Essays about: "security device thesis"

Showing result 1 - 5 of 141 essays containing the words security device thesis.

  1. 1. Environmentally aware vulnerability prioritisation within large networks : A proposed novel method

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Marcus Lenander; Jakob Tigerström; [2022]
    Keywords : Software vulnerability management; vulnerability prioritisation; CVSS; environmental metrics; cyber security; Hantering av sårbarhet i programvara; prioritering av sårbarheter; CVSS; Miljömetrik; cybersäkerhet;

    Abstract : Background. Software vulnerabilities are a constant threat to organisations, businesses, and individuals. Keeping all devices patched from security software vulnerabilities is complex and time-consuming. Companies must use resources efficiently to ensure that the most severe security vulnerability is prioritised first. READ MORE

  2. 2. Battery-less IoT Devices: Energy Source Manipulation Attacks

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Arslan Hameed; [2022]
    Keywords : ;

    Abstract : The Internet of Things (IoT) is expected to enable applications of utmost societal value, such as energy-efficient buildings, smart cities, and next-generation healthcare. While there has been a lot of progress on the security of larger devices, there is a need to consider the security of resource-constrained devices. READ MORE

  3. 3. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qiao Jin; [2022]
    Keywords : Embedded systems; ESP 32; Cryptographic algorithms; Cryptographic hardware acceleration; AES; RSA; SHA-2; HTTPS; Inbyggda system; ESP 32; Kryptografiska algoritmer; Kryptografisk hårdvaruacceleration; AES; RSA; SHA-2; HTTPS;

    Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE

  4. 4. Advanced Side-Channel Analysis of USIMs, Bluetooth SoCs and MCUs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Martin Brisfors; [2021]
    Keywords : Side Channel Attack; Deep Learning; AES; USIM; Milenage; Screaming Channels; Transformer; Security; Sidokanalsattack; Djupinlärning; AES; USIM; Milenage; Screaming Channels; Transformer; Säkerhet;

    Abstract : The use of deep learning for side channel analysis has shown a lot of success in recent years. Impressive results have been presented by many researchers. However, critics of this approach have voiced concerns about the ad hoc methodologies and bespoke neural network designs used in many presented approaches. READ MORE

  5. 5. Secure IPC To Enable Highly Sensitive Communication In A Smartphone Environment With A BYOD Setup

    University essay from Linköpings universitet/Informationskodning

    Author : Daniel Holmberg; [2021]
    Keywords : ;

    Abstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE