To see the other types of publications on this topic, follow the link: Security Vulnerabilities.

Dissertations / Theses on the topic 'Security Vulnerabilities'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security Vulnerabilities.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Xenitellis, Simeon. "On the identification of security vulnerabilities." Thesis, Royal Holloway, University of London, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.538785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sandgren, Per. "Security Assessment and *nix Package Vulnerabilities." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16723.

Full text
Abstract:
Background. Vulnerabilities in software provides attackers with the means to fulfill unlawful behavior. Since software has so much power, gaining control over vulnerabilities can mean that an attacker gains unauthorized powers. Since vulnerabilities are the keys that let attackers attack, vulnerabilities must be discovered and mitigated. Scanning vulnerable machines is not enough, and scanning data results must be parsed to prioritize vulnerability mitigation and conduct security assessment. Objectives. Creating a parser is the first objective, a tool that takes in input, filters it and gives out
APA, Harvard, Vancouver, ISO, and other styles
3

Borstad, Ole Gunnar. "Finding Security Patterns to Countermeasure Software Vulnerabilities." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8850.

Full text
Abstract:
<p>Software security is an increasingly important part of software development as the risk from attackers is constantly evolving through increased exposure, threats and economic impact of security breaches. Emerging security literature describes expert knowledge such as secure development best practices. This knowledge is often not applied by software developers because they lack security awareness, security training and secure development methods and tools. Existing methods and tools require too much effort and security is often given less priority in the trade-off between functionality and s
APA, Harvard, Vancouver, ISO, and other styles
4

Larsson, Josephine, and Ida Waller. "Security in wireless networks : Vulnerabilities and Countermeasures." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2380.

Full text
Abstract:
The market for wireless networks has increased over the years, more and more organizations implement this technology. The need to work flexible, convenient and cost-effective are three reasons for the technology’s raised popularity. The use of wireless networks has exposed new aspects of network security. The information is no longer dependent on wires because it can be transmitted trough radio waves instead. The exposure of information increases, therefore also the vulnerabilities. This leads to more security problems related to the exposure of the transmitted information. It is difficult to
APA, Harvard, Vancouver, ISO, and other styles
5

Rahimi, Sanaz. "SECURITY VULNERABILITIES: DISCOVERY, PREDICTION, EFFECT, AND MITIGATION." OpenSIUC, 2013. https://opensiuc.lib.siu.edu/dissertations/696.

Full text
Abstract:
Security vulnerabilities pose a real threat to computing systems ranging from personal computers to mobile devices and critical systems. Quantification and prediction of vulnerabilities allows us to compare systems, orient and plan to mitigate vulnerabilities, and design reliable and secure systems. In this dissertation, the software Vulnerability Discovery Models (VDMs) are studied and it is illustrated that they cannot provide accurate vulnerability prediction even with large amount of historical vulnerability data. We then propose and study a scheme that incorporates software properties suc
APA, Harvard, Vancouver, ISO, and other styles
6

Liaqat, Imran. "Vulnerabilities in Security Products for Computers 2006-2008." Thesis, Linköping University, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-19472.

Full text
Abstract:
<p>Vulnerabilities are rapidly increasing everyday, posing a major threat to security products. It is due to the flaws in the software during development and human negligence. Even if we are able to find the source, it is not easy to get rid of them with the dramatic discovery of threats exposed every month. Defending against attacks, we need to understand the vulnerabilities in a large scale. The security products, which are being told to provide security, contain a lot of vulnerabilities giving a headache to the security vendors around the globe.</p><p>Information security breaches are incre
APA, Harvard, Vancouver, ISO, and other styles
7

Taylor, Barry. "Identitying vulnerabilities and controls in complex composite security architectures." Thesis, University of Aberdeen, 2014. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757.

Full text
Abstract:
The ability to design and reason about architectures (here understood as organisations which are designed according to hierarchies of roles and those processes that link them) which co-exist and interact within complex environments is of increasing importance. With the introduction of more interconnected technology affecting the way in which stakeholders manage information and conduct their operations, the need for such a capability is clear. Current approaches either address this issue with a mathematical approach which presents an obstacle to most non-specialist analysts, or they choose not
APA, Harvard, Vancouver, ISO, and other styles
8

Morris, Joseph C. "Identifying potential vulnerabilities in software designs." Virtual Press, 2007. http://liblink.bsu.edu/uhtbin/catkey/1380105.

