71 |
A boa-fé no processo civil e os mecanismos de repressão ao dolo processualChiovitti, Ana Paula 18 August 2009 (has links)
Made available in DSpace on 2016-04-26T20:29:48Z (GMT). No. of bitstreams: 1
Ana Paula Chiovitti.pdf: 1113806 bytes, checksum: a6e52fb193f36ec584bf7a3c9d9d7782 (MD5)
Previous issue date: 2009-08-18 / The objective of this work is to first analyze the good faith on civil procedure and its applicability and later, abusive and unethical conduct from the parties, aimed to distort devoted procedural institutes (as the broad defense, or right of action, for example). On a second part, it seeks to examine the ways and means of prevention and prosecution of these actions drawbacks in the Brazilian civil procedure law. Thus, analysis of national and foreign doctrine and the study of judicial decisions homelands, which helped understand how the Brazilian judges are positioning on the subject. The subject is justified in the view of the problems that the Brazilian Judiciary goes through, with the load of demands and consequent delays regarding the proceedings, as well as little, sometimes any, are effective for which depends the judicial decisions, this theme that has been sanctioned by various authors and always gathers views of all shades. It is undeniable that there are effective means to contain unfair or unethical practices of litigants; however, the timidity by which the subject is seen by the judges in Brazil, just to make, in some situations, even with the subjectivity that the issue is viewed, safe means of repression to the procedural intent. Any possibility of punishing the party that wrongly uses the civil procedure techniques, blaming it by "marginal damage of the process", unethical conduct would certainly tend to diminish or even to be abolished in our judicial system. In this context, we find that good faith, viewed from the etimologic perspective, even with its undeniable subjectivism, still is the major milestone in both the actions of the parties as a model of conduct to be followed, and the means and methods by which the judiciary must combat frivolous practices, which only cause procedural turmoil or undue delays, and never contribute to the strengthening of the democratic state of law / O objetivo deste trabalho é analisar, primeiramente, a boa-fé no processo e sua aplicabilidade e depois as condutas abusivas e antiéticas das partes, tendentes a desvirtuar institutos processuais consagrados (como a ampla defesa, ou o direito de ação, por exemplo). Num segundo momento, pretende-se examinar os meios e formas de prevenção e repressão destas ações inconvenientes no processo civil brasileiro. Para tanto, foi feita análise de doutrina nacional e estrangeira, bem como o estudo das decisões jurisprudenciais pátrias, os quais permitiram compreender como os magistrados brasileiros vêm se posicionando a respeito do tema. A temática justifica-se à vista das mazelas pelas quais passa o Judiciário brasileiro, com toda carga de demandas e conseqüente morosidade na tramitação dos processos, bem como a pouca, ou por vezes nenhuma, eficácia pela qual se revestem as decisões judiciais, tema este que vem sendo referendado por diversos autores e sempre acoroçoa opiniões de todos os matizes. É inegável que existem remédios efetivos para conter as práticas abusivas ou antiéticas dos litigantes; contudo, a timidez pela qual o tema é encarado pelos juízes brasileiros, acaba por tornar, em algumas situações, até mesmo pela subjetividade com que a questão é vista, inócuos os meios de repressão ao dolo processual. Havendo possibilidade de punir a parte que utiliza indevidamente o processo, responsabilizando-a pelos denominados danos marginais do processo , certamente as condutas antiéticas tenderiam a diminuir ou mesmo a serem abolidas de nosso sistema judiciário. Neste contexto, percebe-se que a boa-fé, encarada sob a ótica etimológica, mesmo com seu inegável subjetivismo, ainda assim é o grande marco responsável tanto pelas ações das partes como modelo de conduta a ser seguido, como pelos meios e modos com que o Judiciário deve combater as práticas levianas, que apenas causam tumulto processual ou dilações indevidas, e nunca contribuem para o fortalecimento do Estado Democrático de Direito
|
72 |
A framework for the protection of mobile agents against malicious hostsBiermann, Elmarie 30 September 2004 (has links)
The mobility attribute of a mobile agent implies deployment thereof in untrustworthy environments, which introduces malicious host threats. The research question deals with how a security framework could be constructed to address the mentioned threats without introducing high costs or restraining the mobile agent's autonomy or performance.
