Sökning: "Malicious code"

Visar resultat 1 - 5 av 43 uppsatser innehållade orden Malicious code.

  1. 1. Ensuring the Security of PyPI Packages

    Master-uppsats, Göteborgs universitet/Institutionen för data- och informationsteknik

    Författare :David Shakoori Gustafsson; [2023-10-23]
    Nyckelord :Computer science; Security; Python; PyPI; Typosquatting;

    Sammanfattning : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. LÄS MER

  2. 2. Antivirus performance in detecting Metasploit payloads : A Case Study on Anti-Virus Effectiveness

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Eric Nyberg; Leandro Dinis Ferreira; [2023]
    Nyckelord :Metasploit; Anti-Virus Effectivness; AV Effectiveness; MSFVenom; Antivirus; AV Software; Metasploit Encoding; Encodings; Detection rates; AV Efficiency; Antivirus efficiency; payloads; payload detection..;

    Sammanfattning : This paper will focus solely on the effectiveness of AV (antivirus) in detecting Metasploit payloads which have been encapsulated with different encapsulation modules. There seems to be a significant knowledge gap in the evaluation of commercial antivirus's software and their ability to detect malicious code and stop such code from being executed on IT systems. LÄS MER

  3. 3. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Paul Moosbrugger; [2023]
    Nyckelord :Prototype Pollution Gadgets; Dynamic Taint Analysis; Forced Branch Execution; NodeProf Instrumentation; Truffle GraalJS;

    Sammanfattning : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. LÄS MER

  4. 4. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis

    Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Kevin Engström; Robin Lenz; [2023]
    Nyckelord :Sandbox detection; analysis evasion; virtual environment; masking;

    Sammanfattning : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. LÄS MER

  5. 5. Vulnerability Management of Open-Source Libraries

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Författare :Lokesh kumar Mekala; Sai krishna Kandukuri; [2023]
    Nyckelord :vulnerability management; software security; open-source software.;

    Sammanfattning : Background: The proliferation of using open-source libraries in software development has brought numerous benefits, including access to a wide range of reusable code and collaborating with a global community of developers. However, this increased reliance on third-party code also introduces new security risks in the form of vulnerabilities that malicious actors can exploit. LÄS MER