- document
-
Al-Kaswan, Ali (author)Reverse engineering binaries is required to understand and analyse programs for which the source code is unavailable. Decompilers can transform the largely unreadable binaries into a more readable source code-like representation. However, many aspects of source code, such as variable names and comments, are lost during the compilation and...master thesis 2022
- document
-
Thiessen, Sven (author)The uprise of the Internet of Things (IoT) has been a hot topic for several years. While many see these devices and think they bring ease to their lives, it is far from reality. Researchers found many privacy and security problems within these devices in the last years. The popularity of these devices causes many users to bring a device into...master thesis 2022
- document
-
Steenbrink, Tim (author)Recent advances in the field of ‘Zero Trust’ security strategies have revealed that there is still much novelty regarding the concept of Zero Trust architecture (ZTA). Zero Trust has recently gained attention as the traditional approach, based on network perimeter security, is being outplayed by sophisticated cyber attacks. This research...master thesis 2022
- document
-
Maquelin, Suzanne (author)Interpreted applications are often vulnerable to remote code execution attacks. To protect interpreted applications, we should reduce the tools available to the attackers. In this thesis, we investigate the possibilities for the automation of policy generation for interpreted applications in terms of system call arguments. These policies are...master thesis 2022
- document
-
de Los Santos Subirats, Alex (author)Software-Defined Networks (SDNs) are a promising new network design paradigm that allows for better control of the network. But as with any new software implementation, there are new security concerns that arise. In the past there have been various papers covering specific side-channel attacks on SDNs; most of them consist of either using time...bachelor thesis 2022
- document
-
Jeong, Yoon Hwan (author)In order to combat increasing spam calls, many applications are developed and downloaded to block those calls. Some studies about performance of the applications were previously conducted, however, the actual processes the applications go through to intercept and block the spam calls are not well studied. This research presents a method to...bachelor thesis 2022
- document
- van de Weijer, Teun (author) master thesis 2022
- document
-
Mulder, Tijmen (author)From 2019 into 2021, phishing incidents tripled, while phishing was found to be the largest used cyberattack vector. One commonly used type of phishing is a credential phishing attack over email. This is an act where an attacker tries to steal credential information from a target via a phishing website. This phishing website is delivered to the...master thesis 2022
- document
-
Kumaresan, Anusha (author), Kandasamy, Nandha Kumar (author), Kooij, Robert (author)The endeavour towards making power distribution systems (PDSs) smarter has made the interdependence on communication network indispensable. Further, prospective high penetration of intermittent renewable energy sources in the form of distributed energy resources (DERs) has resulted in the necessity for smart controllers on such DERs....journal article 2022
- document
-
Flor, Vinicius B.Braga (author), Filho, Milton B.Do Coutto (author), de Souza, Julio C.Stacchini (author), Vergara Barrios, P.P. (author)Intelligent electrical power grids, widely referred to as smart grids (SGs), rely on digital technology resources, especially communication and measurement devices, becoming a cyber-physical energy system. Massive data flow between grid elements makes smart grids more vulnerable to cyber-attacks. Power system state estimation (SE) - an...journal article 2022
- document
-
Ranade, Vedang Suhas (author)Industrial control systems (ICSs) are used widely throughout the world for the control of large, complex industrial plants and consist of the entire setups of control system including sensors, PLCs (Programmable Logic Controllers), actuators and communication devices. The communication between these ICS devices is performed using industrial...master thesis 2021
- document
-
Kerkhof, Maikel (author)Deep learning techniques have become the tool of choice for side-channel analysis. In recent years, neural networks like multi-layer perceptrons and convolutional neural networks have proven to be the most powerful instruments for performing side-channel analysis. Recent work on this topic has focused on different aspects of these techniques,...master thesis 2021
- document
-
van Gurp, Ralph (author)Malware presents a growing problem in a world that is increasingly connected to, and reliant on, the internet. The growing, devastating potential of cyber attacks such as DDoS attacks on society and economy is largely the result of a new class of devices, the Internet of Things (IoT), whose characteristic vulnerabilities make them easy targets...master thesis 2021
- document
-
Stefanov, Radoslav (author)Blockchain networks have gained recent popularity among organisations that want to make use of the security aspects that blockchain provides. Fabric is one of the most used distributed network technologies, most commonly applied in scenarios that require confidential data to be stored securely and privately. Use case examples are finance,...bachelor thesis 2021
- document
-
Yüksel, Akif (author)Kyber is a Decentralized Finance (DeFi) system which runs on the Ethereum blockchain. DeFi aims to remove centralized intermediaries such as Market Makers. An Automated Market Maker (AMM), implemented in a smart contract, is a decentralized version of these. Kyber's Dynamic Market Maker (DMM) is a next-generation AMM which solves two issues:...bachelor thesis 2021
- document
-
de Bruijn, Vasco (author)In cyber security, side-channel attacks (SCA) are of interest because they target the vulnerabilities in implementation rather than inherent vulnerabilities in the algorithm. Profiled SCA is especially interesting as it assumes that the adversary has unlimited access to a clone device that can generate sufficient traces to create a profile of...master thesis 2021
- document
-
van Rijn, Vincent (author)Virtualization is the fundamental technology that enabled the widespread adoption of cloud computing. With the ever-increasing pervasiveness of the cloud computing paradigm, strong isolation guarantees and low performance overhead from isolation platforms are paramount. An ideal isolation platform offers both: an infallible isolation boundary...master thesis 2021
- document
-
Smith, Marcus (author), Miller, S.R.M. (author)This book undertakes a multifaceted and integrated examination of biometric identification, including the current state of the technology, how it is being used, the key ethical issues, and the implications for law and regulation. The five chapters examine the main forms of contemporary biometrics–fingerprint recognition, facial recognition and...book 2021
- document
-
Maestre, José M. (author), Velarde, Pablo (author), Ishii, Hideaki (author), Negenborn, R.R. (author)In this paper, we present an analysis of the vulnerability of a distributed model predictive control (DMPC) scheme in the context of cyber-security. We consider different types of the so-called insider attacks. In particular, we consider the situation where one of the local controllers sends false information to others to manipulate costs for...journal article 2021
- document
-
Parkin, S.E. (author), Arnell, Simon (author), Ward, Jeremy (author)Leaders of organisations must make investment decisions relating to the security of their organisation. This often happens through consultation with a security specialist. Consultations may be regarded as conversations taking place in a trading zone between the two domains. We propose that supporting the trading zone is a route to sustainable,...conference paper 2021