Essays about: "hardware vulnerability"

Showing result 6 - 9 of 9 essays containing the words hardware vulnerability.

  1. 6. EzMole: A new prototype for securing public Wi-Fi connections

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Rickard Karlsson; [2017]
    Keywords : EzMole; Wi-Fi; wifi; Internet of Things; IoT; security; vulnerability assessment; access point; Internet; public Wi-Fi;

    Abstract : When public Wi-Fi networks are being used, it can be hard to know who else that is using the same network or is monitoring the traffic that is traveling across the network. If the network is public and unencrypted anyone can monitor the traffic and to use these networks for work can be very risky. READ MORE

  2. 7. Mitigation of Virtunoid Attacks on Cloud Computing Systems

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Daniel McKinnon Forsell; [2015]
    Keywords : Cloud Computing; Hardware Virtualisation; Security Exploits;

    Abstract : Virtunoid is a proof of concept exploit abusing a vulnerability in the open source hardware virtualisation control program QEMU-KVM. The vulnerability originally stems from improper hotplugging of emulated embedded circuitry in the Intel PIIX4 southbridge resulting in memory corruption and dangling pointers. READ MORE

  3. 8. Penetration Testing in a Web Application Environment

    University essay from Institutionen för datavetenskap, fysik och matematik, DFM

    Author : Susanne Vernersson; [2010]
    Keywords : penetration testing; exploit; XSS; code injection; CSRF; web application security; vulnerability assessment; methodology;

    Abstract : As the use of web applications is increasing among a number of different industries, many companies turn to online applications to promote their services. Companies see the great advantages with web applications such as convenience, low costs and little need of additional hardware or software configuration. READ MORE

  4. 9. Secure Real-time Services for Wireless Sensor Networks in Contiki

    University essay from KTH/Reglerteknik

    Author : Shujuan Chen; [2007]
    Keywords : ;

    Abstract : With the widespread use of networked embedded systems operating over wireless sensor networks, a standardized architecture is required to enable the rapid development of applications. An embedded operating system serves as an important building block of the standardized architecture. READ MORE