Essays about: "Virtuella maskiner"

Showing result 1 - 5 of 31 essays containing the words Virtuella maskiner.

  1. 1. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kevin Engström; Robin Lenz; [2023]
    Keywords : Sandbox detection; analysis evasion; virtual environment; masking;

    Abstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE

  2. 2. Improving and Evaluating TRex Traffic Generator through P4 Switches

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chenming Du; [2023]
    Keywords : Traffic Generators; P4 Programmable Switch; TRex; Traffikgeneratorer; P4 Programmerbar Switchar; TRex;

    Abstract : Traffic generators, as an indispensable tool to test devices under test and networking protocols, help researchers to execute performance inspection and optimization. Among all traffic generators, TRex is an open-source, high-performance, and low-cost traffic generator which is built on Data Plane Development Kit (DPDK). READ MORE

  3. 3. Trusted Execution Environment deployment through cloud Virtualization : Aproject on scalable deployment of virtual machines

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Luca Staboli; [2022]
    Keywords : Trusted Execution Environment; Cloud Computing; Virtual Machine; Application Programming Interface; Trusted Execution Environment; Cloud Computing; Virtual Machine; Application Programming Interface;

    Abstract : In the context of cloud computing, Trusted Execution Environments (TEE) are isolated areas of application software that can be executed with better security, building a trusted and secure environment that is detached from the rest of the memory. Trusted Execution Environment is a technology that become available only in the last few years, and it is not widespread yet. READ MORE

  4. 4. Living off the Land Binaries with Virtual Machines

    University essay from Högskolan i Halmstad

    Author : Jakob Lingaas Türk; [2021]
    Keywords : LOLbin; Living off the land; virtual machine escape; fileless malware;

    Abstract : As the threat of ransomware increases, the ever-growing demand for more efficient cybersecurityimplementations invite cybercriminals to find new methods of bypassing these counter measures.One method for bypassing potential antivirus software is to use the binaries already present on thevictim device, causing them damage by using trusted binaries which does not trigger windowsdefender (or similar antivirus measures). READ MORE

  5. 5. Media Gateway Transfer Analysis

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Aron Hansen Berggren; [2020]
    Keywords : ;

    Abstract : There are many protocols available to transfer files where some are faster than others. With ever increasing network speeds and amounts of media needing to be transferred, the need to minimize the amount of data sent is increasing. READ MORE