Searched for: contributor%3A%22Doerr%2C+Christian+%28graduation+committee%29%22
(1 - 6 of 6)
- document
-
Molenkamp, Michaël (author)Many devices currently connect to the internet. Some are pretty well secured, while others lack security due to bugs or other vulnerabilities. A scanner searches for available services on the internet or computer host using standard network protocols. An adversary uses a scanner to search for leaks in security. However, scanners encode their...master thesis 2021
- document
-
Huisman, R.F. (author), Weegink, S. (author), Kaptein, S.B.M. (author), Jeleniewski, A.J. (author), Saveur, T. (author)The internet consists of many networks connected by the BGP protocol and can easily be manipulated by a hacker. Every day, hackers reroute internet traffic and use that to impersonate entities such as companies, devices and humans. To detect this rerouting, which is also know as a route leak, a BGP monitor can be used. A BGP monitor checks...bachelor thesis 2020
- document
-
Tubbing, Rico (author)A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical leakages such as power consumption. In a profiled SCA, we assume an adversary has control over a target and copy device. Using the copy device the adversary learns a profile of the device. With the profile, the adversary exploits the measurements...master thesis 2019
- document
-
Bijman, Matthijs (author)Since its inception in 1995, JavaScript usage has grown far beyond its initial domain of interactive websites. As the size of applications developed in the language grows, so does the desire for static analysis such as typechecking to provide safety and reliability. Many developments have been made in recent years on increasing the precision of...bachelor thesis 2018
- document
-
Yang, Xueying (author)Internet of Things (IoT) applications nowadays have a wide impact on people’s daily life while the size of IoT has been increasing rapidly. Millions of devices huge amount of data and different kinds of new protocols can bring many security issues.<br/>LoRaWAN is a MAC layer protocol for long-range low-power communication dedicated to the IoT....master thesis 2017
- document
-
Pors, Marlou (author)Software-Defined Networking (SDN) is the emerging paradigm that breaks vertical integration in networks, separating the network’s control logic from the underlying network devices such as routers and switches.<br/>The decoupling of this data plane and control plane, there is need for a new communication channel which is used for the communication...master thesis 2017
Searched for: contributor%3A%22Doerr%2C+Christian+%28graduation+committee%29%22
(1 - 6 of 6)