Sökning: "Sårbarheter"
Visar resultat 16 - 20 av 285 uppsatser innehållade ordet Sårbarheter.
16. Exploring the Security Implications of a Decentralized Internet : Vulnerabilities in Web3 and Blockchain-Based Networks
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : The internet has evolved from an information-based reading platform to a read-and-write platform which is dominated by a handful of organizations. This centralization has led to a movement suggesting a new shift using blockchain technology to create a decentralised internet. LÄS MER
17. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. LÄS MER
18. Energy Poverty: Geospatial Modelling in 2021 Berlin using publicly available data : KTH Thesis Report
Master-uppsats, KTH/Skolan för industriell teknik och management (ITM)Sammanfattning : Energy services are essential for human development and well-being, and the unequal distribution of them leads to inequalities and vulnerabilities. Energy poverty, generally understood as the inability to heat a household, is an increasingly pressing issue that in the context of political and climatic instabilities could affect more and more households. LÄS MER
19. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Open-source software is often chosen with the expectation of increased security [1]. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. LÄS MER
20. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. LÄS MER