Search for dissertations about: "malware"

Showing result 1 - 5 of 8 swedish dissertations containing the word malware.

  1. 1. MobiLeak Security and Privacy of Personal Data in Mobile Applications

    University dissertation from Stockholm : KTH Royal Institute of Technology

    Author : Pasquale Stirparo; Sead Muftic; Steven Marcus Furnell; [2015]
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; mobile application; security; privacy; android; forensics; malware; Informations- och kommunikationsteknik; Information and Communication Technology; Datalogi; Computer Science;

    Abstract : Smartphones and mobile applications have become an essential part of our daily lives. People always carry their smartphones with them and rely on mobile applications for most of their tasks: from checking emails for personal or business purposes, to engaging in social interactions via social networks, from trading online or checking their bank accounts to communicating with families and friends through instant messaging applications. READ MORE

  2. 2. Privacy-Invasive Software Exploring Effects and Countermeasures

    University dissertation from Ronneby : Blekinge Institute of Technology

    Author : Martin Boldt; ; [2007]
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Information security; privacy; malware; spyware;

    Abstract : As computers are increasingly more integrated into our daily lives, we need aiding mechanisms for separating legitimate software from their unwanted counterparts. We use the term Privacy-Invasive Software (PIS) to refer to such illegitimate software, sometimes loosely labelled as spyware. READ MORE

  3. 3. Mobile Device Security with ARM TrustZone

    University dissertation from Stockholm : KTH Royal Institute of Technology

    Author : Sileshi Demesie Yalew; Seif Haridi; Miguel Correia; Mário Freire; [2018]
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Android; ARM TrustZone; Malware Mobile Devices; Mobile Security; Trusted Computing;

    Abstract : Mobile devices such as smartphones are becoming the majority of computing devices due to their evolving capabilities. Currently, service providers such as nancial and healthcare institutions oer services to their clients using smartphone applications (apps). Many of these apps run on Android, the most adopted mobile operating system (OS) today. READ MORE

  4. 4. Life of a Security Middlebox Challenges with Emerging Protocols and Technologies

    University dissertation from Karlstad : Karlstads universitet

    Author : Zeeshan Afzal; Stefan Lindskog; Tomas Olovsson; [2020]
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; network security; TCP; MPTCP; IDS; Snort; edit-distance; encryption; Computer Science; Datavetenskap;

    Abstract : The Internet of today has intermediary devices known as middleboxes that perform more functions than the normal packet forwarding function of a router. Security middleboxes are a subset of these middleboxes and face an increasingly difficult task to perform their functions correctly. READ MORE

  5. 5. No Hypervisor Is an Island System-wide Isolation Guarantees for Low Level Code

    University dissertation from Karlstad : Karlstads universitet

    Author : Oliver Schwarz; Mads Dam; Christian Gehrmann; Gerwin Klein; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Platform Security; Hypervisor; Formal Verification; Theorem Proving; HOL4; DMA; Peripheral Devices; Instruction Set Architectures; ISA; Information Flow; Boot; Datalogi; Computer Science;

    Abstract : The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come from criminals, competitors, and government agencies. Some of them are very skilled and very targeted in their attacks. READ MORE