Essays about: "security vulnerabilities"
Showing result 6 - 10 of 423 essays containing the words security vulnerabilities.
-
6. Case Study: Assessing the Security of a ZigBee Smart HomeNetwork
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Utilizing the ZigBee protocol is pervasive in the context of smart homes, offering substantial convenience to individuals. However, smart home devices commonly handle significant quantities of real-world information, potentially giving rise to concerns related to information leakage. READ MORE
-
7. Ensuring the Security of PyPI Packages
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE
-
8. Streamlining the Process of Surveying Cybersecurity Vulnerabilities in OT
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Operational Technology, OT, is the backbone of the 21st-century society since it eases access for managing critical infrastructure like water, transportation, and energy supply. Therefore, the security of such systems is of utmost importance. READ MORE
-
9. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE
-
10. Code Review Application : Simplifying code review through data flow visualization
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : From a security standpoint, manual code review is widely regarded as a dependable practice, particularly in systems with heightened security needs. However, it is also a time-consuming and laborious task that requires careful consideration. READ MORE