Essays about: "Model-Based Security Testing"
Showing result 1 - 5 of 8 essays containing the words Model-Based Security Testing.
-
1. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE
-
2. Model Based Testing for Programmable Data Planes
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The advent of Software Defined Networking (SDN) and programmable data planes has revolutionized the networking domain, enabling the programming of networking functions down to the silicon level responsible for data packet switching. Unfortunately, while this programmability offers greater flexibility and control, it also increases the likelihood of introducing software bugs. READ MORE
-
3. Penetration testing of Sesame Smart door lock
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Internet of things (IoT) device has been widely used in various fields, and its market is expanding rapidly. However, the growing usage of IoT devices also brings more security concerns. The smart door lock is one of the smart home IoT devices that need to be designed securely. READ MORE
-
4. Fog detection using an artificial neural network
University essay from Lunds universitet/Matematisk statistikAbstract : This project studies a method of image-based fog detection directly from a camera without using the transmissometer. Fog can be detected using transmissometers which could be a very costly approach. This thesis presents an image-based approach for fog detection using Artificial Neural networks. READ MORE
-
5. Ethical hacking of Danalock V3 : A cyber security analysis of a consumer IoT device
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IoT-enheter blir alltmer populära. IoT-produkter tillåter användare att fjärrstyraenheten med hjälp av en mobilapplikation eller en webbapplikation. För dettaändamål används en mängd av kommunikationsprotokoll som Bluetooth och Wi-Fi.Denna sammankoppling av enheter och användningen av olika tekniker kan leda tillsäkerhetsproblem. READ MORE