Essays about: "Fingerprint Attack"
Showing result 1 - 5 of 8 essays containing the words Fingerprint Attack.
-
1. Towards Realistic Datasets forClassification of VPN Traffic : The Effects of Background Noise on Website Fingerprinting Attacks
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Virtual Private Networks (VPNs) is a booming business with significant margins once a solid user base has been established and big VPN providers are putting considerable amounts of money into marketing. However, there exists Website Fingerprinting (WF) attacks that are able to correctly predict which website a user is visiting based on web traffic even though it is going through a VPN tunnel. READ MORE
-
2. Which News Articles are You Reading? : Using Fingerprinting to Attack Internal Pages of News Websites
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : When performing fingerprinting attacks against websites in a controlled environment astudy may achieve very promising results. However, these can be misleading as the closedworld setting may not accurately represent the real-world. READ MORE
-
3. Designing a Physical Unclonable Function for Cryptographic Hardware
University essay from Linköpings universitet/Institutionen för teknik och naturvetenskap; Linköpings universitet/Tekniska fakultetenAbstract : Hardware Security Modules (HSMs) are embedded systems that provide a physically secure data storage and handling environment. This master thesis evaluates an HSM method incorporating cryptographic key generation, key management, and tamper protection. READ MORE
-
4. Digital incursion: Breaching the android lock screen and liberating data
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. READ MORE
-
5. Secure hypervisor versus trusted execution environment : Security analysis for mobile fingerprint identification applications
University essay from Linköpings universitet/Databas och informationsteknikAbstract : Fingerprint identification is becoming increasingly popular as a means of authentication for handheld devices of different kinds. In order to secure such an authentication solution it is common to use a TEE implementation. READ MORE