Essays about: "thesis on hacking"
Showing result 1 - 5 of 48 essays containing the words thesis on hacking.
-
1. Security evaluation of the Matrix Server-Server API
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis presents a comprehensive security analysis of the Server-Server API of the Matrix protocol, providing a detailed examination of its vulnerabilities and contributing a significant body of knowledge to the cybersecurity field. The research focused exclusively on the Server-Server API of the Matrix protocol. READ MORE
-
2. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE
-
3. Pentesting on a WiFi Adapter : Afirmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Simple IoT devices such as WiFi adapters have the possibility of containing vulnerabilities because of the vast complexity of parsing and implementing the IEEE 802.11 standard correctly. READ MORE
-
4. Underneath the Surface : Threat modeling and penetration testing of a submarine robot
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Connected devices have become an integral part of life in modern society. In the industry, several tasks have been automatized and are now performed by robots, a development that is called Industry 4.0. READ MORE
-
5. Is your camera spying on you? : A security evaluation of a smart camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There are billions of Internet of Things (IoT) devices deployed world wide. Despite this there have been numerous studies showing that these devices very often have major security vulnerabilities. Ensuring the security of IoT devices is important, but especially so for devices that handle sensitive data. READ MORE