Spelling suggestions: "subject:"datorsystem"" "subject:"aktorsystem""
601 |
Ett RFID-kort kommer lastat med ett virus : RFID En attackanalysOlguin Alvarez, Zakaria, Furutorp, Lotti January 2021 (has links)
RFID-kort har ett utbrett användningsområde i dagens samhälle för bland annat passage, resekort och pass. RFID-kort av märket MIFARE Classic har i tidigare arbeten visats innehålla säkerhetsbrister. Detta undersöks för att se hur situationen ser ut idag med fokus på RFID-kort som attackvektor och i jämförelse med tidigare arbeten. Användandet av RFID-kort som attackvektor har i utförandet av experimenten visats fortfarande vara möjligt och även betydligt mindre begränsat. Där lagringskapacitet och användningsområde tidigare begränsat skadan man kan åstadkomma med RFID-kort, har nu standarden ökat och med det även lagringskapaciteten att skapa elak-artad kod. Med hjälp av en Arduino och en mobiltelefon är det möjligt att kopiera information från RFID-kort som till exempel lokaltrafikens resekort till ett mycket mindre säkert RFID-kort i ont syfte. Diskussionen tar upp möjligheterna att genom korsreferensering identifiera specifik information från varje kort, samt huruvida mer avancerade attacker som ransomware är applicerbara eller ej. Vidare utforskas även hur möjligheterna ser ut att lägga till egen kod och ser även där farhågor i användandet av RFID-kort utan ytterligare säkerhets-lager.
|
602 |
Skiftet Mot PWA Inom Applikationsutveckling : En analys av PWA vs. native applikation / The Shift Towards PWA in Application Development : An Analysis of PWA versus Native ApplicationNylander, Karl, Trulsson Wallin, Erik January 2021 (has links)
With mobile usage on the rise developers are more than ever faced with the issue of developing for multiple platforms. With Google's introduction of Progressive Web Applications (PWA) it is possible to build app-like web applications that can run on any platform. This study aims to investigate if PWA is mature enough to replace an already developed native iOS application. Specifically it aims to investigate if a PWA can achieve the same functionality and security as a native application, as well as what technologies are needed to do so. To verify this question an iOS application called iHug developed by a software company called Cloud Enablers was used as a reference point. With this reference a Minimum Viable Product (MVP) copy was developed as a PWA to verify that the functionality could be achieved. This PWA was not intended to replace the existing native application, but instead coexist with it. That means that the PWA must be able to communicate with the original application. In addition an investigation was done to see what measures needed to be taken to achieve security. The results showed that the same functionality was achievable, as was the security. Even though the results are promising, due to the native application not being developed with a PWA in mind there was a lot of extra work that had to be done to replicate certain functionalities and SDK choices. On this basis, while it is certainly possible to achieve the same functionality it is much harder to do so when the counterpart was not developed to be able to communicate with a PWA.
|
603 |
A SYSTEMATIC MAPPING STUDY ON DEVELOPMENT OF BLOCKCHAIN-BASED SMART CONTRACTSNordberg, William January 2021 (has links)
Context - Blockchain-based smart contracts have drawn the attention of scientific communities and businesses in recent years. The development of blockchain-based smart contracts is different from the development of conventional software due to the blockchain characteristics such as immutability, trustlessness, being append-only, and being decentralized. Therefore, standard software engineering processes need to be adjusted to address the unique characteristics of blockchain. Objective - This thesis aims to create a structured map of current research on the development of blockchain-based smart contracts, with a focus on identifying and classifying the development phases. Method - To accomplish our objective, we carried out a systematic mapping study on blockchain-based smart contract development. Our search yielded 1257 potentially related studies that were subjected to a selection process. Subsequently, in the final set appeared 41 primary studies. Result - Our main findings after analysis of the data are as follow: (i) researches mainly contribute to methods and providing tools, (ii) a large number of workshop papers indicate smart contracts' high acceptance rate, (iii) there is a lack of research on the finalization as a development phase, (iv) there is no common or standard language for specifying smart contracts that are valid regardless of the blockchain platform, (v) the most common language paradigm for smart contracts specification is imperative/declarative and for smart contracts implementation is declarative, (vi) the research community has put too much effort into the Ethereum blockchain, while it requires putting more attention to other blockchains, and (vii) there is a lack of studies tackling trustworthy oracle and scam challenges. conclusion - These results can benefit the research community to identify trends, constraints, and research gaps. In addition, they share potential directions for future research.
