Essays about: "Flow Security"
Showing result 6 - 10 of 145 essays containing the words Flow Security.
-
6. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE
-
7. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. READ MORE
-
8. Effects of Prolonged Electricity Supply Disruptions on Critical Entities
University essay from Lunds universitet/Riskhantering (CI); Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : This study investigates Swedish critical entities (CEs) ability to maintain function during up to three months of electricity supply disruptions. It also examines possible improvement measures, and how contextual cases (grey zone, heightened state of alert, war) influence CEs’ ability to maintain function during electricity supply disruptions. READ MORE
-
9. Impact of C-ITS on Mobility and Society
University essay from KTH/TransportplaneringAbstract : This thesis investigates the important potential of Cooperative Intelligent Transport Systems (C-ITS) onmobility and society. C-ITS appears as a promising solution to reinvent transportation and become avital part of the ever-evolving environment as developments in technology continue to change the world. READ MORE
-
10. Man in The Middle Attacks on Software Defined Network
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Software Defined Networking (SDN) is a method of abstracting the network to ease administration by centralizing it. Doing this removes intelligence from the devices and this might open up local security vulnerabilities. READ MORE