Essays about: "Grey-box testing"
Showing result 1 - 5 of 9 essays containing the words Grey-box testing.
-
1. Evaluation of Numerically Developed Models of an ECB for Estimating the Braking Torque on the SkiCrosser
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : Cross-country skiing is a popular method of exercising that builds strength, stamina and engages the entire body. As cross-country skiing requires snow to be present, it is typically only performed during the winter, resulting in a rather limited way of exercising. READ MORE
-
2. GONet: Gradient Oriented Fuzzing for Stateful Network Protocol : Improving and Evaluating Fuzzing Efficiency of Stateful Protocol by Mutating Based on Gradient Information
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Network protocol plays a crucial role in supporting a wide range of critical services, of which robustness and reliability are vital. Fuzzing, or fuzz testing, serves as an effective technique to uncover vulnerabilities in software programs. However, fuzzing becomes more complicated when dealing with network protocols due to their massive state. READ MORE
-
3. Ethical hacking of a premium robot vacuum : Penetration testing of the Roborock S7 robot vacuum cleaner
University essay from KTH/Hälsoinformatik och logistikAbstract : With the advancements made in the field of data science, smart IoT devices are be-coming increasingly common. Consequently, this creates an increased number of targets for hackers to potentially exploit. This is a study about ethically hacking a robot vacuum, the Roborock S7, and evaluating the security of the target system. READ MORE
-
4. Secure IPC To Enable Highly Sensitive Communication In A Smartphone Environment With A BYOD Setup
University essay from Linköpings universitet/InformationskodningAbstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE
-
5. Modeling the Heat Flow Dynamics of a Houses Using Stochastic Differential Equations
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This research aims to explore new ways of assessing energy performance within housing units. The mainobjective of this work is to propose a heat dynamics model based on monitoring data, to contribute towardsan energy-efficient transition in the building sector. READ MORE