Essays about: "Optimala Attacker"
Showing result 1 - 5 of 8 essays containing the words Optimala Attacker.
-
1. Comparing machine learning algorithms for detecting behavioural anomalies
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Attempted intrusions at companies, either from an insider threat orotherwise, is increasing in frequency. Most commonly used is static analysis and filters to stop specific attacks. READ MORE
-
2. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE
-
3. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE
-
4. Automated Generation of EfficientBitslice Implementations forArbitrary Sboxes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Whitebox cryptography aims at protecting standard cryptographic algorithmsthat execute in attacker-controlled environments. In these, the attacker is ableto read a secret key directly from memory. Common implementations mask alldata at runtime and operate on masked data by using many small precomputedtables. READ MORE
-
5. Learning Policies for Path Selection in Attack Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IT systems are indispensable nowadays. With thousands of hacking attempts happening daily, cyber defense mechanisms are crucial for maintaining a working state of those systems. Simulating an attacker is a means of preparing for future hacking attacks by determining the most likely vulnerabilities where an attack could be attempted. READ MORE