Essays about: "secure mobile application"

Showing result 1 - 5 of 55 essays containing the words secure mobile application.

  1. 1. Are Children Safe with Smart Watches? : Security Analysis and Ethical Hacking on Children’s Smart Watches

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yaqi Tian; [2023]
    Keywords : Security analysis; Penetration testing; Smart watches; Mobile Applications; Säkerhetsanalys; Penetrationstestning; Smarta klockor; Mobilapplikationer;

    Abstract : There are more and more parents that are considering to purchase smart watches for their kids. The children’s smart watches on the market are usually equipped with many practical functions like the GPS positioning, the camera and the messaging. READ MORE

  2. 2. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE

  3. 3. An analysis and comparison of the Native mobile application versus the Progressive web application

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : William Berggren; [2023]
    Keywords : Mobile App Development; UX; Swift; React.;

    Abstract : Det här arbetet utforskar jämförelsen mellan progressiva webbapplikationer (PWA) och native mobila applikationer. Arbetet belyser ett problem som är aktuellt idag och kommer att vara ännu mer så i närmaste framtid på grund av den ständiga teknikutvecklingen och människans beroende av mobila applikationer. READ MORE

  4. 4. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE

  5. 5. Enclave Host Interface for Security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anmol Sinha; [2022]
    Keywords : Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code; Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code;

    Abstract : Secure enclave technology has during the last decade emerged as an important hardware security primitive in server computer cores, and increasingly also in chips intended for consumer devices like mobile phones and PCs. The Linux Confidential Compute Consortium has taken a leading role in defining the host APIs for enclave access (e.g. READ MORE