Advanced search

Showing result 1 - 5 of 17 essays matching the above criteria.

  1. 1. Diverse Double-Compiling to Harden Cryptocurrency Software

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Rosencrantz; [2023]
    Keywords : Trusting trust; Compiler security; Software Supply Chain; Trojan Horse; Cryptocurrency; Datasäkerhet; kompilator; datavirus; kryptovaluta; Trojansk häst;

    Abstract : A trusting trust attack is a special case of a software supply-chain attack. The project in this report, named diverse double-compiling for cryptocurrency (DDC4CC), demonstrates and explains a defense for cryptocurrency software against trusting trust attacks. READ MORE

  2. 2. Democracy - the Trojan horse or Achilles heel? : The Legal Challenges of the Far-Right in European Constitutional Democracies

    University essay from Umeå universitet/Juridiska institutionen

    Author : Romana Crgol; [2023]
    Keywords : far-right party; democracy; constitutional democracy; militant democracy;

    Abstract : This thesis explores the influence of far-right parties on constitutional democracies in Europe, focusing on their adherence to human rights standards and state obligations within the European legal framework. Against the backdrop of rising electoral support for far-right parties across Europe, this thesis aims to examine the common features of far-right party programs and assess the potential consequences of their actions on human rights and democratic values. READ MORE

  3. 3. Have Radial Velocity Surveys Missed Any Planets?

    University essay from Lunds universitet/Astronomi - Genomgår omorganisation; Lunds universitet/Fysiska institutionen

    Author : Shah Raj; [2021]
    Keywords : radial velocity survey; transit method; exoplanet; habitable zone; habitable zone boundaries; HZ; early Mars; recent Venus; stability; instability; chaos; REBOUND; MEGNO; MEGNO maps; Hill sphere; stable systems; unstable systems; Physics and Astronomy;

    Abstract : The project was aimed at numerically assessing exoplanetary systems to distinguish their capabilities of hosting additional planets. The shortcomings of the radial velocity method sometimes causes hindrance in the detection of terrestrial planets. READ MORE

  4. 4. C&C architecture : Automation of the deployment of a sophisticated infrastructure, for new malicious uses, harder to detect

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Timon Glasser; [2021]
    Keywords : Command Control; botnets; RAT; detection; implementation; Red Team; Command Control; botnät; RAT; upptäckt; genomförande; Red Team;

    Abstract : Today cybersecurity is becoming a major concern for all of society. Companies can lose billions of dollars because of cyberattacks. States need to keep the vital infrastructure of the country running and must prepare for cyberwar against cyberterrorism and other states. READ MORE

  5. 5. LCA Based Water Footprint Assessment for a White Shirt

    University essay from KTH/Hållbar utveckling, miljövetenskap och teknik

    Author : Raveena Muthukumar; [2020]
    Keywords : Water footprint; water scarcity indicator; LCA; organic cotton; reuse of shirt;

    Abstract : The white shirt is widely chosen attire by the people for its comfort and aesthetics. With rising population growth and demand for clothing, the production of white cotton shirts will be increased. The production of the white cotton shirt has various environmental impacts and also leads to water scarcity issues. READ MORE