Essays about: "security flaws"

Showing result 1 - 5 of 77 essays containing the words security flaws.

  1. 1. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ivan Baheux; [2023]
    Keywords : Android Application Security; Vulnerability Detection; Context-Awareness; Model-Based Security Testing; Domain Specific Language; Sécurité des Applications Android; Détection de Vulnérabilités; Sensibilité au Contexte; Tests de Sécurité Basés sur les Modèles; Langage Dédiés; Android-applikationssäkerhet; Upptäckt av sårbarheter; Kontextmedvetenhet; Modellbaserad säkerhetstestning; Domänspecifikt språk;

    Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE

  2. 2. Evaluating intrusion detection points in an end-to-end solution

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Lilla Pankaczi; [2023]
    Keywords : RFID; Random UID; Mutual Authentication; Scyther;

    Abstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE

  3. 3. BRIDGING THE GAP IN VULNERABILITY MANAGEMENT : A tool for centralized cyber threat intelligence gathering and analysis

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Panagiotis Vlachos; [2023]
    Keywords : Vulnerability management; Cyber threat intelligence; Common vulnerability scoring system; Exploit prediction scoring system;

    Abstract : A large number of organizations these days are offering some kind of digital services, relyon digital technologies for processing, storing, and sharing of information, are harvesting moderntechnologies to offer remote working arrangements and may face direct cybersecurity risks. Theseare some of the properties of a modern organization. READ MORE

  4. 4. The Deeper Investigation of SmartHealthcare Systems using 5G Security

    University essay from Blekinge Tekniska Högskola

    Author : Bindu Ananthula; Niharika Budde; [2023]
    Keywords : Smart Healthcare; 5G; IoT; Security; Risk Management;

    Abstract : A promising approach to raising the caliber and accessibility of healthcare services is the development of Smart Healthcare Systems. However, the union of wireless networks and smart medical devices has created additional security issues, such as the possibility of identity theft, data breaches, and denial-of-service assaults. READ MORE

  5. 5. Assessing the security of a Garmin Smartwatch through Ethical hacking

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lucas Manfredh; [2022]
    Keywords : Security; Privacy; Bluetooth; Smartwatch; Ethical hacking; Säkerhet; Integritet; Bluetooth; Smartklocka; Etisk hacking;

    Abstract : A smartwatch is a device used to track personal data related to health, training, sleep, and diet. The smartwatch industry has seen a steady growth in recent years and is expected to continue to grow. Today many people see the use of their smartwatch as an essential part of their daily routine. READ MORE