Sökning: "skadlig kod"

Visar resultat 1 - 5 av 27 uppsatser innehållade orden skadlig kod.

  1. 1. Detektionsmetoder för skadlig kod i IoT-baserat smart hem : En systematisk litteraturstudie

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :William Saxmark; [2023]
    Nyckelord :Malware; botnet; detection; IoT; smart home; methods; Skadlig kod; botnät; detektion; IoT; smarta hem; metoder;

    Sammanfattning : IoT devices are being widely deployed within smart homes. Most of these devices are mass-produced at a low cost. As a result, due to the lack of security mechanisms, IoT devices become vulnerable to malware. LÄS MER

  2. 2. GitBark : A Rule-Based Framework for Maintaining Integrity in Source Code Repositories

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Elias Bonnici; [2023]
    Nyckelord :Source Code Integrity; Version Control System; Git; Threat modeling; Digital signatures; Källkodsintegritet; Versionshanteringssystem; Git; Hotmodellering; Digitala signaturer;

    Sammanfattning : In today’s digital landscape, maintaining the integrity of source code is crucial for delivering reliable and trustworthy software solutions. However, the increasing prevalence of attacks targeting source code repositories and version control systems (VCSs) poses significant challenges to source code integrity. LÄS MER

  3. 3. Testing the Security of a Kubernetes Cluster in a Production Environment

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Francesco Giangiulio; Sébastien Malmberg; [2022]
    Nyckelord :Kubernetes; AKS; Security; Omnia; Kubernetes; AKS; Säkerhet; Omnia;

    Sammanfattning : Enterprise grade Kubernetes solutions which are offered by large corporations like Microsoft have become very popular in the most recent years. To protect the integrity of customer information, which resides on shared resources in the Kubernetes cloud, adequate security measures need to be in place. LÄS MER

  4. 4. Utilizing user centered design to mitigate security threats

    Master-uppsats, Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Författare :Emmy Edfors; Albin Sverreson; [2022]
    Nyckelord :Educational reminders; Posters; Phishing; Security Education; STRIDE; Threat Modeling; User Centered Design; Technology and Engineering;

    Sammanfattning : As technology advances and is more and more intertwined with our everyday lives, the security of these systems becomes very important. Abraham Maslow famously put safety needs as the second level of his hierarchy of needs, its importance second only to physical needs such as air, food and sleep. LÄS MER

  5. 5. Decompilation of WebAssembly using Datalog

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Love Brandefelt; [2022]
    Nyckelord :Datalog; Decompiler; WebAssembly; Logic programming; Bytecode; Datalog; Dekompilator; WebAssembly; Logic programming; Bytecode;

    Sammanfattning : With 92% of today’s browsers supporting WebAssembly the need for decompilers to discover malicious code is greater than ever. The introduction of the Datalog to C++ compiler Soufflé, in 2016, enables the implementation of effective Datalog-based decompilers. LÄS MER