Searched for: contributor%3A%22van+der+Lubbe%2C+Jan+%28graduation+committee%29%22
(1 - 6 of 6)
document
MANGANAHALLI JAYAPRAKASH, Sandesh (author)
The usage of Internet of Things (IoT) devices has been exponentially increasing and their security is often overlooked. Hackers exploit the vulnerabilities present to perform large scale attacks as well as to obtain privacy-sensitive information. Resource constraints combined with a lack of incentives for manufacturers makes it harder to...
master thesis 2019
document
Kastelein, Frits (author)
In today's world, the Internet is the backbone of our society. The relatively unknown Border Gateway Protocol (BGP), and with its vulnerabilities, gives malicious parties an opportunity for abuse. By improving the currently known AS relation data set and by simulating BGP traffic this abuse is better spotted. Kastelein's topology generating...
master thesis 2018
document
Samiotis, Ioannis Petros (author)
Side-Channel Attacks, are a prominent type of attacks, used to break cryptographic implementations on a computing system. They are based on information "leaked" by the hardware of a computing system, rather than the encryption algorithm itself. Recent studies showed that Side-Channel Attacks can be performed using Deep Learning models. In this...
master thesis 2018
document
Frigo, Pietro (author)
Dark silicon is pushing processor vendors to add more specialized units such as accelerators to commodity processor chips. Unfortunately this is done without enough care to security. In this paper we look at the security implications of integrated Graphical Processor Units (GPUs) found in almost all mobile processors. We demonstrate that GPUs,...
master thesis 2017
document
Abbink, Jasper (author)
In order to stay undetected and keep their operations alive, cyber criminals are continuously evolving their methods to stay ahead of current best defense practices. Over the past decade, botnets have developed from using statically hardcoded IP addresses and domain names to randomly-generated ones, so-called domain generation algorithms (DGA)....
master thesis 2017
document
Gupta, Parul (author)
Android smartphones collect and compile a huge amount of sensitive information which is secured using cryptography. There is an unintended leakage of information during the physical implementation of a cryptosystem on a device. Such a leakage is often termed as side channel and is used to break the implementation of cryptographic algorithms. In...
master thesis 2017
Searched for: contributor%3A%22van+der+Lubbe%2C+Jan+%28graduation+committee%29%22
(1 - 6 of 6)