Essays about: "mobile security testing"

Showing result 1 - 5 of 38 essays containing the words mobile security testing.

  1. 1. Are Children Safe with Smart Watches? : Security Analysis and Ethical Hacking on Children’s Smart Watches

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yaqi Tian; [2023]
    Keywords : Security analysis; Penetration testing; Smart watches; Mobile Applications; Säkerhetsanalys; Penetrationstestning; Smarta klockor; Mobilapplikationer;

    Abstract : There are more and more parents that are considering to purchase smart watches for their kids. The children’s smart watches on the market are usually equipped with many practical functions like the GPS positioning, the camera and the messaging. READ MORE

  2. 2. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE

  3. 3. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE

  4. 4. Performance analysis of adaptive streaming algorithms for a low-latency environment

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Antonio Kevo; Albert Sjölund; [2022]
    Keywords : Technology and Engineering;

    Abstract : Streaming video over the internet can face issues when met with poor and varying network conditions, which can be especially noticeable when streaming live video such as security footage or video calling. To handle this, there exists congestion control algorithms that monitor network conditions based on feedback from the receiver and adapt the video output. READ MORE

  5. 5. Security evaluation of ten Swedish mobile applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jens Ekenblad; Stefan Andres Garrido Valenzuela; [2022]
    Keywords : Black-box testing; Penetration testing; Mobile applications; Android; Exploit; Vulnerability Evaluation; OWASP; MSTG; Black-box testning; Penetrations testning; Mobila applikationer; Android; Exploatering; Sårbarhetsutvärdering; OWASP; MSTG;

    Abstract : The widespread usage of smartphones and mobile applications in Sweden exposes the users to potential risks if not adequate security standards are implemented. An insecure application that is exploited by an adversary could potentially compromise the users private data and integrity. READ MORE