National Repository of Grey Literature 8 records found  Search took 0.00 seconds. 
RdRand: IA-64 and IA-32 Instruction for Random Number Generation
Ťulák, Jan ; Barabas, Maroš (referee) ; Kašpárek, Tomáš (advisor)
Tato práce popisuje implementaci a testování Linuxové knihovny, vytvořené pro poskytnutí abstrakce mezi uživatelem a instrukcí RdRand od Intelu (Ivy Bridge RNG). Samotná instrukce je rovněž zběžně popsána a jsou ověřeny některé její vlastnosti, jako kryptografická bezpečnost výstupních dat a reálná rychlost této instrukce.
Methods of Linux Kernel Hacking
Procházka, Boris ; Malinka, Kamil (referee) ; Vojnar, Tomáš (advisor)
This bachelor thesis focuses on the Linux kernel security from the attacker perspective. It tries to identify and map all key features and methods used by nowadays cyber-terrorists. One of its aims is to give a comprehensive overview of this topic. At final, it can serve as a small reference for everybody who wants to broaden his knowledge of Linux kernel security. The work consists of four parts. The first part repeats and defines basic notions and taxonomy of operation systems. The second and third part form the core. They cover principles and methods used to hide processes, files, connections, etc. The last chaper is devoted to related issues. A supplement of this bachelor thesis is a set of demonstrating modules, which implement discussed problems involved, and tables, where can be found a comparison of nowadays rootkits.
Attack Techniques on ELF/PE Files and Detection
Brunai, Adam ; Jurnečka, Peter (referee) ; Barabas, Maroš (advisor)
This thesis deals with the attack techniques on executable files in Windows OS. Its main goal is to analyze the file infection techniques in terms of their implementation and detection. Before the analysis, the reader will become familiar with executable files. Part of the thesis is demonstration tool named "pein" that solves implementation of infection. In conclusion, the work deals with the malware analysis and detection techniques.
Attack Techniques on ELF/PE Files and Detection
Brunai, Adam ; Jurnečka, Peter (referee) ; Barabas, Maroš (advisor)
This thesis deals with the attack techniques on executable files in Windows OS. Its main goal is to analyze the file infection techniques in terms of their implementation and detection. Before the analysis, the reader will become familiar with executable files. Part of the thesis is demonstration tool named "pein" that solves implementation of infection. In conclusion, the work deals with the malware analysis and detection techniques.
RdRand: IA-64 and IA-32 Instruction for Random Number Generation
Ťulák, Jan ; Barabas, Maroš (referee) ; Kašpárek, Tomáš (advisor)
Tato práce popisuje implementaci a testování Linuxové knihovny, vytvořené pro poskytnutí abstrakce mezi uživatelem a instrukcí RdRand od Intelu (Ivy Bridge RNG). Samotná instrukce je rovněž zběžně popsána a jsou ověřeny některé její vlastnosti, jako kryptografická bezpečnost výstupních dat a reálná rychlost této instrukce.
Methods of Linux Kernel Hacking
Procházka, Boris ; Malinka, Kamil (referee) ; Vojnar, Tomáš (advisor)
This bachelor thesis focuses on the Linux kernel security from the attacker perspective. It tries to identify and map all key features and methods used by nowadays cyber-terrorists. One of its aims is to give a comprehensive overview of this topic. At final, it can serve as a small reference for everybody who wants to broaden his knowledge of Linux kernel security. The work consists of four parts. The first part repeats and defines basic notions and taxonomy of operation systems. The second and third part form the core. They cover principles and methods used to hide processes, files, connections, etc. The last chaper is devoted to related issues. A supplement of this bachelor thesis is a set of demonstrating modules, which implement discussed problems involved, and tables, where can be found a comparison of nowadays rootkits.
Attacks on the Linux Operating System in Theory and Practice
Procházka, Boris ; Hanáček, Petr (referee) ; Vojnar, Tomáš (advisor)
This master's thesis deals with Linux kernel security from the attacker's point of view. It maps methods and techniques of disguising the computing resources used by today's IT pirates. The thesis presents a unique method of attack directed on the system call interface and implemented in the form of two tools (rootkits). The thesis consists of a theoretical and a practical part. Emphasis is placed especially on the practical part, which manifests the presented information in the form of experiments and shows its use in real life. Readers are systematically guided as far as the creation of a unique rootkit, which is capable of infiltrating the Linux kernel by a newly discovered method -- even without support of loadable modules. A part of the thesis focuses on the issue of detecting the discussed attacks and on effective defence against them.
Malware analysis and reverse engineering
Šváb, Martin ; Čermák, Igor (advisor) ; Hlaváč, Jindřich (referee)
Focus of this thesis is reverse engineering in information technology closely linked with the malware analysis. It explains fundamentals of IA-32 processors architecture and basics of operating system Microsoft Windows. Main part of this thesis is dedicated to the malware analysis, including description of creating a tool for simplification of static part of the analysis. In Conclusion various approaches to the malware analysis, which were described in previous part of the thesis, are practically demonstrated on unknown malware sample.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.