Essays about: "interception attacks"

Found 4 essays containing the words interception attacks.

  1. 1. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Afruz Bakhshiyeva; Gabriel Berefelt; [2022]
    Keywords : Connected vehicle; hacking; pentest; eavesdropping; security; Tesla Model 3; Volvo XC40; MG Marvel R; automotive cybersecurity; interception attacks; passive attacks; wireless attacks; Wi-Fi attacks; attack surface; relay attack; port scan; man-in-the-middle attack; Uppkopplade fordon; hacking; avlyssning; säkerhet; Tesla Model 3; Volvo XC40; MG Marvel R; fordonscybersäkerhet; avlyssningsattacker; passiva attacker; trådlösa attacker; Wi-Fi-attacker; attackyta; relä-attack; port-skanning; mannen-i-mitten attack;

    Abstract : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. READ MORE

  2. 2. Privacy in RFID Transit Systems : A case study of SL - Storstockholms Lokaltrafik

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Olufemi Olajide Ilesanmi; [2015]
    Keywords : RFID radio frequency identification ; Consumer Profiling; Data mining; Behavioral targeting; Data protection; Privacy;

    Abstract : Radio Frequency Identification (RFID) is a technology that facilitates wirelesscommunication. It is being widely used for access control purposes to aid administration ofservices. READ MORE

  3. 3. Visualizing Endpoint Security Technologies using Attack Trees

    University essay from Institutionen för datavetenskap

    Author : Stefan Pettersson; [2008]
    Keywords : endpoint security; attack tree; memory corruption; non-executable memory; address randomization; system call interception;

    Abstract : Software vulnerabilities in programs and malware deployments have been increasing almost every year since we started measuring them. Information about how to program securely, how malware shall be avoided and technological countermeasures for this are more available than ever. Still, the trend seems to favor the attacker. READ MORE

  4. 4. Lawful Interception and Countermeasures : In the era of Internet Telephony

    University essay from KTH/Kommunikationssystem, CoS

    Author : Romanidis Evripidis; [2008]
    Keywords : Lawful interception; countermeasures; key escrow; SRTP MIKEY; digital signatures;

    Abstract : Lawful interception and the way it is performed have played a significant role in the effectiveness of this type of communication monitoring. Although the secrecy of interception and the related equipment are supposed to provide correct information to a law enforcement agency, there are some countermeasures that can be taken by the subject that can seriously undermine the collection of correct and accurate data. READ MORE