National Repository of Grey Literature 11 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Bezpečnostní auditor WWW stránek
Steinhauser, Antonín ; Novotný, Miroslav (advisor) ; Kruliš, Martin (referee)
This work solves the problematics of web pages security primarily from the side of dynamic web application programmers. It describes single mistakes, that programmers perpetrate and declares, how is possible prevent these mistakes and what unpleasant possibilities of abuse these mistakes offer to potential attackers. The main part of the work is the program, which machinely searches majority of those errors. It functions in two phases - in the rst phase it explores a domain or alternatively de ned set of pages and detects potentially vulnerable locations and in the second phase it sends attack queries to these locations and by analysis of its replies detects security vulnerabilities.
IPv6 for HelenOS
Steinhauser, Antonín
This thesis extends HelenOS operating system in order to be IPv6 capa- ble. New IPv6 protocol implementation is on the same level as previous IPv4 protocol implementation. HelenOS networking stack now offers three modes of networking: IPv4-only, IPv6-only and dual stack mode. Dual stack mode enables usage of both protocols at once. The thesis describes previous state of HelenOS networking stack, analyzes differences between IPv4 and IPv6 protocols and gives reasons for single strategic decisions. In fine, it describes used implementation and debugging techniques, concludes results and compares HelenOS with other microkernel operating system from the IPv6-capability perspective. 1
New Approaches Towards Automated XSS Flaw Detection
Steinhauser, Antonín ; Tůma, Petr (advisor) ; Vorobyov, Kostyantyn (referee) ; Bureš, Miroslav (referee)
Cross-site scripting (XSS) flaws are a class of security flaws particular to web applications. XSS flaws generally allow an attacker to supply affected web application with a malicious input that is then included in an output page without being properly encoded (sanitized). Recent advances in web applica- tion technologies and web browsers introduced various prevention mechanisms, narrowing down the scope of possible XSS attacks, but those mechanisms are usually selective and prevent only a subset of XSS flaws. Among the types of XSS flaws that are largely omitted are the context- sensitive XSS flaws. A context-sensitive XSS flaw occurs when the potentially malicious input is sanitized by the affected web application before being included in the output page, but the sanitization is not appropriate for the browser con- text of the sanitized value. Another type of XSS flaws, which is already better known, but still insufficiently prevented, are the stored XSS flaws. Applica- tions affected by the stored XSS flaws store the unsafe client input in persistent storage and return it in another HTTP response to (possibly) another client. Our work is focused on advancing state-of-the-art automated detection of those two types of XSS flaws using various analysis techniques ranging from purely static analysis to dynamic graybox analysis.
Distributed video compression in the peer to peer networks
Hudeček, Vojtěch ; Steinhauser, Antonín (advisor) ; Jiráček, Zbyněk (referee)
Despite today's computers' performance there still exist some tasks that are quite time demanding. Nature of some of these tasks allows to split them into smaller parts that can be processed in parallel. Distributing work among more computers in order to speed up such processes is a common technique. However, most of the approaches use client-server architecture to achieve this goal. We provide purely peer-to-peer solution which allows high level of scalability, error recovery and easy maintaining. No special role is needed in our framework and each node can join the network at any time. Also the system is able to deal with node failures, keeping the overall computation time reasonable. Tests showed that significant improvement can be achieved in local area networks. 1
IPv6 for HelenOS
Steinhauser, Antonín
This thesis extends HelenOS operating system in order to be IPv6 capa- ble. New IPv6 protocol implementation is on the same level as previous IPv4 protocol implementation. HelenOS networking stack now offers three modes of networking: IPv4-only, IPv6-only and dual stack mode. Dual stack mode enables usage of both protocols at once. The thesis describes previous state of HelenOS networking stack, analyzes differences between IPv4 and IPv6 protocols and gives reasons for single strategic decisions. In fine, it describes used implementation and debugging techniques, concludes results and compares HelenOS with other microkernel operating system from the IPv6-capability perspective. 1
Network Capacity Optimization on UNIX
Pelikán, Martin ; Galamboš, Leo (advisor) ; Steinhauser, Antonín (referee)
