Národní úložiště šedé literatury Nalezeno 12 záznamů.  1 - 10další  přejít na záznam: Hledání trvalo 0.00 vteřin. 
Automatic Seccomp Syscall Policy Generator
Tamaškovič, Marek ; Smrčka, Aleš (oponent) ; Turoňová, Lenka (vedoucí práce)
This thesis deals with design and implementation of the tool which transforms a system call log into a policy that limits the system call usage in operating system GNU Linux. The motivation raised as a need for automatic creation such policies. In this thesis, we dealt with the intermediate data structure that represents the system call log. We dealt with simplification of the data structure on which were used optimization algorithms. The first implemented algorithm was minimax and the other was clustering algorithm DBSCAN. In the last part of the thesis, the testing methods are described. We tested the particular modules and the whole tool as a unit. During the testing, issues that prevent from complex testing, arised.
Simulator for Verifying the Properties of DAG-Based Consensus Protocols
Hladký, Tomáš ; Tamaškovič, Marek (oponent) ; Malinka, Kamil (vedoucí práce)
In recent years, blockchain has received significant attention in the research community. Since then, several submissions have been proposed to respond to the Proof-of-Work blockchains throughput problem. We study existing Directed Acyclic Graph (DAG) blockchain designs that propose to solve this problem, especially protocols PHANTOM and its optimization GHOSTDAG. They utilize a Bitcoin protocol and propose a random transaction selection, resulting in increased transaction throughput. However, it has been proved by a simulation that actors that use the random transaction selection strategy have less profit than actors who do not follow the protocol and select transactions rationally (i.e., most profitable). That proof has been made on a small network of ten nodes with a circle topology. This article aims to extend, optimize, and automate an existing blockchain simulator. We implement a Bitcoin-like network topology with realistic block propagation latency. Furthermore, we optimize the simulator to run more simulations in parallel and faster, including automation tools that can modify input configurations, perform a combination of runs on multiple CPU cores based on input parameters, and analyze profits and transaction collisions. Finally, we perform experiments to verify malicious actors' advantages in a Bitcoin-like network and create a payoff function to punish this behavior.
Security and Usability Analysis of Cryptocurrency Wallets
Brna, Filip ; Homoliak, Ivan (oponent) ; Tamaškovič, Marek (vedoucí práce)
This thesis aims to analyze the security and usability of cryptocurrency wallets of different categories. The work is focused on familiarizing with the most used cryptocurrency wallets, threats related to their use, subsequent testing of the selected wallets with the proposed test scenarios, and evaluation of the testing supplemented with the definition of several recommendations for their proper use. In the systematic testing, the method of designing test scenarios was used, followed by systematic testing, and finally, the results were evaluated. The research conducted found that the most widely used cryptocurrency wallets achieve a high level of security against the described threats and offer a wide range of possibilities for their use. The results of this work allow users to understand the issues associated with storing and handling cryptocurrencies more efficiently. Based on the results of the testing, the user has the possibility to choose a cryptocurrency wallet precisely according to his user's needs and security requirements.
Fast, Scalable and DoS-Resistant Proof-of-Stake Consensus Protocol Based on an Anonymization Layer
Tamaškovič, Marek ; Veselý, Vladimír (oponent) ; Homoliak, Ivan (vedoucí práce)
In this work, we summarized research in the state-of-the-art Proof-of-Stake protocols like Algorand, Tendermint, and LaKSA. We analyzed and summarized their features and issues. Based on the included research we implement a new PoS protocol that mitigates issues with throughput, scalability, and security.
Utilization of Blockchain Technology in the Area of Mechanical Engineering
Džupa, Oliver ; Perešíni, Martin (oponent) ; Tamaškovič, Marek (vedoucí práce)
This bachelor’s thesis focuses on utilization of blockchain technology in the area of mechanical engineering. The first part is devoted to a full understanding of blockchain and smart contracts. The second part summarizes the use cases for both mechanical engineering and non-mechanical engineering fields and identifies features presented by blockchain. The third part is focused on case studies of conceptual utilization of blockchains in mechanical engineering and comparison with centralized solutions.
