Essays about: "Security testing"

Showing result 1 - 5 of 198 essays containing the words Security testing.

  1. 1. RTIC - A Zero-Cost Abstraction for Memory Safe Concurrency

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Henrik Tjäder; [2021]
    Keywords : Embedded systems; real-time; concurrency; RTIC; RTFM; Real-Time For the Masses; Real-Time Interrupt-driven Concurrency;

    Abstract : Embedded systems are commonplace, often with real-time requirements, limited resources and increasingly complex workloads with high demands on security and reliability. The complexity of these systems calls for extensive developer experience and many tools has been created to aid in the development of the software running on such devices. READ MORE

  2. 2. Adagio For The Internet Of Things : IoT penetration testing and security analysis of a smart plug

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Raman Salih; [2021]
    Keywords : ;

    Abstract : The emergence of the Internet of Things (IoT) shows us that more and more devices will be connected to the internet for all types of different purposes. One of those devices, the smart plug, have been rapidly deployed because of the ease it brings users into achieving home automation by turning their previous dumb devices smart by giving them the means of controlling the devices remotely. READ MORE

  3. 3. Benchmarking Deep Learning Testing Techniques A Methodology and Its Application

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Himanshu Chuphal; Kristiyan Dimitrov; [2020-07-06]
    Keywords : Deep Learning; DL; DL testing tools; testing; software engineering; design; benchmark; model; datasets; tasks; tools;

    Abstract : With the adoption of Deep Learning (DL) systems within the security and safetycriticaldomains, a variety of traditional testing techniques, novel techniques, andnew ideas are increasingly being adopted and implemented within DL testing tools.However, there is currently no benchmark method that can help practitioners tocompare the performance of the different DL testing tools. READ MORE

  4. 4. Penetration testing of Android applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Nilsson; [2020]
    Keywords : Ethical hacking; penetration testing; Android application security; reverse engineering; threat modeling; Etisk hacking; penetrationstest; Android-applikationssäkerhet; baklängeskonstruktion; hotmodellering;

    Abstract : The market of Android applications is huge, and in 2019, Google Play users worldwide downloaded 84.3 billion mobile applications. With such a big user base, any security issues could have big negative impacts. READ MORE

  5. 5. Web-based prototype for protecting controllers from existing cyber-attacks in an industrial control system

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Pa Sanyang; [2020]
    Keywords : ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS; ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS;

    Abstract : Industrial control system or ICS is a critical part of the infrastructure in society. An example of ICS is the rail networks or energy plants like the nuclear plant. SCADA is an ICS system following a hierarchical structure. Due to the fact that a control system can be very large, monitoring remote through networks is an effective way to do so. READ MORE