Full text
Abstract:
Software engineers currently rely on lengthy source code reviews, testing, and static analysis tools to attempt identification of software vulnerabilities. While these are sometimes effective, the methods used are limited and don't catch all security vulnerabilities.Work has been done in identifying areas of software prone to failure through a design metrics approach, and with success. This study aims to extend this idea to software security. The premise of this thesis is that the set of security vulnerabilities overlaps (or may be a subset of) the overall set of software bugs and failures. It
APA, Harvard, Vancouver, ISO, and other styles
9

Gaboriau-Couanau, Clément. "Security of Embedded Software : An Analysis of Embedded Software Vulnerabilities and Related Security Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215703.

Full text
Abstract:
The increased use of computer systems for storing private data or doing critical operations leads to some security issues gathered in the area cybersecurity. This neologism leads people to think about the security of information systems and general-purpose computers. However, with the growth of the Internet of Things, embedded systems are also concerned with these issues. The speed of development of this area often leads to a backwardness in the security features. The thesis investigates the security of embedded systems by focusing on embedded software. After classifying the vulnerabilities wh
APA, Harvard, Vancouver, ISO, and other styles
10

Tevis, Jay-Evan J. Hamilton John A. "Automatic detection of software security vulnerabilities in executable program files." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/doctoral/TEVIS_JAY-EVAN_36.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Window, Marc. "Security in Precision Agriculture : Vulnerabilities and risks of agricultural systems." Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Lee, Jae Hyung S. M. Massachusetts Institute of Technology. "Systematic approach to analyzing security and vulnerabilities of blockchain systems." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121793.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019<br>Cataloged from PDF version of thesis. Page 150 blank.<br>Includes bibliographical references (pages 119-149).<br>Recent hacks into blockchain systems and heists from such systems have raised serious questions about whether this new technology can be secured from ongoing, evolving cyberattacks. While the technology is known to provide an environment that is fundamentally safer than other existing centralized systems offer, security professionals warn that the current
APA, Harvard, Vancouver, ISO, and other styles
13

Demissie, Biniam Fisseha. "Security Testing of Permission Re-delegation Vulnerabilities in Android Applications." Doctoral thesis, Università degli studi di Trento, 2019. https://hdl.handle.net/11572/367794.

Full text
Abstract:
Smartphones play an important role in our daily lives. Once used only for communication purposes are now also used for several day-to-day activities ranging from social media and entertainment to privacy sensitive operations such as data storage, fitness tracking, mobile banking and sending/receiving business e-mails. This is achieved thanks to the several smartphone applications (apps) that are available. One of the most popular smartphone operating systems is Android. As of now, there are more than 3 million apps for Android. The Android platform facilitates reuse of apps' functionalities by
APA, Harvard, Vancouver, ISO, and other styles
14

Demissie, Biniam Fisseha. "Security Testing of Permission Re-delegation Vulnerabilities in Android Applications." Doctoral thesis, University of Trento, 2019. http://eprints-phd.biblio.unitn.it/3700/1/thesis.pdf.

Full text
Abstract:
Smartphones play an important role in our daily lives. Once used only for communication purposes are now also used for several day-to-day activities ranging from social media and entertainment to privacy sensitive operations such as data storage, fitness tracking, mobile banking and sending/receiving business e-mails. This is achieved thanks to the several smartphone applications (apps) that are available. One of the most popular smartphone operating systems is Android. As of now, there are more than 3 million apps for Android. The Android platform facilitates reuse of apps' functionalities by
APA, Harvard, Vancouver, ISO, and other styles
15

Jo, Arrah-Marie. "Economics of information security and the market for software vulnerabilities." Electronic Thesis or Diss., Institut polytechnique de Paris, 2019. http://www.theses.fr/2019IPPAT003.

Full text
Abstract:
L'environnement cybernétique est devenu un maillon essentiel au fonctionnement de notre société et de nos activités socio-économiques. Cette transformation va de pair avec un changement d’échelle et de portée des menaces de sécurité numérique, qui deviennent d’autant plus nombreuses et plus sophistiquées. Dans un environnement mondialisé où les systèmes sont connectés à de millions d’autres systèmes, les parties prenantes sont engagés dans de multiples interactions stratégiques. Qui doit-on responsabiliser et de quelle manière, afin d’inciter à une gestion efficace de la sécurité ? De quelle f
APA, Harvard, Vancouver, ISO, and other styles
16

Norwood, Charles Ellis. "Demonstration of Vulnerabilities in Globally Distributed Additive Manufacturing." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/99104.