Available literature have been studied, analysed and discussed. The salient characteristics as well as the drawbacks of current solutions were isolated. Through this knowledge a dynamic mobile agent security framework was defined. The framework is based on the definition of multiple security levels, depending on type of deployment environment and type of application.
A prototype was constructed and tested and it was found to be lightweight and efficient, giving developers insight into possible security threats as well as tools for maximum protection against malicious hosts. The framework outperformed other frameworks / models as it provides dynamic solutions without burdening a system with unnecessary security gadgets and hence paying for it in system cost and performance / Computing / D.Phil.
|
73 |
Malware Analysis using Profile Hidden Markov Models and Intrusion Detection in a Stream Learning SettingSaradha, R January 2014 (has links) (PDF)
In the last decade, a lot of machine learning and data mining based approaches have been used in the areas of intrusion detection, malware detection and classification and also traffic analysis. In the area of malware analysis, static binary analysis techniques have become increasingly difficult with the code obfuscation methods and code packing employed when writing the malware. The behavior-based analysis techniques are being used in large malware analysis systems because of this reason. In prior art, a number of clustering and classification techniques have been used to classify the malwares into families and to also identify new malware families, from the behavior reports. In this thesis, we have analysed in detail about the use of Profile Hidden Markov models for the problem of malware classification and clustering. The advantage of building accurate models with limited examples is very helpful in early detection and modeling of malware families.
The thesis also revisits the learning setting of an Intrusion Detection System that employs machine learning for identifying attacks and normal traffic. It substantiates the suitability of incremental learning setting(or stream based learning setting) for the problem of learning attack patterns in IDS, when large volume of data arrive in a stream. Related to the above problem, an elaborate survey of the IDS that use data mining and machine learning was done. Experimental evaluation and comparison show that in terms of speed and accuracy, the stream based algorithms perform very well as large volumes of data are presented for classification as attack or non-attack patterns. The possibilities for using stream algorithms in different problems in security is elucidated in conclusion.
|
74 |
Grid Fault management techniques: the case of a Grid environment with malicious entitiesAkimana, Rachel 01 October 2008 (has links)
<p>La tolérance et la gestion des fautes dans les grilles de données/calcul est d’une importance capitale. En effet, comme dans tout autre système distribué, les composants d’une grille sont susceptibles de tomber en panne à tout moment. Mais le risque de panne croît avec la taille du système, et est donc plus exacerbé dans un système de grille. En plus, tout en essayant de mettre à profit les ressources offertes par la grille, les applications tournant sur celle-ci sont de plus en plus complexes (ex. impliquent des interactions complexes, prennent des jours d’exécution), ce qui les rend plus vulnérables aux fautes. Le plus difficile dans la gestion des fautes dans une grille, c’est qu’il est difficile de savoir si une faute qui survient sur une entité de la grille est induite malicieusement ou accidentellement.<p><p>Dans notre travail de thèse, nous utilisons le terme faute, au sens large, pour faire référence à tout étant inattendu qui survient sur tout composant de la grille. Certains de ces états provoquent des comportements aussi inattendus et perceptibles au niveau de la grille tandis que d’autres passent inaperçues. De plus, certaines de ces fautes sont le résultat d’une action malveillante alors que d’autres surviennent accidentellement ou instantanément. Dans ce travail de thèse, nous avons traité le cas de ces fautes induites malicieusement, et qui généralement passent inaperçues. Nous avons considéré en particulier le problème de la confidentialité et de l’intégrité des données stockées à long-terme sur la grille.