Essays about: "secure code"

Showing result 1 - 5 of 91 essays containing the words secure code.

  1. 1. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Molloy; [2023]
    Keywords : Privacy; Code Generation; Vehicle-to-infrastructure; Vehicular ad hoc Networks; Standardization; Remote Procedure Calls; Safety; Integritet; Kodgenerering; Fordon-till-infrastruktur; Ad hoc-nät för Fordon; Standardisering; Samtal om fjärrprocedur; Säkerhet;

    Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE

  2. 2. Enhancing Privacy in Cookieless Web Advertising : A Comparative Study of Multi-Party Computation and Trusted Execution Environment Solutions for Private Attribution Reporting

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Victor Massy; [2023]
    Keywords : Multiparty computation; Trusted execution envrionment; Web advertising; Private attribution reporting; Flerpartsberäkning; Pålitlig exekveringsmiljö; Webannonsering; Privat attributionsrapportering;

    Abstract : The end of third-party cookies has driven the advertising market to seek new solutions. Third-party cookies were widely used to track users’ online activities across websites. However, the growing concern for privacy has led web browsers to put an end to this practice. READ MORE

  3. 3. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Lövgren; [2023]
    Keywords : Open-Source; Vulnerability Identification; High-Risk Developers; Öppen Källkod; Identifiering av Sårbarheter; Högriskutvecklare;

    Abstract : Open-source software is often chosen with the expectation of increased security [1]. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE

  4. 4. Protecting software in embedded IoT units : The impact of code obfuscation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fredrik Karlsson; [2023]
    Keywords : Embedded; Obfuscation; Software protection; Internet of Things; Inbyggd; Obfuskering; Mjukvaruskydd; Internet of Things;

    Abstract : Embedded Internet of Things (IoT) products are taking up a larger part of the market thanks to smaller, cheaper and more advanced components. For companies that spend time and resources on developing software for these products, it is important to keep that software secure to maintain the advantage gained. READ MORE

  5. 5. A Techno_Economic Feasibility Study of a Cryptocurrency Data Center Based on Renewable Energy : A feasibility Study of a Bitcoin Mining Farm Powered by Solar and Wind Energy.

    University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknik

    Author : Ali Wali; [2023]
    Keywords : Datacenter; Cryptocurrency; Mining Farm; Renewable Energy; Hybrid Energy System; Solar and Wind energy; Electricity Storage Medium; Feasibility Study; Financial Analysis; Reliability; Optimization.;

    Abstract : The increasing popularity and improvements in the blockchain technology that offers decentralized communication and transactions in the form of cryptocurrencies that have now days a market value of almost 1.3 Trillion dollars and a huge potential to contribute to other fields such as health care, financial transactions, information technology, secure data exchange, data storage and many others has been pushing towards more integrating of renewable energies in this field. READ MORE