National Repository of Grey Literature 79 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Distributed Password Generation Using Probabilistic Grammars
Mikuš, Dávid ; Ryšavý, Ondřej (referee) ; Hranický, Radek (advisor)
This thesis describes a process of cracking a password, existing types of attacks and generating passwords using probabilistic grammar. This grammar can be used as an attack that works on the basis of learning from an existing list of passwords and generating them by using constructed context-free grammar from the learning phase. The core of this thesis is the design and implementation of distribution solution for this type of attack. Implementation includes refactoring of existing solution and optimization to maximize use of every available resource.
Blockchain Abstraction Library
Gallovič, Ľubomír ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
This thesis deals with cryptocurrencies and the underlying principles they are based on. It describes the blockchain technology and explores various cryptocurrencies that utilize it with the focus on their similarities and differences. The next part analyzes InsightAPI, the existing tool for real-time Bitcoin blockchain exploration. It then describes the proposed solution for the Ethereum blockchain explorer, highlights the implementation details, and shows results of its testing. The created tool allows the user to quickly gather information about desired blocks, users, and transactions of the Ethereum blockchain.
Towards More Effective Flow Allocation in RINA
Koutenský, Michal ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
This master's thesis focuses on design and implementation of a flow allocator policy which supports bandwidth reservation for the Recursive InterNetwork Architecture (RINA). Each flow has some dedicated bandwidth, which is guaranteed to be available during the whole lifetime of the flow. The allocator, which operates as a distributed system, attempts to find a suitable path in the network graph. To achieve this goal, it must keep the information about link utilization up to date. The proposed allocator has been implemented in the open source project rlite. The first half of the thesis is concerned with congestion control theory, and also studies a number of algorithms used in TCP. Additionally, it contains an overview of the structure of RINA and the Raft consensus algorithm.
Technological IT Course for Internal Education
Orlíček, Michal ; Ryšavý, Ondřej (referee) ; Pluskal, Jan (advisor)
The aim of this bachelor's thesis is to create a technological course on C# programming language for internal education. Prior to the creation of the course itself, the research of relevant study materials, presentation technologies, and development environments was done. From that research, it was possible to choose the appropriate length of the course, its language, the structure of suitable materials, and technologies which were used to create these materials. Additional documents, such as the study plan, the timetable, the annotations, the prerequisites, and the list of the acquired knowledge, are created as well. Last but not least, there are course materials themselves, which contains thirteen theoretical presentations suited for lectures and five practical exercises.
Automation and Accounting of Coffee Machine
Víšek, Jakub ; Ryšavý, Ondřej (referee) ; Pluskal, Jan (advisor)
The goal of this thesis is to design and implement an embedded and information system for automatic accounting of coffee dispensed by a vending machine. Features of the created solution include reliability and portability. The system can be easily extended for use in point of sale applications different to coffee machines. The results enable easy deployment of electronic accounting of purchased products and demonstrate integration of a microcontroller which controls a coffee vending machine on the basis of identifying users by their RFID tags.
Monitoring of the Functionality of Running Applications
Paplauski, Andrei ; Ryšavý, Ondřej (referee) ; Čejka, Rudolf (advisor)
The aim of this work is to create a system that will serve to monitor running applications with a focus on the sphere of air traffic control. The thesis analyzes problems of monitoring the application in the given sphere and proposes an effective solution that could be useful for technicians or administrators of different systems. The system consists of clients running on the control stations, collecting certain data and sending them to the server for the next analysis and display. Standard system and process data are collected, such as memory usage, CPU usage, free disk space, etc. In addition, the client can do a screenshot and analyze how the image has changed from the previous state. The created system can be used to monitor different applications running on different computers in a single system.
Data Type Reconstruction Improvements in RetDec Decompiler
Venger, Adam ; Ryšavý, Ondřej (referee) ; Kolář, Dušan (advisor)
New malware is being continuosly developed. For its effective analysis and fight against it, tools such as decompilers are needed. Decompilation, however, is difficult problem to solve. For the improvement of its results, all of the information contained in binary files needs to be used. Some programming languages require encoding of some symbols in order to be compiled correctly. For example, when compiling functions, the parameter data types and the calling convention are encoded to the function name. This process is called mangling. Thesis deals with reverse process called demangling and its utilization for improvement of the RetDec decompiler. Created library allows demangling of symbols created by popular C++ and Delphi compilers. It combines custom solution with an existing one in the form of LLVM project demangler. Existing demangler library in RetDec was replaced with the new one, results of which are much more reliable. The reconstruction of data types was expanded to use the information obtained from encoded symbols, which resulted in more accurate decompilation.
Collecting Indicators of Compromise from Operating Systems
Procházka, Jiří ; Ryšavý, Ondřej (referee) ; Grégr, Matěj (advisor)
Focus of this thesis is on the design and implementation of an application for gathering indicators of compromise from the systems. In the thesis, there is an introduction to the term indicator of compromise and description of commonly used categories. Next, there is a summary of existing tools with a similar focus. In the thesis, there is a list of some existing formats for sharing of indicators of compromise and selection of format which resulting application uses. After the implementation, application was tested both locally and on infrastructure of cyber exercise.
Security Analysis of Immersive Virtual Reality and Its Implications
Vondráček, Martin ; Ryšavý, Ondřej (referee) ; Pluskal, Jan (advisor)
Virtuální realita je v současné době využívána nejen pro zábavu, ale i pro práci a sociální interakci, kde má soukromí a důvěrnost informací vysokou prioritu. Avšak bohužel, bezpečnostní opatření uplatňovaná dodavateli softwaru často nejsou dostačující. Tato práce přináší rozsáhlou bezpečnostní analýzu populární aplikace Bigscreen pro virtuální realitu, která má více než 500 000 uživatelů. Byly využity techniky analýzy síťového provozu, penetračního testování, reverzního inženýrství a dokonce i metody pro application crippling. Výzkum vedl k odhalení kritických zranitelností, které přímo narušovaly soukromí uživatelů a umožnily útočníkovi plně převzít kontrolu nad počítačem oběti. Nalezené bezpečnostní chyby umožnily distribuci škodlivého softwaru a vytvoření botnetu pomocí počítačového červa šířícího se ve virtuálních prostředích. Byl vytvořen nový kybernetický útok ve virtální realitě nazvaný Man-in-the-Room. Dále byla objevena bezpečnostní chyba v Unity engine. Zodpovědné nahlášení objevených chyb pomohlo zmírnit rizika pro více než půl milionu uživatelů aplikace Bigscreen a uživatele všech dotčených aplikací v Unity po celém světě.
An Analysis of Smart Grid Communication Protocols
Sobotka, Lukáš ; Grégr, Matěj (referee) ; Ryšavý, Ondřej (advisor)
This work deals security of SCADA industry systems which are used in energetic networks. It describes architecture of those systems and also analyze in details two communication protocols -- DNP3 and IEC 60870-5-104.  Next part is devoted to the analysis of anomaly and security threats which can be happen in SCADA systems. The main goal of this work is design and implementation of system which will be able to detect some of threats or anomalies. Also is necessary to propose simulation environment for testing.

National Repository of Grey Literature : 79 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.