Essays about: "data obfuscation"

Showing result 1 - 5 of 6 essays containing the words data obfuscation.

  1. 1. Intrusion Detection System for Android : Linux Kernel System Salls Analysis

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Martin Borek; [2017]
    Keywords : Android; security; malware; detection; system calls; ARM; Android; säkerhet; malware; detektion; systemanrop;

    Abstract : Smartphones provide access to a plethora of private information potentially leading to financial and personal hardship, hence they need to be well protected. With new Android malware obfuscation and evading techniques, including encrypted and downloaded malicious code, current protection approaches using static analysis are becoming less effective. READ MORE

  2. 2. Content Management Systems and MD5: Investigating Alternative Methods of Version Identification for Open Source Projects

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Jakob Trusz; [2017]
    Keywords : Content Management Systems; Version Identification; Obfuscation;

    Abstract : WordPress is a very widely used content management system that enables users to easier create websites. The popularity of WordPress has made it a prime target for attacks by hackers since a potential vulnerability would affect many targets. Vulnerabilities that can be utilised in an attack are referred to as exploits. READ MORE

  3. 3. Designing interactions for data obfuscation in IoT

    University essay from Malmö högskola/Kultur och samhälle

    Author : Carlos Mario Rodriguez Perdomo; [2016]
    Keywords : IoT; critical design; privacy; data obfuscation; HCI; tangible interaction;

    Abstract : This project explores the internet of things (IoT) at home, especially the aspects related to the quantity and the quality of the of data collected by the smart devices and the violation of the users’ privacy this situation represents, since with the help of machine learning algorithms, these devices are capable of storing and analysing information related to the daily routine of each user at home. Therefore, this research enquires new ways to raise the user's’ awareness about the flow of the data within the IoT at home in order to empower them and give them back the status of administrators of this context by designing devices that are capable of obfuscating the data before it leaves the home. READ MORE

  4. 4. Readability in sustainability reporting before and after the financial crisis of 2008

    University essay from Göteborgs universitet/Företagsekonomiska institutionen

    Author : Kalle Ernfjord; Carl Gustafsson; [2015-01-16]
    Keywords : ;

    Abstract : Problem: Sustainability reporting is becoming more and more of a standard business practice. However, during the financial crisis of 2008, many companies experienced hard times from an economic perspective. This could have led to a decrease, an increase or no effect on the level of readability in sustainability reporting. READ MORE

  5. 5. Auster: A service designed on the context of a surveillance society in an increasingly connected world

    University essay from Malmö högskola/Kultur och samhälle

    Author : Dorien Koelemeijer; [2015]
    Keywords : interaction design; human computer interaction; internet of things; the internet of things; IoT; surveillance; sousveillance; hacking; do it yourself; diy; data; big data; data obfuscation; arduino; decentralisation; internet; privacy; security; data mining; data analysis;

    Abstract : The privacy and surveillance issues that are consequences of the Internet of Things are the motivation and grounding for this thesis project. The Internet of Things (IoT) is a scenario in which physical objects are able to communicate to each other and the environment, by transferring data over communication networks. READ MORE