Essays about: "STRIDE"

Showing result 26 - 30 of 61 essays containing the word STRIDE.

  1. 26. Hacking a Commercial Drone

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tommie Höglund Gran; Erik Mickols; [2020]
    Keywords : ethical hacking; internet of things; penetration testing; threat modeling; unmanned aerial vehicle; etisk hackning; hotmodellering; obemannad luftfarkost; penetrationstestning; sakernas internet;

    Abstract : Obemannade luftfarkoster, även kallade drönare, är del av IoT-revolutionen och har uppmärksammats de senaste åren på grund av integritetsfrågor såväl som flygplats- och militär säkerhet. Då de kan flyga samt har implementerat en ökande mängd teknologi, särskilt kamera och annan övervakning, är de attraktiva måltavlor för hackers och penetrationstestare. READ MORE

  2. 27. Ethical Hacking of a Robot Vacuum Cleaner

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Christoffer Torgilsman; Eric Bröndum; [2020]
    Keywords : IoT; Ethical Hacking; Penetration testing; Threat Model; Security; DREAD; STRIDE; Encryption; MQTT; Ironpie m6;

    Abstract : This study revolves around the safety of IoT devices, more specifically how safe the robot vacuum cleaner Ironpie m6 is. The method is based on threat modeling the device, using the DREAD and STRIDE models. READ MORE

  3. 28. Evaluation of Machine Learning Primitives on a Digital Signal Processor

    University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska högskolan

    Author : Vilhelm Engström; [2020]
    Keywords : digital signal processor; DSP; SIMD; data parallelism; machine learning; deep learning; convolutional neural network;

    Abstract : Modern handheld devices rely on specialized hardware for evaluating machine learning algorithms. This thesis investigates the feasibility of using the digital signal processor, a part of the modem of the device, as an alternative to this specialized hardware. READ MORE

  4. 29. Security Test of iZettle's Reader 2 : A card terminal for safe payments?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Daria Galal; Martin Tillberg; [2020]
    Keywords : izettle reader; ethical hacking; threat modelling; penetration testing; bluetooth; https.; izettle reader; etisk hackning; hotmodellering; penetrationstestning; bluetooth; https.;

    Abstract : Ethical hacking and penetration testing are two methods often used when organizations and companies want to measure their level of information security, and find out if there are additional steps that can be taken in order to increase the security. This report describes a security test of the card terminal iZettle Reader 2, with the intention to examine its level of security based on the device’s frequent appearance in the society. READ MORE

  5. 30. Descriptive differences in physiological and biomechanical parameters between running shoes : a pilot study with a single-subject experimental design

    University essay from Gymnastik- och idrottshögskolan, GIH/Institutionen för fysiologi, nutrition och biomekanik

    Author : Alexander Wolthon; [2020]
    Keywords : Running economy; Indirect calorimetry; Footwear; Sham;

    Abstract : Running performance has increased immensely during the last few years, coinciding with multiple shattered world records in relatively short amount of time. Improvements in footwear material and design are likely reasons for this increase in running performance. READ MORE