Essays about: "thesis for black box testing"

Showing result 6 - 10 of 33 essays containing the words thesis for black box testing.

  1. 6. Ethical hacking of Sennheiser smart headphones

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fuhao Huang; [2022]
    Keywords : Ethical hacking; smart headphones; Bluetooth; cyber security; Internet of Things; Etisk hackning; smarta hörlurar; Bluetooth; cybersäkerhet; Internet of Things;

    Abstract : The proliferation of IoT devices has brought our world closer than ever. However, because these devices can connect to the internet, they are also vulnerable to cyberattacks. IoT devices collect our personal information, so we must take IoT security seriously to protect our privacy. READ MORE

  2. 7. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE

  3. 8. Penetration Testinga Saia Unit : A Control System for Water, Ventilation, and Heating in Smart Buildings

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Elvira Dzidic; Benjamin Jansson Mbonyimana; [2021]
    Keywords : Smart Buildings; IoT; Saia; Penetration Testing; Security; Smarta Byggnader; IoT; Saia; Penetrationstestning; Säkerhet;

    Abstract : The concept of Smart Buildings and automated processes is a growing trend. Due to a rapidly growing market of buildings that relies on the Internet, improper security measures allow hackers to gain control over the whole system easily and cause devastating attacks. READ MORE

  4. 9. Evaluation of the t-wise Approach for Testing REST APIs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Diba Vosta; [2020]
    Keywords : ;

    Abstract : A combinatorial explosion can occur when all possible combinations of all input parameters of a system are tested. When the number of input parameters and their possible values increase, the number of tests needed to cover each new case increases exponentially. READ MORE

  5. 10. Mantis The Black-Box Scanner : Finding XSS vulnerabilities through parse errors

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Johan Liljebjörn; Hugo Broman; [2020]
    Keywords : XSS; Reflected parameter; Vulnerability scanner; Scalability;

    Abstract : Abstract [en] Background. Penetration testing is a good technique for finding web vulnerabilities. Vulnerability scanners are often used to aid with security testing. The increased scope is becoming more difficult for scanners to handle in a reasonable amount of time. READ MORE