Sökning: "skadlig kod"
Visar resultat 1 - 5 av 27 uppsatser innehållade orden skadlig kod.
1. Detektionsmetoder för skadlig kod i IoT-baserat smart hem : En systematisk litteraturstudie
Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologiSammanfattning : IoT devices are being widely deployed within smart homes. Most of these devices are mass-produced at a low cost. As a result, due to the lack of security mechanisms, IoT devices become vulnerable to malware. LÄS MER
2. GitBark : A Rule-Based Framework for Maintaining Integrity in Source Code Repositories
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : In today’s digital landscape, maintaining the integrity of source code is crucial for delivering reliable and trustworthy software solutions. However, the increasing prevalence of attacks targeting source code repositories and version control systems (VCSs) poses significant challenges to source code integrity. LÄS MER
3. Testing the Security of a Kubernetes Cluster in a Production Environment
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Enterprise grade Kubernetes solutions which are offered by large corporations like Microsoft have become very popular in the most recent years. To protect the integrity of customer information, which resides on shared resources in the Kubernetes cloud, adequate security measures need to be in place. LÄS MER
4. Utilizing user centered design to mitigate security threats
Master-uppsats, Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och DesignSammanfattning : As technology advances and is more and more intertwined with our everyday lives, the security of these systems becomes very important. Abraham Maslow famously put safety needs as the second level of his hierarchy of needs, its importance second only to physical needs such as air, food and sleep. LÄS MER
5. Decompilation of WebAssembly using Datalog
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : With 92% of today’s browsers supporting WebAssembly the need for decompilers to discover malicious code is greater than ever. The introduction of the Datalog to C++ compiler Soufflé, in 2016, enables the implementation of effective Datalog-based decompilers. LÄS MER