Sökning: "Security Exploits"

Visar resultat 1 - 5 av 49 uppsatser innehållade orden Security Exploits.

  1. 1. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Ivan Baheux; [2023]
    Nyckelord :Android Application Security; Vulnerability Detection; Context-Awareness; Model-Based Security Testing; Domain Specific Language; Sécurité des Applications Android; Détection de Vulnérabilités; Sensibilité au Contexte; Tests de Sécurité Basés sur les Modèles; Langage Dédiés; Android-applikationssäkerhet; Upptäckt av sårbarheter; Kontextmedvetenhet; Modellbaserad säkerhetstestning; Domänspecifikt språk;

    Sammanfattning : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. LÄS MER

  2. 2. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Paul Moosbrugger; [2023]
    Nyckelord :Prototype Pollution Gadgets; Dynamic Taint Analysis; Forced Branch Execution; NodeProf Instrumentation; Truffle GraalJS;

    Sammanfattning : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. LÄS MER

  3. 3. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Chunyu Zhuang; [2023]
    Nyckelord :Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Sammanfattning : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. LÄS MER

  4. 4. The effects of large-scale nutrition Interventions on Early Childhood and Neonatal Outcomes: evidence from Brazil

    Master-uppsats, Lunds universitet/Nationalekonomiska institutionen

    Författare :Isabella Rego Monteiro; [2023]
    Nyckelord :nutrition; food insecurity; early childhood development; neonatal health; impact evaluation; Brazil; Latin America; Business and Economics;

    Sammanfattning : This study exploits the introduction of a new prioritization criteria for food security interventions to estimate the marginal impact of such programs. Findings indicate that, in municipalities assigned to receive nutrition policies more intensely, the number of children receiving micronutrient supplements was higher. LÄS MER

  5. 5. Detection of Prototype Pollution Using Joern : Joern’s Detection Capability Compared to CodeQL’s

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Tobias Fröberg; [2023]
    Nyckelord :CodeQL; Computer security; JavaScript; Joern; Prototype pollution; Vulnerability detection; CodeQL; Datorsäkerhet; JavaScript; Joern; Prototypförorening; Sårbarhetsdetektering;

    Sammanfattning : JavaScript-built programs are widely used by the general public, but they are also vulnerable to JavaScript-related exploits stemming from the newly discovered prototype pollution vulnerability. Research has been focused on understanding the impact of this vulnerability and finding ways to detect it using code analysis tools. LÄS MER