Sökning: "Replay Attack"
Visar resultat 1 - 5 av 14 uppsatser innehållade orden Replay Attack.
1. Penetration testing of Sesame Smart door lock
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : The Internet of things (IoT) device has been widely used in various fields, and its market is expanding rapidly. However, the growing usage of IoT devices also brings more security concerns. The smart door lock is one of the smart home IoT devices that need to be designed securely. LÄS MER
2. Distributed Relay/Replay Attacks on GNSS Signals
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : In modern society, Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon by many systems, among others in critical infrastructure, for navigation and time synchronization. To overcome the prevailing vulnerable state of civilian GNSSs, many detection schemes for different attack types (i.e. LÄS MER
3. Assessing the Security of Internal Automotive Networks
Kandidat-uppsats, Göteborgs universitet/Institutionen för data- och informationsteknikSammanfattning : Context In order to address the growing need for connectivity in today’s cars, the in-vehicle network has increased in complexity, now consisting of over 100 electrical control units. Balancing the level of security with high performance is non-trivial, and current networks have shown to sacrifice security measures for performance, therefore leaving the networks sensitive to both manipulation and information re trieval. LÄS MER
4. Adagio For The Internet Of Things : IoT penetration testing and security analysis of a smart plug
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : The emergence of the Internet of Things (IoT) shows us that more and more devices will be connected to the internet for all types of different purposes. One of those devices, the smart plug, have been rapidly deployed because of the ease it brings users into achieving home automation by turning their previous dumb devices smart by giving them the means of controlling the devices remotely. LÄS MER
5. Understanding the MicroScope Microarchitectural Replay Attack Through a New Implementation
Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : Side-channel attacks, where information is extracted through analysis of the implementation of a computer system by a malicious adversary, constitute security vulnerabilities that may be hard to mitigate. They however suffer from noise originating from, for example, other processes or frequent cache evictions, which forces an attacker to repeat the attack a large number of times in order to obtain useful information. LÄS MER