Sökning: "Virtuella maskiner"
Visar resultat 1 - 5 av 48 uppsatser innehållade orden Virtuella maskiner.
1. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis
Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. LÄS MER
2. Improving and Evaluating TRex Traffic Generator through P4 Switches
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Traffic generators, as an indispensable tool to test devices under test and networking protocols, help researchers to execute performance inspection and optimization. Among all traffic generators, TRex is an open-source, high-performance, and low-cost traffic generator which is built on Data Plane Development Kit (DPDK). LÄS MER
3. Nätverksvirtualisering : En jämförelse mellan overlay-teknikerna VXLAN, NVGRE & GENEVE
Uppsats för yrkesexamina på grundnivå, Mälardalens universitet/Akademin för innovation, design och teknikSammanfattning : För att använda sig av tekniska produkter krävs en nätverksuppkoppling.Nätverksinfrastrukturen blir idag allt mer beroende av datacenter, en fysiskt eller virtuell platsdär datorer, servrar, lagringsenheter och nätverkskomponenter är samlade. LÄS MER
4. Trusted Execution Environment deployment through cloud Virtualization : Aproject on scalable deployment of virtual machines
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : In the context of cloud computing, Trusted Execution Environments (TEE) are isolated areas of application software that can be executed with better security, building a trusted and secure environment that is detached from the rest of the memory. Trusted Execution Environment is a technology that become available only in the last few years, and it is not widespread yet. LÄS MER
5. Living off the Land Binaries with Virtual Machines
Magister-uppsats, Högskolan i HalmstadSammanfattning : As the threat of ransomware increases, the ever-growing demand for more efficient cybersecurityimplementations invite cybercriminals to find new methods of bypassing these counter measures.One method for bypassing potential antivirus software is to use the binaries already present on thevictim device, causing them damage by using trusted binaries which does not trigger windowsdefender (or similar antivirus measures). LÄS MER