Essays about: "External vulnerabilities"
Showing result 1 - 5 of 17 essays containing the words External vulnerabilities.
-
1. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE
-
2. Exploring the Security Implications of a Decentralized Internet : Vulnerabilities in Web3 and Blockchain-Based Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The internet has evolved from an information-based reading platform to a read-and-write platform which is dominated by a handful of organizations. This centralization has led to a movement suggesting a new shift using blockchain technology to create a decentralised internet. READ MORE
-
3. Robust BECCS deployment strategies under deep uncertainty : A case study of Stockholm Exergi
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : The most recent IPCC assessment shows that negative emissions (NEs) and carbon dioxide removal (CDR) technologies are becoming increasingly important in scenarios that limit global warming to 2 °C or lower. In these scenarios, one key set of CDR technologies is bioenergy carbon capure and storage (BECCS). READ MORE
-
4. Understanding the Norwegian Petroleum Industry: How does Oil explain Norwegian Public Expenditure and Social Spending? How vulnerable is it to shocks?
University essay from Lunds universitet/Ekonomisk-historiska institutionenAbstract : There are few people who deny that Norway's social welfare was achieved after Oil Discoveries. But there is concern about the sustainability of the Norwegian economy regarding the volatility of the Oil market. READ MORE
-
5. Fuzzing of PKCS#11 Trusted Application
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE