Essays about: "Automated dynamic security evaluation"

Found 3 essays containing the words Automated dynamic security evaluation.

  1. 1. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Holmquist; [2023]
    Keywords : Bluetooth; Android; Common Criteria; Automated dynamic security evaluation; Mobile device security; Bluetooth; Android; Common Criteria; Automatiserad dynamisk s¨akerhetstestning; S¨akerhet f¨or mobila enheter;

    Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE

  2. 2. Automated Security Analysis of Firmware

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Farrokh Bolandi; [2022]
    Keywords : Firmware Security; Automation; Static Analysis; Dynamic Analysis; Security Vulnerability; Firmwaresäkerhet; automation; statisk analys; dynamisk analys; säkerhet;

    Abstract : Internet of Things (IoT) devices are omnipresent in both industries and our homes. These devices are controlled by a software called firmware. Firmware like any other software may contain security vulnerabilities and the sole entity responsible to provide secure firmware is the vendor of the device. READ MORE

  3. 3. Runtime Analysis of Malware

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Muhammad Shahid Iqbal; Muhammad Sohail; [2011]
    Keywords : Malware; Automated analysis; Runtime analysis; Dynamic analysis; Malicious; behaviour; Characteristics; Detection;

    Abstract : Context: Every day increasing number of malwares are spreading around the world and infecting not only end users but also large organizations. This results in massive security threat for private data and expensive computer resources. There is lot of research going on to cope up with this large amount of malicious software. READ MORE