Full text
Abstract:
Globally distributed additive manufacturing is a relatively new frontier in the field of product lifecycle management. Designers are independent of additive manufacturing services, often thousands of miles apart. Manufacturing data must be transmitted electronically from designer to manufacturer to realize the benefits of such a system. Unalterable blockchain legers can record transactions between customers, designers, and manufacturers allowing each to trust the other two without needing to be familiar with each other. Although trust can be established, malicious printers or customers sti
APA, Harvard, Vancouver, ISO, and other styles
17

Pashchenko, Ivan. "Decision Support of Security Assessment of Software Vulnerabilities in Industrial Practice." Doctoral thesis, Università degli studi di Trento, 2019. http://hdl.handle.net/11572/285410.

Full text
Abstract:
Software vulnerabilities are a well-known problem in current software projects. The situation becomes even more complicated, due to the ever-increasing complexity of the interconnections between both commercial and free open-source software (FOSS) projects. In this dissertation, we are aiming to facilitate the security assessment process in an industrial context. We start from the level of the own code of an individual software project, for which we propose a differential benchmarking approach for automatic assessment of static analysis security testing tools. We have demonstrated this approac
APA, Harvard, Vancouver, ISO, and other styles
18

Pashchenko, Ivan. "Decision Support of Security Assessment of Software Vulnerabilities in Industrial Practice." Doctoral thesis, Università degli studi di Trento, 2019. http://hdl.handle.net/11572/285410.

Full text
Abstract:
Software vulnerabilities are a well-known problem in current software projects. The situation becomes even more complicated, due to the ever-increasing complexity of the interconnections between both commercial and free open-source software (FOSS) projects. In this dissertation, we are aiming to facilitate the security assessment process in an industrial context. We start from the level of the own code of an individual software project, for which we propose a differential benchmarking approach for automatic assessment of static analysis security testing tools. We have demonstrated this approac
APA, Harvard, Vancouver, ISO, and other styles
19

Pashchenko, Ivan. "Decision Support of Security Assessment of Software Vulnerabilities in Industrial Practice." Doctoral thesis, Università degli studi di Trento, 2019. https://hdl.handle.net/11572/368392.

Full text
Abstract:
Software vulnerabilities are a well-known problem in current software projects. The situation becomes even more complicated, due to the ever-increasing complexity of the interconnections between both commercial and free open-source software (FOSS) projects. In this dissertation, we are aiming to facilitate the security assessment process in an industrial context. We start from the level of the own code of an individual software project, for which we propose a differential benchmarking approach for automatic assessment of static analysis security testing tools. We have demonstrated this appro
APA, Harvard, Vancouver, ISO, and other styles
20

Pashchenko, Ivan. "Decision Support of Security Assessment of Software Vulnerabilities in Industrial Practice." Doctoral thesis, University of Trento, 2019. http://eprints-phd.biblio.unitn.it/3812/2/Disclaimer.pdf.

Full text
Abstract:
Software vulnerabilities are a well-known problem in current software projects. The situation becomes even more complicated, due to the ever-increasing complexity of the interconnections between both commercial and free open-source software (FOSS) projects. In this dissertation, we are aiming to facilitate the security assessment process in an industrial context. We start from the level of the own code of an individual software project, for which we propose a differential benchmarking approach for automatic assessment of static analysis security testing tools. We have demonstrated this appr
APA, Harvard, Vancouver, ISO, and other styles
21

Fediushyn, O. I., O. O. Yatsiuk, and H. O. Rusanov. "Virtual environment for training auditors with information security." Thesis, ВА ЗС АР; НТУ "ХПІ"; НАУ, ДП "ПДПРОНДІАВІАПРОМ"; УмЖ, 2021. https://openarchive.nure.ua/handle/document/15754.

