywords : Geography; Geographical Information Systems; GIS; Habitat Modelling; Harbour Porpoise; MaxEnt; Tidal Processes; Conservation; Earth and Environmental Sciences;

    Abstract : Investigating the influence of the tidal regime on harbour porpoise Phocoena phocoena distribution in Mount’s Bay, Cornwall Abstract Unintentional by-catch in fishing gear is a significant cause of mortality of harbour porpoises in UK waters. Understanding the spatial distribution of harbour porpoises at fine scales and how this changes over time is essential when trying to understand where these lethal interactions might occur. READ MORE

  3. 3. A Novel Framework For Detecting Subdomain State Against Takeover Attacks

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Rigved Jayaprakash; Vishnu Kalariyil Venugopal; [2022]
    Keywords : Domain Name Servers; Subdomain; Subdomain Takeovers; Open-source tools; Google Cloud Platform; Dangling DNS Entry; Second Order Subdomain Takeover; Subdomain Enumeration and Discovery; subdomain validation;

    Abstract : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. READ MORE

  4. 4. Input Validation and Input Sanitization for Web Applications

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Kevin Alemi Pedram; [2021]
    Keywords : ;

    Abstract : The rise of web-based applications is rapidly increasing with time and demand. As more and more web applications are being developed, so are the threats against these web applications' user-base. Input-basedattacks against web applications are becoming more common. A new task is in the hands of the developers, namely input handling. READ MORE

  5. 5. Systems methodology for Analysis of Airborne Electronic Warfare Systems

    University essay from

    Author : Hugo Hedén; [2021]
    Keywords : Survivability; EW; ECM; ECCM; Systems methodology; influence diagram; multi-agent influence diagram; defence systems; försvarssystem;

    Abstract : This report is one of the first to examine how system methodology can be applied as a tool to facilitate a holistic view of fighter aircraft survivability. This is done through the application of a modified version of multi-agent influence diagrams (MAIDs), as an analytical tool of two generic one-on-one scenarios based on Robert E. READ MORE