Dissertations / Theses on the topic 'Security analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Security analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Hassan, Aamir, and Fida Mohammad. "Network Security Analysis." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4002.
Full textSecurity is the second step after that a successful network has been deployed. There are many types of attacks that could potentially harm the network and an administrator should carefully document and plan the weak areas, where the network could be compromised. Attackers use special tools and techniques to find out all the possible ways of defeating the network security. This thesis addresses all the possible tools and techniques that attackers use to compromise the network. The purpose for exploring these tools will help an administrator to find the security holes before an attacker can. All of these tools in this thesis are only for the forensic purpose. Securing routers and switches in the best possible way is another goal. We in this part try to identify important ways of securing these devices, along with their limitations, and then determine the best possible way. The solution will be checked with network vulnerable tools to get the results. It is important to note that most of the attention in network security is given to the router, but far less attention is given to securing a switch. This thesis will also address some more ways of securing a switch, if there is no router in the network.
The opponent for the thesis was Yan Wang and the presentation time was 60 minutes.
Chivers, Howard Robert. "Security design analysis." Thesis, University of York, 2006. http://etheses.whiterose.ac.uk/9885/.
Full textFadil, Yousra Ahmed. "Security analysis of steganalyzers." Thesis, Bourgogne Franche-Comté, 2017. http://www.theses.fr/2017UBFCD015/document.
Full textIn the recent time, the field of image steganalysis and steganography became more important due to the development in the Internet domain. It is important to keep in mind that the whole process of steganography and steganalysis can be used for legal or illegal operations like any other applications. The work in this thesis can be divided inthree parts. The first one concentrates on parameters that increase the security of steganography methods against steganalysis techniques. In this contribution the effect of the payload, feature extractions, and group of images that are used in the learning stage and testing stage for the steganalysis system are studied. From simulation, we note that the state of the art steganalyzer fails to detect the presence of a secret message when some parameters are changed. In the second part, we study how the presence of many steganography methods may influence the detection of a secret message. The work takes into consideration that there is no ideal situation to embed a secret message when the steganographier can use any scheme with any payloads. In the third part, we propose a method to compute an accurate distortion map depending on a second order derivative of the image. The second order derivative is used to compute the level curve and to embed the message on pixels outside clean level curves. The results of embedding a secret message with our method demonstrate that the result is acceptable according to state of the art steganography
Duan, Shuwen. "Security Analysis of TETRA." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-23055.
Full textMarceau, Richard J. "Mechanizing dynamic security analysis." Thesis, McGill University, 1993. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=41244.
Full textA taxonomy of dynamic security analysis in operations planning is proposed employing the semantic net, class-object-property and rule paradigms. All of these are required to cover the full spectrum of knowledge found in the high-level goals, the process details, the complex conditional structures and the acceptance criteria which characterize dynamic security analysis. This taxonomy also describes the language of operations planners, defining not only the features presently supported by ELISA, but also providing a roadmap to future enhancements. Typical sensitivity studies are presented using a 700-bus production model of the Hydro-Quebec network to illustrate the considerable leverage afforded from using ELISA-like software.
In addition, the thesis addresses the issue of how such tools can assist in performing research to improve our understanding of fundamental power systems behaviour. Using the ELISA prototype as a laboratory test bed, it is shown that the signal energy E of a network's transient response acts as a barometer to define the relative severity of any normal contingency with respect to power generation or transfer P. For a given contingency, as P is varied and the network approaches instability, signal energy increases smoothly and predictably towards an asymptote which defines the network's stability limit: This limit, in turn, permits us to compare the severity of different contingencies. This behaviour can be explained in terms of the effect of increasing power on the damping component of dominant poles, and a simple function is derived which estimates network stability limits with surprising accuracy from two or three stable simulations.
As a corollary to this, it is also shown that a network's transient response can be screened for instability using a simple frequency-domain criterion. Essentially, this criterion requires performing the Fourier transform of a network's transient voltage response at various monitoring locations: When P is varied and the network goes beyond its stability limit, the angle of the Fourier transform's polar plot fundamentally changes its behaviour, passing from a clockwise to a counterclockwise rotational behaviour about the origin. This is confirmed by results obtained from performing stability-limit searches on the Hydro-Quebec system. Used in conjunction with signal energy analysis for determining stability limit proximity, this criterion can be quite useful for mechanized security-limit-determination tools such as ELISA.