<p><p>L’étude de la confidentialité des données a été faite en deux temps dont la première partie concerne la confidentialité des données actives. Dans cette partie, nous avons considéré une application liée à la recherche des similitudes d’une séquence d’ADN dans une base de données contenant des séquences d’ADN et stockée sur la grille. Pour cela, nous avons proposé une méthode qui permet d’effectuer la comparaison sur un composant distant, mais tout en gardant confidentielle la séquence qui fait l’objet de la comparaison. <p>Concernant les données passives, nous avons proposé une méthode de partage des données confidentielles et chiffrés sur la grille.<p> <p>En rapport avec l’intégrité des données, nous avons considéré le cas des données anonymes dans le cadre de l’intégrité des données passives. Pour les données actives, nous avons considéré le problème de la corruption des jobs exécutés sur la grille. Pour chacune des cas, nous avons proposé des mécanismes permettant de vérifier l’authenticité des données utilisées ou produites par ces applications.<p> / Doctorat en Sciences / info:eu-repo/semantics/nonPublished
|
75 |
Emulátor byte kódu jazyka Java vhodný pro detekci a analýzu malware / Java Byte Code Emulator Suitable for Malware Detection and AnalysisKubernát, Tomáš January 2013 (has links)
The goal of this thesis is to create a virtual machine that emulates a running programs written in Java programing language, which would be suitable for malware analysis and detection. The emulator is able to detect arguments of exploitable methods from Java standard classes, the order of calling these exploitable methods and also execution the test application. Overall functionality was tested on appropriate examples in which held its own measurements. At the end of the paper we describe testing of the emulator, which also contains tables and graphs for better results visualization.
|
76 |
Security issues in Address Autoconfiguration ProtocolsLanger, André, Kühnert, Tom 20 April 2007 (has links)
Dynamic address assignment is one of the most important
features in wireless ad hoc networks if nodes should be
enabled to join and to work in the network by
automatically configuring all necessary settings. Different
approaches have been developed throughout the last years
to achieve this objective of Dynamic Address
Autoconfiguration but research primarily focused on
efficiency and correctness, less on security issues.
Whereas Duplicate Address Detection has become reliable
in commonplace scenarios, it is still relatively easy to
suspend the whole network functionality in extraordinary
situations within the boundaries of a Dynamic Address
Configuration Protocol. In this paper, we therefore want to
point out shortcomings and weaknesses in existing
protocol solutions which address dynamic IP address
assignment. We concentrate on a leader-based approach
called ODACP and want to propose several solutions
which improve the original protocol in such a way that it
is safer against malicious host activities. Finally, we will
demonstrate the improvements of our solution in a
separate test scenario.
|
77 |
Ethical Hacking of Android Auto in the Context of Road SafetyPalm, Alexander, Gafvelin, Benjamin January 2021 (has links)
With a more than ever increasing demand to interconnect smartphones with infotainment systems, Android Auto has risen in popularity with its services used in modern vehicles worldwide. However, as users progressively connect their smartphones to in-vehicle infotainment systems, the opportunity for malicious actors to endanger and access private data of Android Auto users advances as well. The goal with this thesis is to determine how secure Android Auto is for road use. The main research question is to figure out if Android Auto is susceptible to attacks that exploit certain vulnerabilities in the Android operating system. The research question was answered by creating several proof-of-concept attacks on Android Auto using an emulated infotainment system with mobile devices. An investigation was also conducted regarding the application’s communication channel between the mobile device and infotainment display. Results of this thesis demonstrate that several attacks are substantially severe to endanger drivers on the road. There is a great risk of successful exploits when running Android Auto locally on the phone without a connection to the infotainment system, and a lesser risk when connected to the infotainment system. Intercepting communication in the USB channel revealed an encryption algorithm whose version has published exploits and can be cracked to potentially exploit Android Auto. / I takt med en evigt ökande efterfrågan på att sammankoppla smarttelefoner med infotainmentsystem, har allt fler börjat använda Android Auto i sina fordon världen över. En bieffekt av att allt fler sammankopplar sina mobiler till infotainmentsystem, är att det leder till fler möjligheter för illvilliga parter att stjäla privat data och sätta Android Autoanvändares