Full text
Abstract:
The goal of the study is to create a laboratory infrastructure that allows instructors to quickly create virtualized environments for simulating various cyber threats. The testing environment for this demo consists of Windows 10, Ubuntu 16.4, Kali linux and OSSIM. Completed attacks together with potential moves are gathered and put into various attack tree diagrams for analysis so as to find out the most effective attacks against each host.
APA, Harvard, Vancouver, ISO, and other styles
22

Ahmad, Nadeem, and M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.

Full text
Abstract:
Communication of confidential data over the internet is becoming more frequent every day. Individuals and organizations are sending their confidential data electronically. It is also common that hackers target these networks. In current times, protecting the data, software and hardware from viruses is, now more than ever, a need and not just a concern. What you need to know about networks these days? How security is implemented to ensure a network? How is security managed? In this paper we will try to address the above questions and give an idea of where we are now standing with the security o
APA, Harvard, Vancouver, ISO, and other styles
23

Sivaramakrishnan, Hariharan. "On the use of fault injection to discover security vulnerabilities in applications." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3566.

Full text
Abstract:
Thesis (M.S.) -- University of Maryland, College Park, 2006.<br>Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
24

Karabey, Bugra. "Attack Tree Based Information Technology Security Metric Integrating Enterprise Objectives With Vulnerabilities." Phd thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12614100/index.pdf.

Full text
Abstract:
Security is one of the key concerns in the domain of Information Technology systems. Maintaining the confidentiality, integrity and availability of such systems, mandates a rigorous prior analysis of the security risks that confront these systems. In order to analyze, mitigate and recover from these risks a metrics based methodology is essential in prioritizing the response strategies to these risks and also this approach is required for resource allocation schedules to mitigate such risks. In addition to that the Enterprise Objectives must be focally integrated in the definition, impact calcu
APA, Harvard, Vancouver, ISO, and other styles
25

Jaffer, Navin. "Cyber security vulnerabilities during long term evolution power-saving discontinuous reception protocol." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42650.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Long Term Evolution (LTE) is a wireless access communications network that consists of base stations called eNodeBs (eNBs), which allow connectivity between the mobile device or user equipment (UE) and the core network. To save battery power, the UE can turn off its radio transceiver circuitry, based on various parameters exchanged during the attach procedure with its serving eNB, using a protocol called discontinuous reception (DRX). During the DRX period, the UE is still connected to the network and its receiver is turned on periodica
APA, Harvard, Vancouver, ISO, and other styles
26

Fazeen, Mohamed, and Mohamed Issadeen. "Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc700067/.

Full text
Abstract:
Mobile phones are one of the essential parts of modern life. Making a phone call is not the main purpose of a smart phone anymore, but merely one of many other features. Online social networking, chatting, short messaging, web browsing, navigating, and photography are some of the other features users enjoy in modern smartphones, most of which are provided by mobile apps. However, with this advancement, many security vulnerabilities have opened up in these devices. Malicious apps are a major threat for modern smartphones. According to Symantec Corp., by the middle of 2013, about 273,000 Android
APA, Harvard, Vancouver, ISO, and other styles
27

Twisdale, Jerry Allen. "Exploring SME Vulnerabilities to Cyber-criminal Activities Through Employee Behavior and Internet Access." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5428.

Full text
Abstract:
Cybercriminal activity may be a relatively new concern to small and medium enterprises (SMEs), but it has the potential to create financial and liability issues for SME organizations. The problem is that SMEs are a future growth target for cybercrime activity as larger corporations begin to address security issues to reduce cybercriminal risks and vulnerabilities. The purpose of this study was to explore a small business owner's knowledge about to the principal elements of decision making for SME investment into cybersecurity education for employees with respect to internet access and employee
APA, Harvard, Vancouver, ISO, and other styles
28

Sigot, Marine. "Energy security and the EU : between independency priorities, strategic vulnerabilities and sustainability needs." Thesis, Stockholms universitet, Juridiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-96174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Perera, George. "Purposefully manufactured vulnerabilities in U.S. government technology microchips: risks and homeland security implications." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27886.

Full text
Abstract:
CHDS State/Local<br>Government at all levels, industry, military and critical infrastructure, may be at risk due to purposeful manipulation of micro-processing chips during the manufacturing process. Many microchips intentionally provide remote access to allow for monitoring and updating firmware. However, a remote access capability also introduces a vulnerability, which allows others to potentially take control of a system and shut it down remotely, spy, or remove data. If this is in fact occurring, the implications to the national and homeland security could be significant. It does not appea
APA, Harvard, Vancouver, ISO, and other styles
30

Edström, Viktor, and Eldar Zeynalli. "Penetration testing a civilian drone : Reverse engineering software in search for security vulnerabilities." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280096.

