Essays about: "thesis linux security"
Showing result 1 - 5 of 37 essays containing the words thesis linux security.
-
1. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE
-
2. Pentesting on a WiFi Adapter : Afirmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Simple IoT devices such as WiFi adapters have the possibility of containing vulnerabilities because of the vast complexity of parsing and implementing the IEEE 802.11 standard correctly. READ MORE
-
3. Enclave Host Interface for Security
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Secure enclave technology has during the last decade emerged as an important hardware security primitive in server computer cores, and increasingly also in chips intended for consumer devices like mobile phones and PCs. The Linux Confidential Compute Consortium has taken a leading role in defining the host APIs for enclave access (e.g. READ MORE
-
4. Securing cloud-hosted IoT Workflows with Intel SGX
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rapid increase in the number of IoT devices and their widespread applications demands secure and scalable solutions for managing and executing IoT workflows. This thesis investigates the security of IoT workflows created in Node-RED, an open-source visual programming tool, and deployed on untrusted hosts managed by a major cloud service provider, Azure. READ MORE
-
5. Tracing Control with Linux Tracing Toolkit, next generation in a Containerized Environment
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : 5G is becoming reality with companies rolling out the technology around the world. In 5G,the Radio Access Network (RAN) is moving from a monolithic-based architecture into a cloud-based microservice architecture for the purpose of simplifying deployment and manageability,and explore scalability and flexibility. READ MORE