Národní úložiště šedé literatury Nalezeno 7 záznamů.  Hledání trvalo 0.00 vteřin. 
Fingerprinting Attacks on Anonymity Systems
Krajči, Martin ; Holop, Patrik (oponent) ; Malinka, Kamil (vedoucí práce)
This thesis deals with fingerprinting attacks in anonymization systems, mostly in the Tor network. Such an attack was designed and executed in a real-world environment, with an aim to show the impact of errors from previous studies. Three closed-world datasets and one open-world dataset were gathered and then used for training and testing of N-shot learning classifier. The first dataset was gathered by browsing websites with a web browser in the default configuration, the second dataset was gathered in the same configuration as in the first case, but from a different country, and the third dataset was gathered by browsing websites with a web browser with Adblock Plus plugin turned on and Spanish locale set. When both training and testing the classifier on the first dataset, the average accuracy of classification was 92%. However, when training the classifier on the first dataset and testing on the second and third dataset, the average accuracy of classification was 38,58% and 39,65% respectively.
Tool for Automated Penetration Testing of Web Servers
Rajecký, Michal ; Holop, Patrik (oponent) ; Malinka, Kamil (vedoucí práce)
This thesis delves into the topic of cybersecurity, with an~ emphasis on the security of web servers. It covers the technologies that are employed to protect web servers from a variety of common security threats. Furthermore, this work explores the detection of these weaknesses using various penetration testing methodologies along with OWASTP Top 10. A framework for automatic testing of web servers is developed in the practical part of the thesis. This framework integrates features from several tools and provides support for user-defined modules. Lastly, its functionality is verified in a simulated environment.
Implement Rubber Duckies on Available USB Devices and Make a Practical Test
Do, Hung ; Holop, Patrik (oponent) ; Tamaškovič, Marek (vedoucí práce)
This thesis deals with computer security attack named BadUSB, implements an example device (Rubber Ducky) and looks for a defense against these types of attack. My task is to analyze the functionality of Universal Serial Bus, communication between the host and device and its shortcomings against BadUSB attacks. For that I implemented a composite USB device on Raspberry Pi Pico using an external open source library TinyUSB. And with a working prototype I present reader a few possible defense mechanisms against these kinds of devices and attacks on Microsoft Windows and GNU/Linux operating systems. The contribution of this thesis is to warn people about the weakness of USB's plug-and-play feature and the danger of connecting unknown USB devices to our computers.
Monitoring and Reporting Tool for Cloned Vulnerabilities across Open-Source Projects
Remeň, Matúš ; Tamaškovič, Marek (oponent) ; Holop, Patrik (vedoucí práce)
The presented thesis discusses vulnerabilities present in open-source projects, focusing on source code adoption among the projects by code cloning. In the scope of this thesis, the types of source-code clones and their detection procedures are discussed. Furthermore, a tool allowing evaluation and execution of the discussed detection methods was designed and implemented. The tool and detection methods were evaluated and tested on real-world examples.
Řízení bezpečnosti v malých a středních podnicích
Olej, Vojtěch ; Holop, Patrik (oponent) ; Malinka, Kamil (vedoucí práce)
Bakalářská práce se zabývá sestavením vlastní metodiky pro řízení rizik na základě již existujících standardů, uplatnitelné v malých a středních podnicích v České republice. V teoretické části jsou analyzovány zákonné povinnosti, existující standardy a současná situace. Do praktické části se řadí návrh metodiky, nasazení ve vybrané firmě a zhodnocení použitelnosti.
Secure Coding Guidelines for Python
Zádrapa, Jan ; Holop, Patrik (oponent) ; Malinka, Kamil (vedoucí práce)
With the number of cyberattacks and their costs rising, the demand for secure coding also rises. Python is an indivisible part of this problem as the favourite programming language. Many programmers can code in Python, but they can not code securely. Python does not have any official secure coding guidelines, and its educational materials on this topic are insufficient. This thesis aims to inform about the most significant Python coding vulnerabilities and bring solutions to these vulnerabilities. It also aims to raise the public's awareness with the help of new secure coding guidelines and educational tool. The educational tool as a web application should be well arranged and usable for the public. The tool also includes real-life examples of exploits from vulnerabilities explained in the guidelines.
Classification of Potentially Malicious File Clusters via Machine Learning
Holop, Patrik ; Zendulka, Jaroslav (oponent) ; Bartík, Vladimír (vedoucí práce)
This thesis proposes an alternative to currently used malware classification approaches on the file-level often based on the detection of specific byte sequences. The experimentation proved that a cluster-level classification based on the shared properties of files in the cluster is possible. That was achieved by a careful selection of the properties of the three file types - PE, APK and .NET. By comparing various machine learning methods the highest scoring classifiers were selected and a web service providing API for classification was implemented, which was used for the integration with the internal clustering system of the Avast company. This thesis also discusses drawbacks of the proposed  approach and suggests steps for improving the classification.

Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.