Essays about: "keys"

Showing result 11 - 15 of 249 essays containing the word keys.

  1. 11. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kevin Engström; Robin Lenz; [2023]
    Keywords : Sandbox detection; analysis evasion; virtual environment; masking;

    Abstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE

  2. 12. To What Extent Top Managers' Compensation Impacts the Risk Aversion Phenomenon?

    University essay from Umeå universitet/Företagsekonomi

    Author : Maxime EONNET; Mathieu RUBY; [2023]
    Keywords : Executive Compensation; Risk Aversion; Agency Theory; Risk-taking Factors; Long-term; Short-term; Objectives; Accounting;

    Abstract : Executive compensation and its issues are a very sensitive subject, to be taken with apinch of salt, but it is above all a fascinating subject, which deserves a more globalunderstanding from people. Our study thus aims to determine to what extent executivecompensation and its structure, which may seem complex at first glance, play a role inthe risk aversion of executives. READ MORE

  3. 13. Development of a QRNG front-end for shot noise measurement : analysis of quantum shot noise originating from photodiodes

    University essay from Linköpings universitet/Informationskodning

    Author : Martin Clason; [2023]
    Keywords : shot noise; quantum random number generator; photodiode; transimpedance amplifier; skottbrus; kvantslumptalsgenerator; fotodiod; transimpedansförstärkare;

    Abstract : As one of the more mature quantum technologies, quantum random number generators (QRNGs) fill an important role in producing secure and private keys for use in cryptogra- phy in e.g. quantum key distribution (QKD) systems. Many available QRNGs are expen- sive and optical QRNGs often require complex optical setups. READ MORE

  4. 14. Asserting password crackers ability to target Swedish passwords : An analysis

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Casper Jensen; [2023]
    Keywords : cyber security; passwords; it-security; swedish passwords;

    Abstract : In today's digital world, passwords are the keys that unlock our online lives, keeping our social media, financial accounts, and streaming services secure. Unfortunately, this makes password information a prime target for hackers, who can gain access to our entire digital existence. READ MORE

  5. 15. Insider Threat For Service Account in Google Cloud Platform

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Ravikiran Talekar; [2023]
    Keywords : ;

    Abstract : As most software industry is migrating from traditional servers and depending more on Cloud-based services, we are encountering new problems hitherto unknown to us. Due to the variousadvantages offered by Cloud services and the numerous problems whose solutions are providedby Cloud technologies, cloud-based services have become very popular. READ MORE