Sökning: "hijack"
Visar resultat 1 - 5 av 14 uppsatser innehållade ordet hijack.
1. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode
Kandidat-uppsats, Umeå universitet/Institutionen för datavetenskapSammanfattning : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. LÄS MER
2. Investigating the Effectiveness of Stealthy Hijacks against Public Route Collectors : Is AS-Path Prepending Enough to Hide from Public Route Collectors?
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : BGP hijacking is a threat to network organizations because traditional BGP protocols were not designed with security in mind. Currently, research to combat hijacking is being done by detecting hijacking in real time from Public Route Collectors. LÄS MER
3. iOS vs Android: Security of Inter-App Communication
Kandidat-uppsats, Mittuniversitetet/Institutionen för data- och systemvetenskapSammanfattning : Android and iOS are the world leading mobile operating systems in today’s growing market of handheld devices. Third-party applications are an important aspect of these systems but can also provide an attack-vector for exploiting other installed applications. LÄS MER
4. Holding up a mirror: A study on the discursive work of academics in promoting alternative users in sustainability reporting
D-uppsats, Handelshögskolan i Stockholm/Institutionen för redovisning och finansieringSammanfattning : We hold a mirror against the extensive academic critique aimed at the capture of sustainability reporting by exploring rhetorical strategies used by academics in their efforts to deprioritize the investor and promote alternative user notions. For this aim, we analyze two consultation rounds of the IFRS Foundation, a standard setter which has been suggested to be captured and that holds the potential to shape sustainability reporting practices for years to come. LÄS MER
5. Security evaluation of ten Swedish mobile applications
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : The widespread usage of smartphones and mobile applications in Sweden exposes the users to potential risks if not adequate security standards are implemented. An insecure application that is exploited by an adversary could potentially compromise the users private data and integrity. LÄS MER