Avancerad sökning

Visar resultat 1 - 5 av 32 uppsatser som matchar ovanstående sökkriterier.

  1. 1. Protecting software in embedded IoT units : The impact of code obfuscation

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Fredrik Karlsson; [2023]
    Nyckelord :Embedded; Obfuscation; Software protection; Internet of Things; Inbyggd; Obfuskering; Mjukvaruskydd; Internet of Things;

    Sammanfattning : Embedded Internet of Things (IoT) products are taking up a larger part of the market thanks to smaller, cheaper and more advanced components. For companies that spend time and resources on developing software for these products, it is important to keep that software secure to maintain the advantage gained. LÄS MER

  2. 2. Breaking WebAssembly Crypto Miner Detection by Obfuscation

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Gustav Ekner; [2023]
    Nyckelord :Computer Security; WebAssembly; Crypto mining; Code Obfuscation; Browsers; Datasäkerhet; WebAssembly; Kryptovalutautvinning; Kodobfuskering; Webbläsare;

    Sammanfattning : Blockchain-based cryptocurrencies is a fairly new concept with a worldwide spread, and there is a massive amount of currencies. Several of them involve so-called currency mining, a feature of Proof-of-Work based blockchains. LÄS MER

  3. 3. Detecting PowerShell Obfuscation Techniques using Natural Language Processing

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Jacob Klasmark; [2022]
    Nyckelord :Obfuscation detection; PowerShell; Natural Language Processing; Machine Learning; Security Operations Center; Obfuskeringsdetektion; PowerShell; Natural Language Processing; Maskinlärning; Security Operations Center;

    Sammanfattning : PowerShell obfuscation is often used to avoid getting detected by Anti Virus programs. There are several different techniques to change a PowerShell script and still perform the same tasks. Detecting these obfuscated files is a good addition in order to detect malicious files. LÄS MER

  4. 4. Fast Classification of Obfuscated Malware with an Artificial Neural Network

    Kandidat-uppsats, KTH/Datavetenskap

    Författare :Johan Luhr; Hannes Hallqvist; [2022]
    Nyckelord :;

    Sammanfattning : Malware has posed a problem ever since the first variant was created in the 1980s. As malware detection techniques have advanced, malware developers have in turn found better ways to hide and obfuscate malware. Machine learning (ML) has seen great expansion into many fields over the last years, this includes the field of cybersecurity. LÄS MER

  5. 5. Supply chain attacks in open source projects

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Oliver Stussi; David Uhler Brand; [2022]
    Nyckelord :Technology and Engineering;

    Sammanfattning : The space of open source supply chain attacks is ever evolving and growing. There is extensive previous work identifying and collecting open source supply chain attacks, as well as identifying patterns in these attacks and proving that machine learning models may be able to detect these patterns. LÄS MER