Národní úložiště šedé literatury Nalezeno 3 záznamů.  Hledání trvalo 0.00 vteřin. 
Confidentiality-preserving computations using homomorphic encryption
Rybár, Matej ; Ricci, Sara (oponent) ; Člupek, Vlastimil (vedoucí práce)
This master's thesis examines homomorphic encryption, focusing on theoretical foundations, security principles, and practical applications. The TFHE library's Rust variant (TFHE-rs) was selected for its performance and security. A military usage scenario involving the Military Grid Reference System (MGRS) was developed to demonstrate secure cloud computing. Homomorphic implementations of MGRS conversion, square root calculations, IEEE 754 floating-point representation, integer-based square root, floating-point square root, and SHA-256 hashing were created. Performance benchmarks showed the homomorphic floating-point square root required approximately 22 seconds and SHA-256 about 10 seconds. The thesis describes the process from receiving MGRS coordinates to returning the computed distance with its hash, detailing a secure client-server architecture. Docker Compose simulated the cloud environment, with Ansible automating deployment. The frontend, developed with React and Leaflet, provides an interactive interface. The successful implementation highlights the feasibility and significance of homomorphic encryption for enhancing data security.
Hiding and obfuscation of malware to avoid antivirus detection
Rybár, Matej ; Dzurenda, Petr (oponent) ; Casanova-Marqués, Raúl (vedoucí práce)
During security assessments, it is fairly uncommon for someone to be persuaded that antivirus software does not provide total security. When a penetration tester comes across antivirus software, there are times when he or she must act quickly. For these and other reasons, a variety of methods for getting around antivirus software have been devised. Some of these obfuscation approaches aim to escape static analysis by modifying and manipulating the Portable Executable file format, which is a standardized Windows executable file format. Several types of malware change the PE file format to avoid static antivirus detection. This thesis delves into the PE file format, malware detection, and static detection of obfuscation techniques. This thesis's result is a scantime crypter Persesutor, which encrypts the input file and then decrypts and loads the encrypted file into memory after execution.
Hiding and obfuscation of malware to avoid antivirus detection
Rybár, Matej ; Dzurenda, Petr (oponent) ; Casanova-Marqués, Raúl (vedoucí práce)
During security assessments, it is fairly uncommon for someone to be persuaded that antivirus software does not provide total security. When a penetration tester comes across antivirus software, there are times when he or she must act quickly. For these and other reasons, a variety of methods for getting around antivirus software have been devised. Some of these obfuscation approaches aim to escape static analysis by modifying and manipulating the Portable Executable file format, which is a standardized Windows executable file format. Several types of malware change the PE file format to avoid static antivirus detection. This thesis delves into the PE file format, malware detection, and static detection of obfuscation techniques. This thesis's result is a scantime crypter Persesutor, which encrypts the input file and then decrypts and loads the encrypted file into memory after execution.

Viz též: podobná jména autorů
2 Rybár, Marek
1 Rybár, Miroslav
2 Rybář, Marian
6 Rybář, Martin
2 Rybář, Milan
Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.