Essays about: "Replay Attack"

Showing result 1 - 5 of 13 essays containing the words Replay Attack.

  1. 1. Penetration testing of Sesame Smart door lock

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shuyuan Liu; [2023]
    Keywords : IoT; Smart door lock; State consistency; MITM attack; Replay attack; Reverse engineering; GPS spoofing; DoS attack; IoT; smart dörrlås; tillståndskonsistens; MITM-attack; Replay-attack; Reverse engineering; GPS-spoofing; DoS attack;

    Abstract : The Internet of things (IoT) device has been widely used in various fields, and its market is expanding rapidly. However, the growing usage of IoT devices also brings more security concerns. The smart door lock is one of the smart home IoT devices that need to be designed securely. READ MORE

  2. 2. Distributed Relay/Replay Attacks on GNSS Signals

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Malte Lenhart; [2022]
    Keywords : Global Navigation Satellite System GNSS ; Spoofing; Relay Replay Attack; Software Defined Radio SDR ; Security; Satellitnavigeringssystem; Spoofing; Relay Replay Attack; Software Defined Radio SDR ; Säkerhet;

    Abstract : In modern society, Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon by many systems, among others in critical infrastructure, for navigation and time synchronization. To overcome the prevailing vulnerable state of civilian GNSSs, many detection schemes for different attack types (i.e. READ MORE

  3. 3. Assessing the Security of Internal Automotive Networks

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Anas Alkoutli; Joakim Anderlind; Carl-Johan Björnson; Mathias Drage; Morgan Thowsen; Antonia Welzel; [2021-09-14]
    Keywords : Vehicle; Network Security; CAN; Ethernet;

    Abstract : Context In order to address the growing need for connectivity in today’s cars, the in-vehicle network has increased in complexity, now consisting of over 100 electrical control units. Balancing the level of security with high performance is non-trivial, and current networks have shown to sacrifice security measures for performance, therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE

  4. 4. Adagio For The Internet Of Things : IoT penetration testing and security analysis of a smart plug

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Raman Salih; [2021]
    Keywords : ;

    Abstract : The emergence of the Internet of Things (IoT) shows us that more and more devices will be connected to the internet for all types of different purposes. One of those devices, the smart plug, have been rapidly deployed because of the ease it brings users into achieving home automation by turning their previous dumb devices smart by giving them the means of controlling the devices remotely. READ MORE

  5. 5. Understanding the MicroScope Microarchitectural Replay Attack Through a New Implementation

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Clara Tillman; [2021]
    Keywords : ;

    Abstract : Side-channel attacks, where information is extracted through analysis of the implementation of a computer system by a malicious adversary, constitute security vulnerabilities that may be hard to mitigate. They however suffer from noise originating from, for example, other processes or frequent cache evictions, which forces an attacker to repeat the attack a large number of times in order to obtain useful information. READ MORE