Full text
Abstract:
Civilian drones have become more popular in recent years. As an IoT (Internet of Things) device full of state of the art technologies, its level of security is highly relevant. That is why we chose to take a look at the previous research done in the field to see how the attack surface of civilian drones looks. This revealed that drones are especially vulnerable to GPS and WiFi-based attacks. Furthermore, there have also been vulnerabilities discovered in the applications used by different civilian drones. We took a closer look at a certain drone model, DJI Mavic 2 Zoom, by analyzing its intern
APA, Harvard, Vancouver, ISO, and other styles
31

Frazier, Edward Snead. "Assessing Security Vulnerabilities: An Application of Partial and End-Game Verification and Validation." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/31849.

Full text
Abstract:
Modern software applications are becoming increasingly complex, prompting a need for expandable software security assessment tools. Violable constraints/assumptions presented by Bazaz [1] are expandable and can be modified to fit the changing landscape of software systems. Partial and End-Game Verification, Validation, and Testing (VV&T) strategies utilize the violable constraints/assumptions and are established by this research as viable software security assessment tools. The application of Partial VV&T to the Horticulture Club Sales Assistant is documented in this work. Development artif
APA, Harvard, Vancouver, ISO, and other styles
32

Culpepper, Anna M. "Effectiveness of using red-teams to identify maritime security vulnerabilities to terrorist attack." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sept%5FCulpepper.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, Sept. 2004.<br>Thesis advisor(s): Raymond Buettner, Jr., Dorothy Denning. Includes bibliographical references (p. 65-69). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
33

Raymond, David Richard. "Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26629.

Full text
Abstract:
As wireless sensor platforms become less expensive and more powerful, the promise of their wide-spread use for everything from health monitoring to military sensing continues to increase. Like other networks, sensor networks are vulnerable to malicious attack; however, the hardware simplicity of these devices makes defense mechanisms designed for traditional networks infeasible. This work explores the denial-of-sleep attack, in which a sensor nodeâ s power supply is targeted. Attacks of this type can reduce sensor lifetime from years to days and can have a devastating impact on a sensor netwo
APA, Harvard, Vancouver, ISO, and other styles
34

Bazaz, Anil. "A Framework for Deriving Verification and Validation Strategies to Assess Software Security." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/27006.

Full text
Abstract:
In recent years, the number of exploits targeting software applications has increased dramatically. These exploits have caused substantial economic damages. Ensuring that software applications are not vulnerable to the exploits has, therefore, become a critical requirement. The last line of defense is to test before hand if a software application is vulnerable to exploits. One can accomplish this by testing for the presence of vulnerabilities. This dissertation presents a framework for deriving verification and validation (V&V) strategies to assess the security of a software application by te
APA, Harvard, Vancouver, ISO, and other styles
35

Backman, Lars. "Why is security still an issue? : A study comparing developers’ software security awareness to existing vulnerabilities in software applications." Thesis, Linköpings universitet, Programvara och system, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-153438.

Full text
Abstract:
The need for secure web applications grows ever stronger the more sensitive, personal data makes its’ way onto the Internet. During the last decade, hackers have stolen enormous amounts of data from high profile companies and social institutions. In this paper, we answer the question of why security breaches still occur; Why do programmers write vulnerable code? To answer this question, we conducted a case study on a smaller software development company. By performing penetration tests, surveys and interviews we successfully identified several weaknesses in their product and their way of worki
APA, Harvard, Vancouver, ISO, and other styles
36

Huang, Jin. "Detecting Server-Side Web Applications with Unrestricted File Upload Vulnerabilities." Wright State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=wright163007760528389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Hamadi, Ashraf. "Investigating vulnerabilities in a home network with Kali Linux." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-42612.

Full text
Abstract:
The advancement of the internet across the globe has made computer users implement several ways of protection against possible network threats. The goal of this thesis is to analyse vulnerabilities and threats that may occur in a home network and design a vulnerability classification for home users with the help of Kali Linux. The classification is proposed and briefly evaluated. Computer network threats are also examined in this thesis together with the network vulnerabilities and corresponding network security recommendations for these systems. Home users have a need for security and privacy
APA, Harvard, Vancouver, ISO, and other styles
38

Sundqvist, Jonathan. "Reasons for lacking web security : An investigation into the knowledge of web developers." Thesis, Blekinge Tekniska Högskola, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17008.

