Essays about: "software protection."
Showing result 6 - 10 of 130 essays containing the words software protection..
-
6. Protecting software in embedded IoT units : The impact of code obfuscation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Embedded Internet of Things (IoT) products are taking up a larger part of the market thanks to smaller, cheaper and more advanced components. For companies that spend time and resources on developing software for these products, it is important to keep that software secure to maintain the advantage gained. READ MORE
-
7. Urban Planning & Governance in the Age of AI : A Study of the Potential Benefits and Risks
University essay from KTH/Skolan för arkitektur och samhällsbyggnad (ABE)Abstract : Artificial intelligence (AI) is a rapidly developing technology which in this project refers to software that given objectives generate content, predictions, recommendations, or decisions influencing their environment. Using literature reviews and semi-structured interviews, the current and future uses, sentiments, regulations, and risks of AI in urban planning and governance are gathered. READ MORE
-
8. A VVER1000 primary side model in Apros
University essay from KTH/FysikAbstract : Nuclear power plants generate electricity by means of splitting atoms. The basic safety requirements and objectives are to protect the people, society, and the environment from radiological accidents, limit harmful effects of ionizing radiation during operation and take all reasonable practical steps to prevent radiological accidents. READ MORE
-
9. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. READ MORE
-
10. Decentralized Validation of Reproducible Builds : A protocol for collaborative and decentralized validation of package reproducibility
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As the threat of supply-chain attacks grows, the need for techniques to protect software integrity likewise increases. The concept of reproducible builds is one such protection. READ MORE