Sökning: "Virtuella Attacker"
Visar resultat 1 - 5 av 7 uppsatser innehållade orden Virtuella Attacker.
1. Ethical Hacking of a Virtual Reality Headset
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Weak product cybersecurity is an increasing problem within society, and a growing consumer product is the Virtual Reality (VR) headset. This thesis investigated common vulnerabilities in Internet of Things (IoT) consumer products and performed proof-of-concept exploits on the Meta Quest VR headset. LÄS MER
2. Cryptocurrencies future carbon footprint : An exploratory scenario analysis of cryptocurrencies' future energy consumption and carbon emission.
Master-uppsats, KTH/Skolan för industriell teknik och management (ITM)Sammanfattning : Since the creation of Bitcoin, the virtual currency has attracted the attention of many people and is now a household name synonymous with cryptocurrencies. Today, many thousands of different variants of cryptocurrencies exist, and more are being launched each day. LÄS MER
3. Living off the Land Binaries with Virtual Machines
Magister-uppsats, Högskolan i HalmstadSammanfattning : As the threat of ransomware increases, the ever-growing demand for more efficient cybersecurityimplementations invite cybercriminals to find new methods of bypassing these counter measures.One method for bypassing potential antivirus software is to use the binaries already present on thevictim device, causing them damage by using trusted binaries which does not trigger windowsdefender (or similar antivirus measures). LÄS MER
4. Efficient Enclave Communication through Shared Memory : A case study of Intel SGX enabled Open vSwitch
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Open vSwitch is a virtual network switch commonly used to forward network packages between virtual machines. The switch routes network packets based on a set of flow rules stored in its flow tables. LÄS MER
5. Hardened Registration Process for Participatory Sensing
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Participatory sensing systems need to gather information from a largenumber of participants. However, the openness of the system is a doubleedgedsword: by allowing practically any user to join, the system can beabused by an attacker who introduces a large number of virtual devices. LÄS MER