Essays about: "Flow Security"

Showing result 6 - 10 of 145 essays containing the words Flow Security.

  1. 6. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Mah Noor; Syeda Hina Murad; [2023]
    Keywords : Smart contract; Blockchain; Ethereum; attacks; security vulnerabilities; security audits;

    Abstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE

  2. 7. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Moosbrugger; [2023]
    Keywords : Prototype Pollution Gadgets; Dynamic Taint Analysis; Forced Branch Execution; NodeProf Instrumentation; Truffle GraalJS;

    Abstract : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. READ MORE

  3. 8. Effects of Prolonged Electricity Supply Disruptions on Critical Entities

    University essay from Lunds universitet/Riskhantering (CI); Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : André Hansson; [2023]
    Keywords : vital societal function; VSF; critical entity; CE; vital societal entity; VSE; critical infrastructure; CI; critical flow; prolonged outage; electricity supply disruption; preparedness; total defence; civil defence; civil preparedness; crisis preparedness; grey zone; critical entities resilience; CER; hybrid warfare; energy security; societal resilience; cascading effect; dependencies; interdependencies; long-term disruption; power outage; power disruption; consequences; outage; samhällsviktig verksamhet; kritisk infrastruktur; totalförsvar; beredskap; Technology and Engineering;

    Abstract : This study investigates Swedish critical entities (CEs) ability to maintain function during up to three months of electricity supply disruptions. It also examines possible improvement measures, and how contextual cases (grey zone, heightened state of alert, war) influence CEs’ ability to maintain function during electricity supply disruptions. READ MORE

  4. 9. Impact of C-ITS on Mobility and Society

    University essay from KTH/Transportplanering

    Author : Ninnie Tägtström; [2023]
    Keywords : C-ITS; ITS; Mobility; Digitization; Automation; Transportation System; Traffic Signals; Vensim;

    Abstract : This thesis investigates the important potential of Cooperative Intelligent Transport Systems (C-ITS) onmobility and society. C-ITS appears as a promising solution to reinvent transportation and become avital part of the ever-evolving environment as developments in technology continue to change the world. READ MORE

  5. 10. Man in The Middle Attacks on Software Defined Network

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Eskil Christensson; [2023]
    Keywords : ;

    Abstract : Software Defined Networking (SDN) is a method of abstracting the network to ease administration by centralizing it. Doing this removes intelligence from the devices and this might open up local security vulnerabilities. READ MORE