Essays about: "sårbarheter"
Showing result 1 - 5 of 168 essays containing the word sårbarheter.
-
1. Kartläggning av krisberedskapen på nötkreatursgårdar i Uppland : en intervjustudie av lantbrukares uppfattningar om sårbarheter och styrkor i beredskapen på mjölk- och köttgårdar
University essay from SLU/Dept. of Clinical SciencesAbstract : Primärproduktionen, där animalieproduktion är en del, behöver kunna fortgå trots störningar så som mer extrema väderförhållanden med långdragen torka eller kraftiga skyfall, större sjukdomsutbrott eller i värsta fall väpnad konflikt. Idisslare har en viktig roll i vår livsmedelsförsörjning men i dagsläget vet vi väldigt lite om hur den enskilda gården skulle påverkas vid olika samhällsstörningar. READ MORE
-
2. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE
-
3. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE
-
4. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. READ MORE
-
5. Security evaluation of the Matrix Server-Server API
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis presents a comprehensive security analysis of the Server-Server API of the Matrix protocol, providing a detailed examination of its vulnerabilities and contributing a significant body of knowledge to the cybersecurity field. The research focused exclusively on the Server-Server API of the Matrix protocol. READ MORE