Search for dissertations about: "mitigations"

Showing result 1 - 5 of 13 swedish dissertations containing the word mitigations.

  1. 1. On Privacy and Security in Smart Connected Homes

    Author : Joseph Bugeja; Andreas Jacobsson; Paul Davidsson; Marc Langheinrich; Malmö universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; smart connected homes; Internet of Things; smart homes devices; smart home data; threat identification; risk analysis; privacy; security; vulnerability assessment; mitigations; threat agents;

    Abstract : The growth and presence of heterogeneous sensor-equipped Internet-connected devices inside the home can increase efficiency and quality of life for the residents. Simultaneously, these devices continuously collect, process, and transmit data about the residents and their daily lifestyle activities to unknown parties outside the home. READ MORE

  2. 2. Smart connected homes : concepts, risks, and challenges

    Author : Joseph Bugeja; Jan Persson; Malmö universitet; []
    Keywords : Smart Connected Homes; Internet of Things; Smart Home Devices; Data Lifecycle; Security Risks; Privacy Management; Vulnerability Assessment; Security Mitigations; Threat Agents; Smart Home Services; System Architecture;

    Abstract : The growth and presence of heterogeneous connected devices inside the home have the potential to provide increased efficiency and quality of life to the residents. Simultaneously, these devices tend to be Internet-connected and continuously monitor, collect, and transmit data about the residents and their daily lifestyle activities. READ MORE

  3. 3. Generating Optimized and Secure Binary Code

    Author : Rodothea Myrsini Tsoupidi; Elena Troubitsyna; Panagiotis Papadimitratos; Fernando Magno Quintão Pereira; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; constraint programming; code optimization; secure compilation; side-channel attacks; code-reuse attacks; software security; villkorsprogrammering; kodoptimering; säker kompilering; sidokanalsattacker; kodåteranvändningsattacker; mjukvarusäkerhet; Informations- och kommunikationsteknik; Information and Communication Technology; Informations- och kommunikationsteknik; Information and Communication Technology;

    Abstract : The increased digitalization of modern societies has resulted in a proliferation of a broad spectrum of embedded devices, ranging from personal smartphones and heart pacemakers to large-scale industrial IoT systems. Since they often handle various sensitive data, these devices increasingly become the targets of cyberattacks that threaten the integrity of personal data, financial security, and sometimes even people’s safety. READ MORE

  4. 4. Securing the mashed up web

    Author : Jonas Magazinius; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES;

    Abstract : The Internet is no longer a web of linked pages, but a flourishing swarm of connected sites sharing resources and data. Modern web sites are increasingly interconnected, and a majority rely on content maintained by a third party. Web mashups are at the very extreme of this evolution, built almost entirely around external content. READ MORE

  5. 5. Pre-deployment Description Logic-based Reasoning for Cloud Infrastructure Security

    Author : Claudia Cauli; Göteborgs universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Formal Methods; Automated Reasoning; Cloud; Security; Description Logic;

    Abstract : Ensuring the security of a cloud application is exceptionally challenging. Not only is cloud infrastructure inherently complex, but also a precise definition of what is secure is hard to give. READ MORE