|
604 |
Automated Measurement and Change Detection of an Application’s Network Activity for Quality Assistance / Automatisk mätning och förändringsdetektering av en applikations nätverksaktivitet för kvalitetsstödNissa Holmgren, Robert January 2014 (has links)
Network usage is an important quality metric for mobile apps. Slow networks, low monthly traffic quotas and high roaming fees restrict mobile users’ amount of usable Internet traffic. Companies wanting their apps to stay competitive must be aware of their network usage and changes to it. Short feedback loops for the impact of code changes are key in agile software development. To notify stakeholders of changes when they happen without being prohibitively expensive in terms of manpower the change detection must be fully automated. To further decrease the manpower overhead cost of implementing network usage change detection the system need to have low configuration requirements, and keep the false positive rate low while managing to detect larger changes. This thesis proposes an automated change detection method for network activity to quickly notify stakeholders with relevant information to begin a root cause analysis after a change in the network activity is introduced. With measurements of the Spotify’s iOS app we show that the tool achieves a low rate of false positives while detecting relevant changes in the network activity even for apps with dynamic network usage patterns as Spotify. / Nätverksaktivitet är ett viktigt kvalitetsmått för mobilappar. Mobilanvändare begränsas ofta av långsamma nätverk, låg månatlig trafikkvot och höga roamingavgifter. Företag som vill ha konkurrenskraftiga appar behöver vara medveten om deras nätverksaktivitet och förändringar av den. Snabb återkoppling för effekten av kodändringar är vitalt för agil programutveckling. För att underrätta intressenter om ändringar när de händer utan att vara avskräckande dyrt med avseende på arbetskraft måste ändringsdetekteringen vara fullständigt automatiserad. För att ytterligare minska arbetskostnaderna för ändringsdetektering av nätverksaktivitet måste detekteringssystemet vara snabbt att konfigurera, hålla en låg grad av felaktig detektering samtidigt som den lyckas identifiera stora ändringar. Den här uppsatsen föreslår ett automatiserat förändringsdetekteringsverktyg för nätverksaktivitet för att snabbt meddela stakeholders med relevant information för påbörjan av grundorsaksanalys när en ändring som påverkar nätverksaktiviteten introduceras. Med hjälp av mätningar på Spotifys iOS-app visar vi att verktyget når en låg grad av felaktiga detekteringar medan den identifierar ändringar i nätverksaktiviteten även för appar med så dynamisk nätverksanvändning som Spotify.
|
605 |
Analysis of 360° Video Viewing BehavioursAlmquist, Mathias, Almquist, Viktor January 2018 (has links)
In this thesis we study users' viewing motions when watching 360° videos in order to provide information that can be used to optimize future view-dependent streaming protocols. More specifically, we develop an application that plays a sequence of 360° videos on an Oculus Rift Head Mounted Display and records the orientation and rotation velocity of the headset during playback. The application is used during an extensive user study in order to collect more than 21 hours of viewing data which is then analysed to expose viewing patterns, useful for optimizing 360° streaming protocols.
|
606 |
Service Management for P2P EnergySharing Scenarios Using Blockchain--Identification of Performance of Computational effortsPatha, Ragadeep January 2022 (has links)
Peer-to-Peer energy trading enables the prosumers and consumers to trade their energy in a simple services.By this the energy users have possibility to have a surplusshare of energy without any interruptions[1].But for the higher deployment of thep2p energy services, the allocation of the resources for the energy trading transactions are also challenging to model in these days. Blockchain technology, which isof a distributed ledger system and also provides a secure way of sharing the information between the peers of the network, is suitable for the proposed p2p energytrading model which can be useful for the higher scale deployments. This thesis provides an initial implementation of the p2p energy trading modelusing the blockchain and also measures the performance of the implemented modelwith the computational.A literature review is conducted for obtaining the previousstudies related to p2p energy trading using blockchain with the performance evaluation.Then the technologies related to the thesis are described and from the literaturestudies the required models are described and considered for proposing the systemmodel for the thesis. The implemented system model is also analyzed with different computational efforts for the service management functions. For generating the transactions, a Fabricclient SDK is created, which ensures that each transaction communicates with theblockchain’s smart contract for the secured transaction. Finally, after measuring thecomputational efforts, I want to observe the performance outcome for the measuredcomputational parameters so that the system’s behavior can be analyzed when thetransactions are happening between the peers by using the specific blockchain technology.