Signal energy limit estimation and the proposed stability criterion are shown to be applicable to all normal contingencies and these results hold not-withstanding the presence of many active, nonlinear elements in the network.
Huang, Emily Yujie. "Security Analysis: Meritage Homes." Thesis, The University of Arizona, 2014. http://hdl.handle.net/10150/320159.
Full textWang, Mandy Huaman. "Security Analysis: Meritage Homes." Thesis, The University of Arizona, 2014. http://hdl.handle.net/10150/322089.
Full textRimando, Ryan A. "Development and analysis of security policies in security enhanced Android." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27896.
Full textTian, Ke. "Learning-based Cyber Security Analysis and Binary Customization for Security." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/85013.
Full textPh. D.
Donta, Praveen Kumar. "Performance Analysis of Security Protocols." UNF Digital Commons, 2007. http://digitalcommons.unf.edu/etd/172.
Full textCorin, Ricardo Javier. "Analysis models for security protocols." Enschede : University of Twente [Host], 2006. http://doc.utwente.nl/50892.
Full text何振林 and Albert Ho. "Chaos theory and security analysis." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1991. http://hub.hku.hk/bib/B31264931.
Full textLin, Amerson H. "Automated analysis of security APIs." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33295.
Full textIncludes bibliographical references (p. 123-124).
Attacks on security systems within the past decade have revealed that security Application Programming Interfaces (APIs) expose a large and real attack surface but remain to be a relatively unexplored problem. In 2000, Bond et al. discovered API- chaining and type-confusion attacks on hardware security modules used in large banking systems. While these first attacks were found through human inspection of the API specifications, we take the approach of modeling these APIs formally and using an automated-reasoning tool to discover attacks. In particular, we discuss the techniques we used to model the Trusted Platform Module (TPM) v1.2 API and how we used OTTER, a theorem-prover, and ALLOY, a model-finder, to find both API- chaining attacks and to manage API complexity. Using ALLOY, we also developed techniques to capture attacks that weaken, but not fully compromise, a system's security. Finally, we demonstrate a number of real and "near-miss" vulnerabilities that were discovered against the TPM.
by Amerson H. Lin.
M.Eng.and S.B.
Persman, Pontus, and Sebaztian Öjebrant. "Security analysis of a smartlock." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302411.
Full textMarknaden för Internet of Things (IoT) har expanderats och varieteten såväl som kvantiteten av IoT enheter har snabbt ökat. Som också för mer sig nya säkerhetshot då nya sårbarheter hittas i IoT enheter. Ett område där dessa enheter används är i smart hem och där smarta lås speciellt behöver designas på ett säkert sätt. Den här studien har som syfte att bedöma säkerheten av ett smart lås. Först presenterar vi en bakgrund vilket inkulderar hotmodellering och tidigare hittade sårbarheter. Sedan en metod del för de olika attacker utförda såväl som resultat av att utföra dem. Slutligen, en diskussion där vi bedömer säkerhetsimplikationerna av resultaten hittade. Slutsatsen från resultaten är att det smarta låset visar på sårbarheter i dess design. Speciellt i sitt kryptering av filsystemet, motstånd till störnings attacker och varaktigheten av tillgång som beviljat till gäster.
Friman, Nelly. "Security Analysis of Smart Buildings." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279423.
Full textPå senare år har fastigheter utvecklats till att bli mer automatiserade för att matcha efterfrågan påenergieffektiva och hållbara bostäder. Fastighetslösningarna (Building Management Systems,BMS), såsom värme- eller passersystem, blir gradvis mer automatiserade. Nästa steg är att integreraalla BMS i en byggnad till ett gemensamt system, som då kallas för en smart fastighet. Medanbyggnader blir alltmer automatiserade, växer oron kring cybersäkerhet eftersom man delsintegrerar ett stort antal Internet of Things (IoT)-enheter med systemet och samtidigt automatiserarmånga kritiska fastighetslösningar. I värsta fall skulle därför en utomstående attack kunna leda tillfysisk skada på fastigheter eller personer som befinner sig där.I denna studie utförs en säkerhetsanalys där dessa hot och risker analyseras med hjälp av enhotmodellering. Målet är att identifiera och analysera potentiella hot och risker för smartafastigheter, med syftet att ge insikt i hur man bör säkra dessa system. Modelleringen innehåller femfaser, av vilka denna studie fokuserar på fas ett och tre. I första fasen identifieras vilka förluster somfinns för företag och boende efter en framgångsrik attack och i fas tre identifieras angriparnas måloch avsikter för specifika attacker.Ett resultat av säkerhetsanalysen är att av de potentiella hot som definierats, är de medhögsta antalet försök till attack per år (Threat Event Frecquency, TEF) dataläckage och attinaktivera värmesystemet. Några sårbarheter med smarta fastigheter och rekommendationer för attförbättra systemet diskuteras också. Att utveckla säkra system till smarta fastigheter är av störstavikt för att personer kan fortsätta bo och arbeta i hållbara, pålitliga och säkra byggnader.
