Essays about: "hardware vulnerability"
Showing result 6 - 9 of 9 essays containing the words hardware vulnerability.
-
6. EzMole: A new prototype for securing public Wi-Fi connections
University essay from Luleå tekniska universitet/DatavetenskapAbstract : When public Wi-Fi networks are being used, it can be hard to know who else that is using the same network or is monitoring the traffic that is traveling across the network. If the network is public and unencrypted anyone can monitor the traffic and to use these networks for work can be very risky. READ MORE
-
7. Mitigation of Virtunoid Attacks on Cloud Computing Systems
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Virtunoid is a proof of concept exploit abusing a vulnerability in the open source hardware virtualisation control program QEMU-KVM. The vulnerability originally stems from improper hotplugging of emulated embedded circuitry in the Intel PIIX4 southbridge resulting in memory corruption and dangling pointers. READ MORE
-
8. Penetration Testing in a Web Application Environment
University essay from Institutionen för datavetenskap, fysik och matematik, DFMAbstract : As the use of web applications is increasing among a number of different industries, many companies turn to online applications to promote their services. Companies see the great advantages with web applications such as convenience, low costs and little need of additional hardware or software configuration. READ MORE
-
9. Secure Real-time Services for Wireless Sensor Networks in Contiki
University essay from KTH/ReglerteknikAbstract : With the widespread use of networked embedded systems operating over wireless sensor networks, a standardized architecture is required to enable the rapid development of applications. An embedded operating system serves as an important building block of the standardized architecture. READ MORE