Title: Optimizing the utilization of networks' capacity on unix-like systems Author: Martin Pelikán Department: Department of Distributed and Dependable Systems Supervisor: RNDr. Leo Galamboš, Ph. D., Department of Distributed and De- pendable Systems Abstract: Modern unix-like systems contain very powerful network stacks with configuration options often beyond operators' understanding. A comparison of available algorithms, documentation and visualization of certain components help their understanding, leading to better configuration choices. By explaining the network stack from the drivers up to the network layer will exhibit problems with timekeeping, burst traffic processing or queue management with regard to classification, scheduling or traffic regulation options in Linux or OpenBSD. The thesis works as an overview of implemented algorithms and updated documen- tation of Linux's actions and filters, while the implementation introduces a new portable tool to visualize existing configuration on remote machines without the need of modifying them. Keywords: network internals, traffic shaping, traffic classification, queue ma- nagement 1
OpenMP for Java
Bělohlávek, Petr ; Steinhauser, Antonín (advisor) ; Kruliš, Martin (referee)
Due to its backward compatibility, multi-threaded programming in Java is often performed ineffectively and repels inexperienced programmers from development of parallel applications. This thesis introduces omp4j - an OpenMP-like preprocessor that supports Java language standards 6, 7 and 8 without any runtime dependencies. Furthermore, the thesis develops a scalable and portable solution for all commonly used JDKs. The combination of the syntax and bytecode analyses is employed by the preprocessor in order to parallelize the source code. The developed project may be used either as a CLI utility or as a third-party library for Java and Scala projects. The latter possibility is demonstrated in an online demo which was developed together with the project website - www.omp4j.org. Additionally, the performance evaluation, which discusses various aspects of the implemented preprocessor, is presented and the comparisons to the related C++ and Java solutions are elaborated. In comparison to the similar projects, significantly better scalability of omp4j is proven at significance level alpha = 0.01 for some of the benchmarks. Powered by TCPDF (www.tcpdf.org)
Liability of the particular participants of Internet plant and P2P file sharing networks
Steinhauser, Antonín ; Žikovská, Petra (referee) ; Wünschová Pujmanová, Alexandra (referee)
The thesis begins with liability definition, its types (civil, criminal, administrative) and their particular occurences within all legal aspects of internet plant. Then it groups internet plant participants into some categories (users, ISP, definition authorities) and analyzes the liability issue from the point of view of each single category. Also deals with inevitably international nature of internet plant and connected questions of jurisdiction and applicable law. The same chapter explores participant's liability for internet plant and data content, whose originator is someone else, and for ISP role it analyzes its limitation incorporated in legal institute called safe harbor. It describes safe harbor from historical and international perspective and demonstrates it on US and German legislatures. Lastly this chapter compares legal regulations of safe harbour in various countries and adjudicates Czech transposition of its EU framework. As a practical application this theses deals with sharing P2P networks theme (chiefly with BitTorrent) and in the conclusion it proposes legislative changes (de lege ferenda) constiting mainly in objective liability for IP adress.
IPv6 for HelenOS
Steinhauser, Antonín ; Děcký, Martin (advisor) ; Tůma, Petr (referee)
This thesis extends HelenOS operating system in order to be IPv6 capa- ble. New IPv6 protocol implementation is on the same level as previous IPv4 protocol implementation. HelenOS networking stack now offers three modes of networking: IPv4-only, IPv6-only and dual stack mode. Dual stack mode enables usage of both protocols at once. The thesis describes previous state of HelenOS networking stack, analyzes differences between IPv4 and IPv6 protocols and gives reasons for single strategic decisions. In fine, it describes used implementation and debugging techniques, concludes results and compares HelenOS with other microkernel operating system from the IPv6-capability perspective. 1
Liability of the particular participants od Internet plant
Steinhauser, Antonín ; Žikovská, Petra (advisor) ; Wünschová Pujmanová, Alexandra (referee)
The thesis begins with liability definition, its types (civil, criminal, administrative) and their particular occurences in legal protection of intelectual property on Internet. Then it groups internet plant participants into some categories (users, ISP, definition authorities) and analyzes the liability issue from the point of view of each single category. The same chapter explores participant's liability for internet plant and data content, whose originator is someone else, and for ISP role it analyzes its limitation incorporated in legal institute called safe harbor. It describes safe harbor from historical and international perspective and demonstrates it on US and German legislatures. Lastly this chapter compares legal regulations of safe harbour in various countries and adjudicates Czech transposition of its EU framework. As a practical application this theses deals with P2P networks theme (chiefly with BitTorrent) and in the conclusion it proposes legislative changes (de lege ferenda) constiting mainly in objective liability for IP adress.

National Repository of Grey Literature : 11 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.