Full text
Abstract:
Context: With the constantly increasing activity in the internet and its giant rise over the last 18 years, it’s become increasingly important to investigate common problems in web security Objectives: This thesis is made up of a literature study and a survey. It investigates what the common problems in web security are. It also investigates what the average web developer knows, what they think about the state of web security and what they would change. Method: A survey was developed to get information about people’s education levels, previous experience with web security and security breaches
APA, Harvard, Vancouver, ISO, and other styles
39

Graux, Pierre. "Challenges of native android applications : obfuscation and vulnerabilities." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S047.

Full text
Abstract:
Android est le système d'exploitation le plus utilisé et donc, assurer la sécurité des applications est essentiel. Sécuriser une application consiste à empêcher les attaquants potentiels de corrompre le comportement attendu de l'application. En particulier, l'attaquant peut s'appuyer sur des vulnérabilités laissées dans le code par le développeur, mais aussi voler la propriété intellectuelle d'une application existante. Pour ralentir le travail de l'attaquant qui essaie de reverser la logique applicative, le développeur est incité à chercher les vulnérabilités potentielles et à introduire des
APA, Harvard, Vancouver, ISO, and other styles
40

Johnson, Gerald Deawne. "Development of an Audit Classification Index (ACI) for Federal e-learning Systems Security Vulnerabilities." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/187.

Full text
Abstract:
As U.S federal government agencies have increased the use of the Internet to utilize technologies such as e-learning, U.S. federal government information systems have become more exposed to security vulnerabilities that may contribute to system attacks and system exploitation. U.S. federal government agencies are required to come up with their own security solutions for ensuring their information systems are secured, however, security experts are having difficulties identifying what is needed to classify their information systems as secured. The aim of this developmental study is to develop an
APA, Harvard, Vancouver, ISO, and other styles
41

Fisch, Johan, and Carl Haglund. "Using the SEI CERT Secure Coding Standard to Reduce Vulnerabilities." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176409.

Full text
Abstract:
Security is a critical part of every software developed today and it will be even more important going forward when more devices are getting connected to the internet. By striving to improve the quality of the code, in particular the security aspects, there might be a reduction in the number of vulnerabilities and improvements of the software developed. By looking at issues from past problems and studying the code in question to see whether it follows the SEI CERT secure coding standards, it is possible to tell if compliance to this standard would be helpful to reduce future problems. In this
APA, Harvard, Vancouver, ISO, and other styles
42

Ahlberg, Gustav. "Generating web applications containing XSS and CSRF vulnerabilities." Thesis, Linköpings universitet, Databas och informationsteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-111652.

Full text
Abstract:
Most of the people in the industrial world are using several web applications every day. Many of those web applications contain vulnerabilities that can allow attackers to steal sensitive data from the web application's users. One way to detect these vulnerabilities is to have a penetration tester examine the web application. A common way to train penetration testers to find vulnerabilities is to challenge them with realistic web applications that contain vulnerabilities. The penetration tester's assignment is to try to locate and exploit the vulnerabilities in the web application. Training on
APA, Harvard, Vancouver, ISO, and other styles
43

Kotikela, Srujan D. "Secure and Trusted Execution Framework for Virtualized Workloads." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1248514/.

Full text
Abstract:
In this dissertation, we have analyzed various security and trustworthy solutions for modern computing systems and proposed a framework that will provide holistic security and trust for the entire lifecycle of a virtualized workload. The framework consists of 3 novel techniques and a set of guidelines. These 3 techniques provide necessary elements for secure and trusted execution environment while the guidelines ensure that the virtualized workload remains in a secure and trusted state throughout its lifecycle. We have successfully implemented and demonstrated that the framework provides secur
APA, Harvard, Vancouver, ISO, and other styles
44

Corral, Torruella Guiomar. "Consensus and analia: new challenges in detection and management of security vulnerabilities in data networks." Doctoral thesis, Universitat Ramon Llull, 2009. http://hdl.handle.net/10803/9160.

