Sökning: "computer security"
Visar resultat 31 - 35 av 433 uppsatser innehållade orden computer security.
31. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode
Kandidat-uppsats, Umeå universitet/Institutionen för datavetenskapSammanfattning : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. LÄS MER
32. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack
Kandidat-uppsats, Umeå universitet/Institutionen för datavetenskapSammanfattning : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. LÄS MER
33. Enhancing an Existing Attack Projection System with Deep Learning
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : As organizations and critical infrastructure increasingly rely on computer networks for their function, cyber defense becomes more and more important. A recent trend is to employ predictive methods in cybersecurity. Attack projection attempts to predict the next step in an ongoing attack. LÄS MER
34. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set
Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. LÄS MER
35. A case study of unauthorized login attempts against honeypots via remote desktop
Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknikSammanfattning : Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. LÄS MER