Sökning: "Virtuella Attacker"

Visar resultat 1 - 5 av 7 uppsatser innehållade orden Virtuella Attacker.

  1. 1. Ethical Hacking of a Virtual Reality Headset

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Olivia Höft; [2023]
    Nyckelord :Cyber Security; Ethical Hacking; Penetration Test; Virtual Reality Headset; Cyber Säkerhet; Etisk Hackning; Penetrationstest; Virituella Verklighets Glasögon;

    Sammanfattning : Weak product cybersecurity is an increasing problem within society, and a growing consumer product is the Virtual Reality (VR) headset. This thesis investigated common vulnerabilities in Internet of Things (IoT) consumer products and performed proof-of-concept exploits on the Meta Quest VR headset. LÄS MER

  2. 2. Cryptocurrencies future carbon footprint : An exploratory scenario analysis of cryptocurrencies' future energy consumption and carbon emission.

    Master-uppsats, KTH/Skolan för industriell teknik och management (ITM)

    Författare :Jacob Tunberg; [2022]
    Nyckelord :Cryptocurrencies; sustainability; energy consumption; carbon emission; Proof of Work; Proof of Stake.; Kryptovalutor; Hållbarhet; Elkonsumtion; Koldioxidutsläpp; Proof of Work Proof of Stake.;

    Sammanfattning : Since the creation of Bitcoin, the virtual currency has attracted the attention of many people and is now a household name synonymous with cryptocurrencies. Today, many thousands of different variants of cryptocurrencies exist, and more are being launched each day. LÄS MER

  3. 3. Living off the Land Binaries with Virtual Machines

    Magister-uppsats, Högskolan i Halmstad

    Författare :Jakob Lingaas Türk; [2021]
    Nyckelord :LOLbin; Living off the land; virtual machine escape; fileless malware;

    Sammanfattning : As the threat of ransomware increases, the ever-growing demand for more efficient cybersecurityimplementations invite cybercriminals to find new methods of bypassing these counter measures.One method for bypassing potential antivirus software is to use the binaries already present on thevictim device, causing them damage by using trusted binaries which does not trigger windowsdefender (or similar antivirus measures). LÄS MER

  4. 4. Efficient Enclave Communication through Shared Memory : A case study of Intel SGX enabled Open vSwitch

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Jakob Svenningsson; [2019]
    Nyckelord :;

    Sammanfattning : Open vSwitch is a virtual network switch commonly used to forward network packages between virtual machines. The switch routes network packets based on a set of flow rules stored in its flow tables. LÄS MER

  5. 5. Hardened Registration Process for Participatory Sensing

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Jatesada Borsub; [2018]
    Nyckelord :Registration Process; Participatory Sensing; International Mobile Equipment Identity IMEI ; Android Rooting; Android Emulator; Mobile phone; CAPTCHA; Registreringsprocess; deltagande avkänning; International Mobil Equipment Identitet IMEI ; Android Rotning; Android Emulator; Mobil telefon; CAPTCHA;

    Sammanfattning : Participatory sensing systems need to gather information from a largenumber of participants. However, the openness of the system is a doubleedgedsword: by allowing practically any user to join, the system can beabused by an attacker who introduces a large number of virtual devices. LÄS MER