Full text
Abstract:
A mesura que les xarxes passen a ser un element integral de les corporacions, les tecnologies de seguretat de xarxa es desenvolupen per protegir dades i preservar la privacitat. El test de seguretat en una xarxa permet identificar vulnerabilitats i assegurar els requisits de seguretat de qualsevol empresa. L'anàlisi de la seguretat permet reconèixer informació maliciosa, tràfic no autoritzat, vulnerabilitats de dispositius o de la xarxa, patrons d'intrusió, i extreure conclusions de la informació recopilada en el test. Llavors, on està el problema? No existeix un estàndard de codi obert ni un
APA, Harvard, Vancouver, ISO, and other styles
45

Lopez, Bryan S. "An investigation and assessment of Linux Ipchains and its vulnerabilities with respect to network security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA380335.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, June 2000.<br>Thesis advisor, Bernstein, Jr., Raymond F. "June 2000." Includes bibliographical references (p. 123-125). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
46

Kaluarachchi, Pubudu Kalpani. "Cybersecurity: Stochastic Analysis and Modelling of Vulnerabilities to Determine the Network Security and Attackers Behavior." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6862.

Full text
Abstract:
Development of Cybersecurity processes and strategies should take two main approaches. One is to develop an efficient and effective set of methodologies to identify software vulnerabilities and patch them before being exploited. Second is to develop a set of methodologies to predict the behavior of attackers and execute defending techniques based on attacking behavior. Managing of Vulnerabilities and analyzing them is directly related to the first approach. Developing of methodologies and models to predict the behavior of attackers is related to the second approach. Both these approaches are i
APA, Harvard, Vancouver, ISO, and other styles
47

Michel, Hannes, and Emil Christensson. "Framework For Enabling Structured Communication of Security Vulnerabilities in the Production Domain in Industry 4.0." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85475.

Full text
Abstract:
As industries are increasingly adapting to new technological trends for data collection and production efficiency, they are fulfilling the description of being part of the industry 4.0 (I4.0) paradigm. This swift development has led to unforeseen consequences concerning managerial and strategic aspects of security. In addition, threats and sophisticated attacks have increased, emphasizing a greater demand for information security management in the industrial setting. For smaller industrial manufacturers, information security management is not always available due the cost of resources, placing
APA, Harvard, Vancouver, ISO, and other styles
48

Berges, Paul Martin. "Exploring the Vulnerabilities of Traffic Collision Avoidance Systems (TCAS) Through Software Defined Radio (SDR) Exploitation." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/90165.

Full text
Abstract:
Traffic Collision Avoidance Systems (TCAS) are safety-critical systems that are deployed on most commercial aircraft in service today. However, TCAS transactions were not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft arbitrary radio signals, attackers today have access to open-source digital signal processing software like GNU Radio and inexpensive Software Define Radios (SDR). Therefore, this thesis presents motivation through analytical and experimental means for more investigation into TCAS from a security perspective. M
APA, Harvard, Vancouver, ISO, and other styles
49

Wanderydz, Kristoffer. "WEB APPLICATION SECURITY IN THE JAVA ENVIRONMENT." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2370.

Full text
Abstract:
This project focuses on web security. Some of the most famous vulnerabilities, known troubling web applications. Has been collected and analyzed. Each vulnerability collected in this project, was exploited and secured. Demon- strations from a web application prototype, developed for this project. Brings real examples for each vulnerability, both secured, and insecured. The proto- type ran on a Tomcat web server, and was developed with frameworks such as Web, Spring and Hibernate. Connected to one PostgreSQL data source. All vulnerabilities was successfully implemented in Spring framework, and
APA, Harvard, Vancouver, ISO, and other styles
50

Reimers, Erik. "On the security of TLS and IPsec : Mitigation through physical constraints." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119357.

Full text
Abstract:
TLS and IPsec are two protocols that provide secure communication on the Internet. They provide similar services but operate on different levels. This report compiles some of thecurrent known vulnerabilities that exist in those two protocols. It also describes attacks that exploit those vulnerabilities. Based on the vulnerabilities this paper gives guidelines onhow to avoid them when implementing TLS and IPsec. This paper also demonstrates a proof-of-concept that shows how IPsec can be configured to avoid some of the vulnerabilities. Theproof-of-concept also shows how IPsec can be used to setu
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!