Ho, Albert. "Chaos theory and security analysis /." [Hong Kong] : University of Hong Kong, 1991. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13055227.
Full textKeffeler, Bryce Thomas. "Security Investment Analysis: Meritage Homes." Thesis, The University of Arizona, 2014. http://hdl.handle.net/10150/320203.
Full textYoung, Jared Jeffrey. "Security Investment Analysis: Meritage Homes." Thesis, The University of Arizona, 2014. http://hdl.handle.net/10150/322109.
Full textMartinez, Salvador. "Automatic reconstruction and analysis of security policies from deployed security components." Phd thesis, Ecole des Mines de Nantes, 2014. http://tel.archives-ouvertes.fr/tel-01065944.
Full textAlexander, James. "Promoting security imaginaries : an analysis of the market for everyday security solutions." Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/promoting-security-imaginaries-an-analysis-of-the-market-for-everyday-security-solutions(1dc57433-40f6-40c1-bd13-56ab2347c35a).html.
Full textDobson, Lucas E. "Security analysis of session initiation protocol." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.
Full textThesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
Ballester, Lafuente Carlos. "Security Analysis of Future Internet Architectures." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10910.
Full textBleikertz, Sören. "Automated Security Analysis of Infrastructure Clouds." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10914.
Full textTalic, Ammar. "Security Analysis of Ethernet in Cars." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215329.
Full textMed utvecklingen av avancerade körningsassisterande system har mängden data som behöver sändas inom en bil ökat enormt. Traditionella kommunikationsbussbaserade system kan inte uppfylla dagens krav. Därmed utvecklas och standardiseras Ethernet för fordon. Ethernet har i många år varit de facto-standarden i sammankopplandet mellan datorer. Under den tiden har flera sårbarheter hos nätverksprotokolls implementeringar och protokoll själva upptäckts. Det finns anledning att tro att kunskapen från att utnyttja datanätverk kan tillämpas på fordonsdomänen. Att tillägga är att fordonstillverkare tenderar att genomföra sina egna staplar. På grund av copyleft skäl, ökar chanserna för implementeringsfel i motsats till att använda testade open source-lösningar. Eftersom människors säkerhet hos bilar är extremt viktigt, måste även dess system hanteras ordentligt. Denna avhandling undersöker säkerheten för Ethernet och kompletterande protokoll hos bilar. Den börjar med en introduktion till datorers och bilars nätverk och protokoll. Efter en stabil grund fastställts, undersöker den vad som utgör Ethernet hos bilar, dess tillämpning inom fältet, och de bilspecifika komponenterna den beror av. Efter att ha tittat på relaterat arbete utförs en säkerhetsgranskning och analys av datanätverk som definieras av säkerhetsmetoden för open-source. Systemet värderas med riskbedömningsvärden. Svaga punkter identifieras och förbättringar föreslås. Effekten av de föreslagna förbättringarna framgår utav omvärdering av systemet och omräkning av riskbedömningsvärdena. Dessa bedömningar leder till det yttersta målet för ökad säkerhet för alla trafikanter.
Araya, Cristian, and Manjinder Singh. "Web API protocol and security analysis." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.
