Sökning: "Obfuskering"

Visar resultat 1 - 5 av 10 uppsatser innehållade ordet Obfuskering.

  1. 1. Protecting software in embedded IoT units : The impact of code obfuscation

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Fredrik Karlsson; [2023]
    Nyckelord :Embedded; Obfuscation; Software protection; Internet of Things; Inbyggd; Obfuskering; Mjukvaruskydd; Internet of Things;

    Sammanfattning : Embedded Internet of Things (IoT) products are taking up a larger part of the market thanks to smaller, cheaper and more advanced components. For companies that spend time and resources on developing software for these products, it is important to keep that software secure to maintain the advantage gained. LÄS MER

  2. 2. Breaking WebAssembly Crypto Miner Detection by Obfuscation

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Gustav Ekner; [2023]
    Nyckelord :Computer Security; WebAssembly; Crypto mining; Code Obfuscation; Browsers; Datasäkerhet; WebAssembly; Kryptovalutautvinning; Kodobfuskering; Webbläsare;

    Sammanfattning : Blockchain-based cryptocurrencies is a fairly new concept with a worldwide spread, and there is a massive amount of currencies. Several of them involve so-called currency mining, a feature of Proof-of-Work based blockchains. LÄS MER

  3. 3. Detecting PowerShell Obfuscation Techniques using Natural Language Processing

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Jacob Klasmark; [2022]
    Nyckelord :Obfuscation detection; PowerShell; Natural Language Processing; Machine Learning; Security Operations Center; Obfuskeringsdetektion; PowerShell; Natural Language Processing; Maskinlärning; Security Operations Center;

    Sammanfattning : PowerShell obfuscation is often used to avoid getting detected by Anti Virus programs. There are several different techniques to change a PowerShell script and still perform the same tasks. Detecting these obfuscated files is a good addition in order to detect malicious files. LÄS MER

  4. 4. Random projections in a distributed environment for privacy-preserved deep learning

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Malcolm Bagger Toräng; [2021]
    Nyckelord :Random projections; Generative adversarial networks; Privacy metrics; Deep learning; Obfuscation.; Slumpmässiga projektioner; Generativa kontroversiella nätverk; Privatiserings-mått; Djupinlärning; Obfuskering.;

    Sammanfattning : The field of Deep Learning (DL) only over the last decade has proven useful for increasingly more complex Machine Learning tasks and data, a notable milestone being generative models achieving facial synthesis indistinguishable from real faces. With the increased complexity in DL architecture and training data, follows a steep increase in time and hardware resources required for the training task. LÄS MER

  5. 5. Is it possible to reverse engineer obfuscated bytecode back to source code?

    Kandidat-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Gustav Smedberg; Jenny Malmgren; [2020]
    Nyckelord :;

    Sammanfattning : AbstractThere are a lot of old software in the world that has not been supported or kept up todate and would need to be updated to seal security vulnerabilities, as well as to updatefunctions in the program. In those cases where the source code has been lost ordeliberately deleted, would it be possible to use reverse engineering to retrieve thesource code?This study aims to show what java bytecode is and how it is used, as well as how oneis able to go from java bytecode back to source code in a process called Reverse Engineering. LÄS MER