Sökning: "Security Exploits"
Visar resultat 1 - 5 av 49 uppsatser innehållade orden Security Exploits.
1. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. LÄS MER
2. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. LÄS MER
3. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. LÄS MER
4. The effects of large-scale nutrition Interventions on Early Childhood and Neonatal Outcomes: evidence from Brazil
Master-uppsats, Lunds universitet/Nationalekonomiska institutionenSammanfattning : This study exploits the introduction of a new prioritization criteria for food security interventions to estimate the marginal impact of such programs. Findings indicate that, in municipalities assigned to receive nutrition policies more intensely, the number of children receiving micronutrient supplements was higher. LÄS MER
5. Detection of Prototype Pollution Using Joern : Joern’s Detection Capability Compared to CodeQL’s
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : JavaScript-built programs are widely used by the general public, but they are also vulnerable to JavaScript-related exploits stemming from the newly discovered prototype pollution vulnerability. Research has been focused on understanding the impact of this vulnerability and finding ways to detect it using code analysis tools. LÄS MER