Full textDet finns ett problem i dagens samhälle gällande att varje företag har sin egen kundportal. Detta problem kan lösas genom att skapa en plattform som samlar alla kundportaler på samma plats. För en sådan plattform krävs det ett web API protokoll som är snabb, säker och har kapacitet för många användare. Därför har en undersökning om olika web API protokolls prestanda samt säkerhetstester gjorts. Arbetet gick ut på att ta reda på vilket web API protokoll som erbjuder hög säkerhet och hög prestanda i form av svarstid både vid låg och hög belastning. Det ingick också i arbetet att göra en undersökning av tidigare arbeten för att ta reda på om eventuella protokoll kunde uteslutas. Under arbetet utvecklades också plattformens backend som implementerade de olika web API protokollen för att sedan kunna utföra tester på dessa. Testerna som utfördes var svarstid både med och utan belastning, uppkopplingstid samt belastning. Resultaten analyserades och visade att protokollen hade både för- och nackdelar. Avslutningsvis valdes ett protokoll som var lämpad för plattformen eftersom den hade hög säkerhet samt snabbast uppkopplingstid. Dessutom påverkades inte servern negativt av antalet uppkopplingar. Reactive REST valdes som web API protokoll för denna plattform.
Zhang, Zhonghua. "Algorithms for power system security analysis." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0025/MQ51827.pdf.
Full textAli, Dana, and Goran Kap. "Statistical Analysis of Computer Network Security." Thesis, KTH, Matematisk statistik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-129948.
Full textKavuluru, Ramakanth. "ANALYSIS OF SECURITY MEASURES FOR SEQUENCES." UKnowledge, 2009. http://uknowledge.uky.edu/gradschool_diss/735.
Full textHuang, Enyang. "Automated security analysis of payment protocols." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/78140.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 173-182).
Formal analyses have been used for payment protocol design and verification but, despite developments in semantics and expressiveness, previous literature has placed little emphasis on the automation aspects of the proof systems. This research develops an automated analysis framework for payment protocols called PTGPA. PTGPA combines the techniques of formal analysis as well as the decidability afforded by theory generation, a general-purpose framework for automated reasoning. A comprehensive and self-contained proof system called TGPay is first developed. TGPay introduces novel developments and refinements in the formal language and inference rules that conform to the prerequisites of theory generation. These target desired properties in payment systems such as confidentiality, integrity, authentication, freshness, acknowledgement and non-repudiation. Common security primitives such as encryption, decryption, digital signatures, message digests, message authentication codes and X.509 certificates are modeled. Using TGPay, PTGPA performs analyses of payment protocols under two scenarios in full automation. An Alpha-Scenario is one in which a candidate protocol runs in a perfect environment without attacks from any intruders. The candidate protocol is correct if and only if all pre-conditions and post-conditions are met. PTGPA models actions and knowledge sets of intruders in a second, modified protocol that represents an attack scenario. This second protocol, called a Beta-Scenario, is obtained mechanically from the original candidate protocol, by applying a set of elementary capabilities from a Dolev-Yao intruder model. This thesis includes a number of case studies to demonstrate the feasibility and benefits of the proposed framework. Automated analyses of real-world bank card payment protocols as well as newly proposed contactless mobile payment protocols are presented. Security flaws are identified in some of the protocols; their causes and implications are addressed.
by Enyang Huang.
Ph.D.in the Field of Computer Engineering
Kang, Eunsuk. "Multi-representational security modeling and analysis." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/103738.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 103-109).
Many security attacks arise from unanticipated behaviors that are inadvertently introduced by the system designer at various stages of the development. This thesis proposes a multi-representational approach to security modeling and analysis, where models capturing distinct (but possibly overlapping) views of a system are automatically composed in order to enable an end-to-end analysis. This approach allows the designer to incrementally explore the impact of design decisions on security, and discover attacks that span multiple layers of the system. The thesis also introduces Poirot, a prototype implementation of the approach, and reports on the application of Poirot to detect previously unknown security flaws in publicly deployed systems.
by Eunsuk Kang.
Ph. D.
Baldwin, Robert W. (Robet William). "Rule based analysis of computer security." Thesis, Massachusetts Institute of Technology, 1987. http://hdl.handle.net/1721.1/14592.
Full textIncludes bibliographical references.
Supported by the Defense Advanced Research Projects Agency of the Department of Defense, monitored by the Office of Naval Research. N00014-83-K-0125
by Robert W. Baldwin.
Ph.D.
Askeli, D. (Daniel). "Data collection for software security analysis." Master's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201606072460.