Implement Rubber Duckies on Available USB Devices and Make a Practical Test
Do, Hung ; Holop, Patrik (oponent) ; Tamaškovič, Marek (vedoucí práce)
This thesis deals with computer security attack named BadUSB, implements an example device (Rubber Ducky) and looks for a defense against these types of attack. My task is to analyze the functionality of Universal Serial Bus, communication between the host and device and its shortcomings against BadUSB attacks. For that I implemented a composite USB device on Raspberry Pi Pico using an external open source library TinyUSB. And with a working prototype I present reader a few possible defense mechanisms against these kinds of devices and attacks on Microsoft Windows and GNU/Linux operating systems. The contribution of this thesis is to warn people about the weakness of USB's plug-and-play feature and the danger of connecting unknown USB devices to our computers.
Monitoring and Reporting Tool for Cloned Vulnerabilities across Open-Source Projects
Remeň, Matúš ; Tamaškovič, Marek (oponent) ; Holop, Patrik (vedoucí práce)
The presented thesis discusses vulnerabilities present in open-source projects, focusing on source code adoption among the projects by code cloning. In the scope of this thesis, the types of source-code clones and their detection procedures are discussed. Furthermore, a tool allowing evaluation and execution of the discussed detection methods was designed and implemented. The tool and detection methods were evaluated and tested on real-world examples.
Utilization of Blockchain Technology in the Area of Mechanical Engineering
Džupa, Oliver ; Perešíni, Martin (oponent) ; Tamaškovič, Marek (vedoucí práce)
This bachelor’s thesis focuses on utilization of blockchain technology in the area of mechanical engineering. The first part is devoted to a full understanding of blockchain and smart contracts. The second part summarizes the use cases for both mechanical engineering and non-mechanical engineering fields and identifies features presented by blockchain. The third part is focused on case studies of conceptual utilization of blockchains in mechanical engineering and comparison with centralized solutions.
Security and Usability Analysis of Cryptocurrency Wallets
Brna, Filip ; Homoliak, Ivan (oponent) ; Tamaškovič, Marek (vedoucí práce)
This thesis aims to analyze the security and usability of cryptocurrency wallets of different categories. The work is focused on familiarizing with the most used cryptocurrency wallets, threats related to their use, subsequent testing of the selected wallets with the proposed test scenarios, and evaluation of the testing supplemented with the definition of several recommendations for their proper use. In the systematic testing, the method of designing test scenarios was used, followed by systematic testing, and finally, the results were evaluated. The research conducted found that the most widely used cryptocurrency wallets achieve a high level of security against the described threats and offer a wide range of possibilities for their use. The results of this work allow users to understand the issues associated with storing and handling cryptocurrencies more efficiently. Based on the results of the testing, the user has the possibility to choose a cryptocurrency wallet precisely according to his user's needs and security requirements.
Simulator for Verifying the Properties of DAG-Based Consensus Protocols
Hladký, Tomáš ; Tamaškovič, Marek (oponent) ; Malinka, Kamil (vedoucí práce)
In recent years, blockchain has received significant attention in the research community. Since then, several submissions have been proposed to respond to the Proof-of-Work blockchains throughput problem. We study existing Directed Acyclic Graph (DAG) blockchain designs that propose to solve this problem, especially protocols PHANTOM and its optimization GHOSTDAG. They utilize a Bitcoin protocol and propose a random transaction selection, resulting in increased transaction throughput. However, it has been proved by a simulation that actors that use the random transaction selection strategy have less profit than actors who do not follow the protocol and select transactions rationally (i.e., most profitable). That proof has been made on a small network of ten nodes with a circle topology. This article aims to extend, optimize, and automate an existing blockchain simulator. We implement a Bitcoin-like network topology with realistic block propagation latency. Furthermore, we optimize the simulator to run more simulations in parallel and faster, including automation tools that can modify input configurations, perform a combination of runs on multiple CPU cores based on input parameters, and analyze profits and transaction collisions. Finally, we perform experiments to verify malicious actors' advantages in a Bitcoin-like network and create a payoff function to punish this behavior.

Národní úložiště šedé literatury : Nalezeno 12 záznamů.   1 - 10další  přejít na záznam:
Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.