Essays about: "secure mobile applications"

Showing result 1 - 5 of 55 essays containing the words secure mobile applications.

  1. 1. An Integrated Room Booking and Access Control System for Public Spaces

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Jaffar Kamil; Mohamed Amer; [2023]
    Keywords : Integrated Systems; Room Booking System; Access Control System; Bank ID; Mobile Applications;

    Abstract : Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. READ MORE

  2. 2. Are Children Safe with Smart Watches? : Security Analysis and Ethical Hacking on Children’s Smart Watches

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yaqi Tian; [2023]
    Keywords : Security analysis; Penetration testing; Smart watches; Mobile Applications; Säkerhetsanalys; Penetrationstestning; Smarta klockor; Mobilapplikationer;

    Abstract : There are more and more parents that are considering to purchase smart watches for their kids. The children’s smart watches on the market are usually equipped with many practical functions like the GPS positioning, the camera and the messaging. READ MORE

  3. 3. An analysis and comparison of the Native mobile application versus the Progressive web application

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : William Berggren; [2023]
    Keywords : Mobile App Development; UX; Swift; React.;

    Abstract : Det här arbetet utforskar jämförelsen mellan progressiva webbapplikationer (PWA) och native mobila applikationer. Arbetet belyser ett problem som är aktuellt idag och kommer att vara ännu mer så i närmaste framtid på grund av den ständiga teknikutvecklingen och människans beroende av mobila applikationer. READ MORE

  4. 4. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE

  5. 5. Enclave Host Interface for Security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anmol Sinha; [2022]
    Keywords : Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code; Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code;

    Abstract : Secure enclave technology has during the last decade emerged as an important hardware security primitive in server computer cores, and increasingly also in chips intended for consumer devices like mobile phones and PCs. The Linux Confidential Compute Consortium has taken a leading role in defining the host APIs for enclave access (e.g. READ MORE