Full textInternet tarjoaa valtavan määrän vapaasti saatavilla olevia datalähteitä. Näiden datalähteiden yhdistäminen on mielenkiintoista, sillä siten voidaan saada enemmän tietoa kuin erillisistä tietolähteistä. Lisäksi nykyiset avoimen lähdekoodin projekteja suosivat suuntaukset antavat mielenkiintoisen kehyksen tietoturvaanalyysille. Jotta dataa voidaan käyttää, pitää se kuitenkin ensin kerätä. Tässä työssä esitetään dokumenttisuuntautunut aikasarjadatan keräämiseen tarkoitettu ohjelmistokehys. Kehys sisältää ominaisuuksia, jotka tekevät datan keräämisestä helpompaa verrattuna aikaisempiin ohjelmistoratkaisuihin. Kehystä käytetään datan keräämiseen kahdesta suositusta avoimen lähdekoodin projektista ja niihin liittyvistä haavoittuvuusdatalähteistä. Kerättyä dataa käytetään haavoittuvuuksien paikan selvittämiseen, minkä jälkeen ne visualisoidaan. Tulokset osoittavat, että tietolähteitä yhdistämällä voidaan saada lisäarvoa tietoturva-analyysissa
Gerault, David. "Security analysis of contactless communication protocols." Thesis, Université Clermont Auvergne (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.
Full textHsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.
Full textKhatwani, Chanchal. "Security Analysis of ECC Based Protocols." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/734.
Full textGoktepe, Meftun. "Windows XP Operating System security analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FGoktepe.pdf.
Full textThesis advisor(s): Richard Harkins, Cynthia Irvine. Includes bibliographical references (p. 105-107). Also available online.
Olunuga, Adetunji A. "Profile Analysis of Mobile Application Security." UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/835.
Full textHong, Jin Bum. "Scalable and adaptable security modelling and analysis." Thesis, University of Canterbury. Computer Science and Software Engineering, 2015. http://hdl.handle.net/10092/10246.
Full textRieke, Roland [Verfasser], and Bernd [Akademischer Betreuer] Freisleben. "Security Analysis of System Behaviour - From "Security by Design" to "Security at Runtime" - / Roland Rieke. Betreuer: Bernd Freisleben." Marburg : Philipps-Universität Marburg, 2015. http://d-nb.info/1064976417/34.
Full textConway, Jared Thomas. "Security and the Offshore Nuclear Plant (ONP) : security simulation testing and analysis of the multi-layer security system." Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/122502.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 94-96).
The ONP research team from the Nuclear Science and Engineering Department at MIT has been researching and developing the possibility of a nuclear reactor deployed on an offshore platform out to sea. Such a reactor deployed up to twelve nautical miles offshore poses a significant security risk that needs to be addressed. Through the studies of MIT graduate Vince Kindfuller, a security plan was proposed in the ICONE24-61029 paper of 2016. This research aims to investigate the effectiveness of the proposed security plan for the ONP-300 and ONP-1100 through the use of a simulation software developed by ARES Corporation, to expand on the security plan to include a response to nonviolent adversaries, and to alter the security plan and plant design as necessary to increase the effectiveness of the security configuration while limiting expenses.
Initially, different attack scenarios were investigated and four design-basis threats (DBT) were formulated based on knowledge from industry professionals. Through the use of ARES software, results indicated that the initial platform design for the ONP 300 led to major line-of-sight issues for security officers on the top deck of the plant causing performance below the minimum acceptable level. This realization led to changes in the ONP 300's security configuration and structural layout. Upon development of a platform layout that maximized security performance, a sensitivity analysis was conducted on the following aspects of the security plan: size of the adversary force, size of the guard force, and use of a hostile insider attack. The results of sensitivity analysis proved sufficient to lower the anticipated number of guard positions from 10 to 5 with 5.2 security officers per position to maintain watch at all times. This corresponds to a significant reduction in operational costs.
Sensitivity analysis also indicated that functioning radar is the key to success for security. This analysis concluded with blast analysis to determine the location of the physical barrier which should be placed about 250 m from the ONP and an overview of ONP-1100 security performance with five guard positions. The major contribution of this work is therefore two-fold: First, implementation of security-enhancing features have been accomplished at the very early stage of the ONP design when innovative features can be best identified and implemented in a cost-effective manner. Second, application of a Monte Carlo numerical tool has allowed confirmation of the effectiveness of the design to defeat a wide range of intruder scenarios under a variation of different situations proving the robustness of the security design.
by Jared Thomas Conway.
