Sökning: "computer security"

Visar resultat 31 - 35 av 433 uppsatser innehållade orden computer security.

  1. 31. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode

    Kandidat-uppsats, Umeå universitet/Institutionen för datavetenskap

    Författare :Henrik Lindblom; [2023]
    Nyckelord :Computer Security; Operating Systems; Control-flow hijack attacks; Buffer Overflow; Stack; DOS;

    Sammanfattning : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. LÄS MER

  2. 32. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack

    Kandidat-uppsats, Umeå universitet/Institutionen för datavetenskap

    Författare :Viktor Olofsson; [2023]
    Nyckelord :control-flow integrity; CFI; control-flow graph; CFG; memory corruption; Android; vulnerability; android vulnerability; computer security;

    Sammanfattning : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. LÄS MER

  3. 33. Enhancing an Existing Attack Projection System with Deep Learning

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Mikael Kolanowski; [2023]
    Nyckelord :Cybersecurity; Attack projection; Deep learning; LSTM; Transformer; Cybersäkerhet; Attackprojicering; Djupinlärning; LSTM; Transformer;

    Sammanfattning : As organizations and critical infrastructure increasingly rely on computer networks for their function, cyber defense becomes more and more important. A recent trend is to employ predictive methods in cybersecurity. Attack projection attempts to predict the next step in an ongoing attack. LÄS MER

  4. 34. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Kateryna Sydorenko; [2023]
    Nyckelord :Indicator of Compromise; Set Cover Problem; Maximum Coverage; Open Threat Exchange;

    Sammanfattning : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. LÄS MER

  5. 35. A case study of unauthorized login attempts against honeypots via remote desktop

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Oscar Rehnbäck; [2023]
    Nyckelord :;

    Sammanfattning :  Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. LÄS MER