Essays about: "skadlig kod"

Showing result 1 - 5 of 14 essays containing the words skadlig kod.

  1. 1. GitBark : A Rule-Based Framework for Maintaining Integrity in Source Code Repositories

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Elias Bonnici; [2023]
    Keywords : Source Code Integrity; Version Control System; Git; Threat modeling; Digital signatures; Källkodsintegritet; Versionshanteringssystem; Git; Hotmodellering; Digitala signaturer;

    Abstract : In today’s digital landscape, maintaining the integrity of source code is crucial for delivering reliable and trustworthy software solutions. However, the increasing prevalence of attacks targeting source code repositories and version control systems (VCSs) poses significant challenges to source code integrity. READ MORE

  2. 2. Testing the Security of a Kubernetes Cluster in a Production Environment

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Francesco Giangiulio; Sébastien Malmberg; [2022]
    Keywords : Kubernetes; AKS; Security; Omnia; Kubernetes; AKS; Säkerhet; Omnia;

    Abstract : Enterprise grade Kubernetes solutions which are offered by large corporations like Microsoft have become very popular in the most recent years. To protect the integrity of customer information, which resides on shared resources in the Kubernetes cloud, adequate security measures need to be in place. READ MORE

  3. 3. Utilizing user centered design to mitigate security threats

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Emmy Edfors; Albin Sverreson; [2022]
    Keywords : Educational reminders; Posters; Phishing; Security Education; STRIDE; Threat Modeling; User Centered Design; Technology and Engineering;

    Abstract : As technology advances and is more and more intertwined with our everyday lives, the security of these systems becomes very important. Abraham Maslow famously put safety needs as the second level of his hierarchy of needs, its importance second only to physical needs such as air, food and sleep. READ MORE

  4. 4. Decompilation of WebAssembly using Datalog

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Love Brandefelt; [2022]
    Keywords : Datalog; Decompiler; WebAssembly; Logic programming; Bytecode; Datalog; Dekompilator; WebAssembly; Logic programming; Bytecode;

    Abstract : With 92% of today’s browsers supporting WebAssembly the need for decompilers to discover malicious code is greater than ever. The introduction of the Datalog to C++ compiler Soufflé, in 2016, enables the implementation of effective Datalog-based decompilers. READ MORE

  5. 5. Increased evasion resilience in modern PDF malware detectors : Using a more evasive training dataset

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oscar Ekholm; [2022]
    Keywords : Malware Analysis; Malicious PDF; Malware Detection; Machine Learning; Evasion; Analys av skadlig programvara; Skadlig PDF; Detektion av skadlig programvara; Maskininlärning; Undanflykt;

    Abstract : The large scale usage of the PDF coupled with its versatility has made the format an attractive target for carrying and deploying malware. Traditional antivirus software struggles against new malware and PDF's vast obfuscation options. In the search of better detection systems, machine learning based detectors have been developed. READ MORE