S.B.
S.B. Massachusetts Institute of Technology, Department of Nuclear Science and Engineering
Jud, Petra. "A Swiss Tale of Security : Critical Analysis of Switzerland’s Federal Council’s Security Narrative." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9666.
Full textSzreder, Mikael. "IoT Security in Practice : A Computer Security Analysis of the IKEA “TRÅDFRI” Platform." Thesis, Linköpings universitet, Informationskodning, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161042.
Full textLi, Louis. "Security Analysis of Java Web Applications Using String Constraint Analysis." Thesis, Harvard University, 2015. http://nrs.harvard.edu/urn-3:HUL.InstRepos:14398534.
Full textFiring, Tia Helene. "Analysis of the Transport Layer Security protocol." Thesis, Norwegian University of Science and Technology, Department of Mathematical Sciences, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10025.
Full textIn this master thesis we have presented a security analysis of the TLS protocol with particular emphasis on the recently discovered renegotiation attack. From our security proof we get that the Handshake protocol with renegotiation, including the fix from IETF, is secure, and hence not vulnerable to the renegotiation attack anymore. We have also analysed the Handshake protocol with session resumption, and the Application data protocol together with the Record protocol. Both of these protocols were deemed secure as well. All the security proofs are based on the UC (Universal Composability) security framework.
Persson, Daniel, and Dejan Baca. "Software Security Analysis : Managing source code audit." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3615.
Full textTang, Han. "Security analysis of a cyber-physical system." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.umr.edu/thesis/pdf/Tang_09007dcc803cfb5c.pdf.
Full textVita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed November 30, 2007) Includes bibliographical references (p. 55-57).
Herron, Jennifer F., and Gregory Santiago. "Analysis of security contractors in deployed environments." Monterey, California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/10073.
Full textThe unexpected strength of the Iraq insurgency has created an unstable and unsafe environment that makes it difficult for the U.S. forces to operate and transfer security responsibilities to the new Iraqi government. To deal with this issue, the Department of Defense (DoD) has deemed it necessary to increase the role of private military contractors, rather then increasing the total number of military troops on the ground. Several dilemmas arise contractually when you hire privatized military firms to conduct military functions. This Masters of Business Administration (MBA) project will analyze consequences of the DoD decision to outsource security contractors in Iraq. Specifically, we will look at the contracting and legal ramifications of outsourcing this inherently governmental occupation. Our research will 1) Discuss the strengths and weaknesses of the government's decision to outsource commercial contractors for security force operations in Iraq, 2) Identify and discuss any potential trends that impact contractual and legal issues involving security force contractors, 3) Lay the foundation and provide recommendations for future analysis of relations between security force contractors and the government.
Cho, Sungback. "Risk analysis and management for information security." Thesis, Royal Holloway, University of London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.404796.
Full textKreibich, Christian Peter. "Structural traffic analysis for network security monitoring." Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613090.
Full textUmsonst, David. "Security Analysis of Control System Anomaly Detectors." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-196361.
Full textAnomalidetektorer i styrsystem används normalt för att detektera systemfel och de är oftast baserade på en analytisk systemmodell vilken genererar residualsignaler för att upptäcka felen. Detektorerna är oftast konstruerade för att upptäcka slumpmässigt förekommande fel och inte samordnade angrepp på systemet. Därför utvärderas här tre olika anomalidetektorer: en detektor som en-bart grundar sig på den senaste residualen, en som är baserad på multi-variat exponentiellt viktat glidande medelärde och en kumulativ summa. I utvärderingen undersöker vi vilken detektor som mest begränsar en attack i form av en datainjektion. Av denna anledning formuleras optimala styrproblem för att karakterisera den värsta attacken för de olika anomalidetektorerna, vilket leder till ickekonvexa optimeringsproblem. Relaxeringar till konvexa problem föreslås och löses numeriskt och i särskilda fall även analytiskt. Detektorerna jämförs genom att lösa de optimala styrproblem för ett simuleringsexempel såväl som för en riktig fyrtanksprocess. Både simuleringar och experiment visar att den kumulativa summan är den detektor som begränsar de studerade attackerna mest.