National Repository of Grey Literature 55 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
LoRaWAN Traffic Analysis via SDR
Jál, Michal ; Hanáček, Petr (referee) ; Hujňák, Ondřej (advisor)
This id about implementing LoRaWAN sniffer using software-defined radio LimeSDR. And analyzing LoRaWAN communication with this device. Part of the work is a description of LoRa modulation and introduction of the LoRaWAN network layer.
A Tool for Easily Securing Computers with Linux
Barabas, Maroš ; Hanáček, Petr (referee) ; Vojnar, Tomáš (advisor)
The purpose of this thesis is to explain new approaches to scanning and locking vulnerabilities in computer security and to design a new system to improve security of computers running the Linux operating system. The purpose of this system is to analyze remote operating systems and detect and lock down vulnerabilities by existing security standards.
Distribution of Location-Based Information in Mobile Applications
Bátrla, Tomáš ; Hrubý, Martin (referee) ; Hanáček, Petr (advisor)
Master thesis is focused on retrieval of multimedia information based on location of mobile device. Paper describes mobile platforms technology and technology behind location sensing and two-dimensional barcode recognition. There is also included design of client-server architecture for information retrieval of location based multimedia data. Master thesis includes report of system testing and some ideas about new features for implemented location based information distribution system.
Privacy Protection on Mobile Devives
Aron, Lukáš ; Hudec,, Ladislav (referee) ; Drahanský, Martin (referee) ; Hanáček, Petr (advisor)
Tato práce analyzuje ochranu citlivých dat na mobilních zařízeních a představuje metodu pro ochranu těchto dat před možností úniku informaci ze zařízení. Ochrana se zaměřuje na využívání zařízení, jak pro osobní účely, tak i v pracovním prostředí. Koncept navrženého řešení je implementován ve formě prototypu. Model implementace je verifikován s modelem požadovaného chování. Součástí práce jsou experimenty s prototypem a experimenty zaměřené na verifikaci mezi danými modely.
Analysis of wireless network attacks
Kačic, Matej ; Dočkal,, Jaroslav (referee) ; Zbořil, František (referee) ; Hanáček, Petr (advisor)
This work describes security mechanisms of wireless network based on 802.11 standard and security enhancement 802.11i of these networks known as WPA2, where the analysis of vulnerabilities and attacks on these networks were performed. The work discusses two major security issues. The first is unsecure management frames responsible for vulnerability with direct impact on availability and the other is the vulnerability that allows executing the impersonalize type of attacks. The system for generation attacks was designed to realize any attack very fast and efficient. The core of the thesis is the design of a system for attack analysis using the principle of trust and reputation computation. The conclusion of the work is devoted to experimenting with the proposed system, especially with the selection of suitable metrics for calculating the trust value.
Design Patterns for Parallel and Distributed Systems
Jurnečka, Peter ; Chudá, Daniela (referee) ; Zbořil, František (referee) ; Hanáček, Petr (advisor)
This Ph.D. thesis describes proposed notation and method for working with parallel design patterns, which allowes proposing of automatic corrections to existing parallel source code with help of refactoring. In order to define the proposed notation, this work must cover areas of static code analysis, formal description of parallel design patterns and refactoring. Static code analysis is used to analyse the existing parallel source code for definition of places where you want to insert specified design pattern. Formal description of design pattern allows you to automatically apply the pattern to the existing source code. Finally, refactoring allows you to edit an existing source code without changing its functionality. The first part is devoted to the description of the current status in these three areas e.g. code analysis, design patterns and refactoring. The second part is devoted to a description of the methodology and experimental verification of its deployment.
Security analysis of network traffic using behavioral signatures
Barabas, Maroš ; Hujňák,, Petr (referee) ; Zelinka,, Ivan (referee) ; Hanáček, Petr (advisor)
This thesis focuses on description of the current state of research in the detection of network attacks and subsequently on the improvement of detection capabilities of specific attacks by establishing a formal definition of network metrics. These metrics approximate the progress of network connection and create a signature, based on behavioral characteristics of the analyzed connection. The aim of this work is not the prevention of ongoing attacks, or the response to these attacks. The emphasis is on the analysis of connections to maximize information obtained and definition of the basis of detection system that can minimize the size of data collected from the network, leaving the most important information for subsequent analysis. The main goal of this work is to create the concept of the detection system by using defined metrics for reduction of the network traffic to signatures with an emphasis on the behavioral aspects of the communication. Another goal is to increase the autonomy of the detection system by developing an expert knowledge of honeypot system, with the condition of independence to the technological aspects of analyzed data (e.g. encryption, protocols used, technology and environment). Defining the concept of honeypot system's expert knowledge in the role of the teacher of classification algorithms creates autonomy of the~system for the detection of unknown attacks. This concept also provides the possibility of independent learning (with no human intervention) based on the knowledge collected from attacks on these systems. The thesis describes the process of creating laboratory environment and experiments with the defined network connection signature using collected data and downloaded test database. The results are compared with the state of the art of the network detection systems and the benefits of the proposed approximation methods are highlighted.
Extraction of Static Features from Binary Applications for Malware Analysis
Pružinec, Jakub ; Hanáček, Petr (referee) ; Kolář, Dušan (advisor)
Podoby škodlivého software sa deň čo deň menia a vyvíjajú. Vzniká tak nutnosť jednostaj tvoriť, aktualizovať a zlepšovať metódy na analýzu škodlivého software. Jedným z možných prístupov ako bojovať proti škodlivému software je klasifikovať ho na základe určitých statických charakteristík. Táto práca sa zaoberá návrhom a extrakciou týchto čŕt z binárnych spustiteľných súborov. Cieľom tejto práce je obohatiť nástroj na extrakciu statických rysov o extrakciu nových rysov a overenie ich účinnosti pri klasifikácii škodlivého software. Nástroj je vyvíjaný v spolupráci so spoločnosťou Avast, kde sa používa v systéme zhlukovej analýze.
Second SIM Slot as a Secure Element
Oškera, Jan ; Peringer, Petr (referee) ; Hanáček, Petr (advisor)
This bachelor thesis deals with design and implementation use of dual slot in GSM phone like security element. For this purpose, you need to create a SAM that supports GSM functionality. Or use existing SAM that support this functionality, such cards are called SIM/USIM.
Wireless Communication for Home Automation
Sezima, Václav ; Janoušek, Vladimír (referee) ; Hanáček, Petr (advisor)
This bachelor's thesis deals with the issue of wireless communication among devices and sensors for home automation. The goal is to design and implement a device known as the gateway that is passing messages and commands between sensors and controller that controls them from central point, e.g. computer or mobile phone. A part of this thesis is also a creation of several sensors for the purpose of testing and demonstration. The gateway and sensors are based on development boards WEMOS and Arduino and supports multiple wireless technologies for communication with among themselves and controller.

National Repository of Grey Literature : 55 records found   1 - 10nextend  jump to record:
See also: similar author names
2 Hanáček, Patrik
3 Hanáček, Pavel
Interested in being notified about new results for this query?
Subscribe to the RSS feed.