liv i fara. Målet med denna avhandling är att fastställa hur säkert Android Auto är i avseende till vägsäkerhet. Den huvudsakliga forskningsfrågan är att lista ut om Android Auto kan attackeras av attacker som utnyttjar sårbarheter i Android operativsystemet. Forskningsfrågan besvarades genom att skapa flertal konceptattacker mot Android Auto användandes av ett emulerat infotainmentsystem och mobiltelefoner. En utredning utfördes även gällande applikationens kommunikationskanal mellan telefonen och infotainmentskärmen. Resultatet från denna avhandling demonstrerade att många attacker är tillräckligt allvarliga för att äventyra trafikanternas säkerhet. Det finns en avsevärd risk för framgångsrika attacker när Android Auto körs lokalt på telefonen utan en USB koppling till infotainmentsystemet, och en liten risk när telefonen är kopplad till infotainmentsystemet. Avlyssning och uppfångning av kommunikationen i USB kanalen visade att en krypteringsalgoritm vars version har existerande sårbarheter kan avkrypteras och utnyttjas för att potentiellt attackera Android Auto.
|
78 |
Combining Anomaly- and Signaturebased Algorithms for IntrusionDetection in CAN-bus : A suggested approach for building precise and adaptiveintrusion detection systems to controller area networksAndersson, Robin January 2021 (has links)
With the digitalization and the ever more computerization of personal vehicles, new attack surfaces are introduced, challenging the security of the in-vehicle network. There is never such a thing as fully securing any computer system, nor learning all the methods of attack in order to prevent a break-in into a system. Instead, with sophisticated methods, we can focus on detecting and preventing attacks from being performed inside a system. The current state of the art of such methods, named intrusion detection systems (IDS), is divided into two main approaches. One approach makes its models very confident of detecting malicious activity, however only on activities that has been previously learned by this model. The second approach is very good at constructing models for detecting any type of malicious activity, even if never studied by the model before, but with less confidence. In this thesis, a new approach is suggested with a redesigned architecture for an intrusion detection system called Multi-mixed IDS. Where we take a middle ground between the two standardized approaches, trying to find a combination of both sides strengths and eliminating its weaknesses. This thesis aims to deliver a proof of concept for a new approach in the current state of the art in the CAN-bus security research field. This thesis also brings up some background knowledge about CAN and intrusion detection systems, discussing their strengths and weaknesses in further detail. Additionally, a brief overview from a handpick of research contributions from the field are discussed. Further, a simple architecture is suggested, three individual detection models are trained and combined to be tested against a CAN-bus dataset. Finally, the results are examined and evaluated. The results from the suggested approach shows somewhat poor results compared to other suggested algorithms within the field. However, it also shows some good potential, if better decision methods between the individual algorithms that constructs the model can be found.
|
79 |
Practice-Oriented Cybersecurity Training FrameworkPodila, Laxmi Mounika January 2020 (has links)
No description available.
|
80 |
The policing of road rage incidents in the Gauteng ProvinceMfusi, Boikhutso Florencia 12 1900 (has links)
This study followed a qualitative research approach, and semi-structured interviews regarding the subject matter were conducted with the knowledgeable and experienced respondents in the Gauteng traffic-related departments. A literature review was also conducted to provide a comprehensive understanding of the research problem in both local and international context.
The research stresses the fact that motorists are continuing to lose their lives on Gauteng province, as a result of violent traffic disputes, therefore people suffer financial, physical, psychological as well as social effects as a consequence of such actions. The findings revealed that all the traffic stakeholders are working cooperatively towards implementing the crime prevention strategic plans, but for policing road rage in particular there is no specific strategy in action. In addition, this study reveals that it is impossible for the traffic police to curb road rage incidents because the latter occur as a result of unpredictable human behavior. / Police Practice / M. Tech. (Policing)
|
Page generated in 0.0366 seconds