Essays about: "Malicious code"

Showing result 1 - 5 of 39 essays containing the words Malicious code.

  1. 1. Ensuring the Security of PyPI Packages

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : David Shakoori Gustafsson; [2023-10-23]
    Keywords : Computer science; Security; Python; PyPI; Typosquatting;

    Abstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE

  2. 2. Antivirus performance in detecting Metasploit payloads : A Case Study on Anti-Virus Effectiveness

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Eric Nyberg; Leandro Dinis Ferreira; [2023]
    Keywords : Metasploit; Anti-Virus Effectivness; AV Effectiveness; MSFVenom; Antivirus; AV Software; Metasploit Encoding; Encodings; Detection rates; AV Efficiency; Antivirus efficiency; payloads; payload detection..;

    Abstract : This paper will focus solely on the effectiveness of AV (antivirus) in detecting Metasploit payloads which have been encapsulated with different encapsulation modules. There seems to be a significant knowledge gap in the evaluation of commercial antivirus's software and their ability to detect malicious code and stop such code from being executed on IT systems. READ MORE

  3. 3. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Moosbrugger; [2023]
    Keywords : Prototype Pollution Gadgets; Dynamic Taint Analysis; Forced Branch Execution; NodeProf Instrumentation; Truffle GraalJS;

    Abstract : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. READ MORE

  4. 4. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kevin Engström; Robin Lenz; [2023]
    Keywords : Sandbox detection; analysis evasion; virtual environment; masking;

    Abstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE

  5. 5. Vulnerability Management of Open-Source Libraries

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Lokesh kumar Mekala; Sai krishna Kandukuri; [2023]
    Keywords : vulnerability management; software security; open-source software.;

    Abstract : Background: The proliferation of using open-source libraries in software development has brought numerous benefits, including access to a wide range of reusable code and collaborating with a global community of developers. However, this increased reliance on third-party code also introduces new security risks in the form of vulnerabilities that malicious actors can exploit. READ MORE