Essays about: "Security Exploits"
Showing result 1 - 5 of 47 essays containing the words Security Exploits.
-
1. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE
-
2. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. READ MORE
-
3. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE
-
4. The effects of large-scale nutrition Interventions on Early Childhood and Neonatal Outcomes: evidence from Brazil
University essay from Lunds universitet/Nationalekonomiska institutionenAbstract : This study exploits the introduction of a new prioritization criteria for food security interventions to estimate the marginal impact of such programs. Findings indicate that, in municipalities assigned to receive nutrition policies more intensely, the number of children receiving micronutrient supplements was higher. READ MORE
-
5. Detection of Prototype Pollution Using Joern : Joern’s Detection Capability Compared to CodeQL’s
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : JavaScript-built programs are widely used by the general public, but they are also vulnerable to JavaScript-related exploits stemming from the newly discovered prototype pollution vulnerability. Research has been focused on understanding the impact of this vulnerability and finding ways to detect it using code analysis tools. READ MORE