|
607 |
Implementing the Load Slice Core on a RISC-V based microarchitectureDalbom, Axel, Svensson, Tim January 2020 (has links)
As cores have become better at exposing Instruction-Level Parallelism (ILP), they have become bigger, more complex, and consumes more power. These cores are approaching the Power- and Memory-wall quickly. A new microarchitecture proposed by Carlson et. al claims to solve these problems. They claim that the new microarchitecture, the Load Slice Core, is able to outperform both In-Order and Out-of-Order designs in an area and power restricted environment. Based on Carlson et. al.’s work, we have implemented and evaluated a prototype version of their Load Slice Core using the In-Order Core Ariane. We evaluated the Load Slice Core by comparing the LSC to an IOC when running a microbenchmark designed by us, and when running a set of Application Benchmarks. The results from the Microbenchmark are promising, the LSC outperformed the comparable IOC in each test but problems related to the configuration of the design were found. The results from the Application Benchmarks are inconclusive. Due to time constraints, only a partially functioning LSC were compared to a comparable IOC. From these results we found that the LSC performed comparably or slightly worse than its IOC counterpart. More research on the subject is required for any conclusive statement on the microarchitecture can be made, but it is the opinion of this paper’s authors that it does show promise.
|
608 |
Maskininlärning och fallklassificering med MEMS-accelerometer : En studie i fallklassificering med artificiella neurala nätverk / En studie i fallklassificering med artificiella neurala nätverk : Maskininlärning och fallklassificering med MEMS-accelerometerTheo, Sobczak January 2020 (has links)
Denna rapport har sin utgångspunkt på skapandet av en maskininlärningsalgoritm för att kunna klassificera ett fysiskt fall av en person. En DC Kapacitiv MEMS-accelerometer (BMA250) kombinerat med en Tinyduino Processor (Atmega328P) används för datainsamling. Programmering av processorn och maskininlärningsalgoritmen skrivs i C++ och ANN (Artificiell Neuralt Nätverk) används för att klassificera det fysiska fallet. ANN kan approximera ett värde som tyder på ett falskt fall efter 10 000 träningssekvenser inom 5% av ett teoretiskt värde som tyder på ett resultat med 100% säkerhet och 0,0005% felmarginal. Ett teoretiskt värde som tyder på ett faktiskt fall kan klassificeras efter 5000 träningssekvenser inom 5% av det eftersökta värdet med 100% säkerhet och 0,0045% felmarginal.
|
609 |
Analysis of Diameter Log Files with Elastic Stack / Analysering av Diameter log filer med hjälp av Elastic StackOlars, Sebastian January 2020 (has links)
There is a growing need for more efficient tools and services for log analysis. A need that comes from the ever-growing use of digital services and applications, each one generating thousands of lines of log event message for the sake of auditing and troubleshooting. This thesis was initiated on behalf of one of the departments of the IT consulting company TietoEvry in Karlstad. The purpose of this thesis project was to investigate whether the log analysis service Elastic Stack would be a suitable solution for TietoEvry’s need for a more efficient method of log event analysis. As part of this investigation, a small-scale deployment of Elastic Stack was created, used as proof of concept. The investigation showed that Elastic Stack would be a suitable tool for the monitoring and analysis needs of TietoEvry. The final version of deployment was, however, not able to fulfill all of the requirements that were initially set out by TietoEvry, however, this was mainly due to a lack of time and rather than limitations of Elastic Stack.
|
610 |
INCORPORATING SECURITY IN SERVICE LEVEL AGREEMENTSAsghar, Syed Usman January 2020 (has links)
No description available.
|
Page generated in 0.0369 seconds