Essays about: "software protection."

Showing result 6 - 10 of 130 essays containing the words software protection..

  1. 6. Protecting software in embedded IoT units : The impact of code obfuscation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fredrik Karlsson; [2023]
    Keywords : Embedded; Obfuscation; Software protection; Internet of Things; Inbyggd; Obfuskering; Mjukvaruskydd; Internet of Things;

    Abstract : Embedded Internet of Things (IoT) products are taking up a larger part of the market thanks to smaller, cheaper and more advanced components. For companies that spend time and resources on developing software for these products, it is important to keep that software secure to maintain the advantage gained. READ MORE

  2. 7. Urban Planning & Governance in the Age of AI : A Study of the Potential Benefits and Risks

    University essay from KTH/Skolan för arkitektur och samhällsbyggnad (ABE)

    Author : Jonas Gummesson; [2023]
    Keywords : Accountability; AI; Artificial Intelligence; Big Data; Cybernetics; Engagement; Equality; Governance; Neural Networks; Participation; Power; Smart City; Systems planning.; Transparency; Trust; Urban Design; Urban Planning;

    Abstract : Artificial intelligence (AI) is a rapidly developing technology which in this project refers to software that given objectives generate content, predictions, recommendations, or decisions influencing their environment. Using literature reviews and semi-structured interviews, the current and future uses, sentiments, regulations, and risks of AI in urban planning and governance are gathered. READ MORE

  3. 8. A VVER1000 primary side model in Apros

    University essay from KTH/Fysik

    Author : Karl-Edvin Strand; [2023]
    Keywords : Apros; VVER1000; PWR; Modelling; HPIS; Boron acid; Apros; VVER1000; PWR; Modellering; HPIS; Borsyra;

    Abstract : Nuclear power plants generate electricity by means of splitting atoms. The basic safety requirements and objectives are to protect the people, society, and the environment from radiological accidents, limit harmful effects of ionizing radiation during operation and take all reasonable practical steps to prevent radiological accidents. READ MORE

  4. 9. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Henrik Lindblom; [2023]
    Keywords : Computer Security; Operating Systems; Control-flow hijack attacks; Buffer Overflow; Stack; DOS;

    Abstract : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. READ MORE

  5. 10. Decentralized Validation of Reproducible Builds : A protocol for collaborative and decentralized validation of package reproducibility

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Moritz; [2023]
    Keywords : Blockchain; Reproducible builds; Collaborative intelligence; Model checking; Hyperledger Fabric; TLA ; Blockkedjor; Reproducerbara byggen; Kollaborativ intelligens; Modeltestning; Hyperledger Fabric; TLA ;

    Abstract : As the threat of supply-chain attacks grows, the need for techniques to protect software integrity likewise increases. The concept of reproducible builds is one such protection. READ MORE