National Repository of Grey Literature 17 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Web Applications on the Node.js Platform
Červený, Pavel ; Rychlý, Marek (referee) ; Burget, Radek (advisor)
This bachelor's thesis deals with a design of a Node.js platform web application, using additional tools and technologies, which are used in this kind of development. The main aim of this application is to create a prototype of an educational application, which is going to be used for learning basics of Javascript language. This thesis is divided into several sections. Firstly it describes the technologies which are used to create this application, then a theory for executing source code in web application, design of the application itself, implementation and testing.
Native Code Web Browser Extensions
Vítek, Vojtěch ; Očenášek, Pavel (referee) ; Burget, Radek (advisor)
Nowadays, web applications and browsers are undergoing rapid development - we can say that the progress of Internet technologies is unstoppable phenomenon of the last decade. The need for the best-possible CPU performance in web applications to achieve a smooth user experience is enormous - besides the continuous improvements of existing technologies, we can see several new technologies arising every year. This thesis deals with development of native code web browser extensions whose primary purpose is to use maximum CPU performance as well as efforts to improve the user experience when viewing web pages.
Analysis and Implementation of Virus Pattern Rules
Janeček, Jiří ; Schäfer, Jiří (referee) ; Janoušek, Vladimír (advisor)
This bachelor's thesis deals with analysis and implementation of rules for program, which routes virus samples for their later processing. The expert system is integrated in this program. It was created by using tool called CLIPS. This thesis also describes environment, where program is situated, and importance of component like this in system for virus sample processing. Analyzer has been implemented in C/C++ language.
Environment for analyzing suspicious device
Procházka, Jan ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
This bachelor thesis focuses on a design of enviroment for analysis of a suspicious device. Such device may be for example a disc contaminated by malicious code or a mobile device. The aim of this work is to design an efficient and simple solution using open source products. The final designed environment should be capable of performing both surface and in-depth data analysis. The theoretical part offers an information related to the scope of addressed problem and includes terms such as Sandbox, Malware, Android. These are described from the point of view of understanding the analysis of malware occurring predominantly on mobile devices. The practical part describes the used hardware and software for the design of the environment and it contains examples of analyzes of the external devices contaminated by a malcode. These examples are mainly for Android mobile devices.
Automated Arrangement and Coordination of Processes on the Java Platform
Janyš, Martin ; Smrčka, Aleš (referee) ; Kočí, Radek (advisor)
The subject of this thesis is the topic of the resilience and stability of web applications with a focus on the Java platform. Many existing information systems based not only upon this platform face problems that disturb the stability of applications. These problems may result in the failure, downtime and, consequently, financial or business loss due to the malfunction of the whole service. The aim is to show the problems that the applications face in a production environment and to show how to address them proactively. A possible partial solution to increase the stability may be an appropriate configuration of JVM (Java Virtual Machine), an analysis and corrections of detected errors, or a technique called Sandboxing to increase the stability, which this thesis deals with. Using this technique, it is possible to divide the application into separate parts that cannot influence each other. This prevents the propagation of errors among the parts of the application and thereby increases the stability of the entire application. The target applications include the Java applications made with the help of Spring framework. The Sanboxing technique can be implemented into the applications built this way by means of suitable configuration, which ensures that the application run will be divided into specified parts that will be automatically tested and possibly restarted. The application then recovers itself in the affected areas without a complete failure. The project is called Java Capsules. 
Enhanced Sandboxing for Advanced Malware Families
Sidor, Samuel ; Lieskovan, Tomáš (referee) ; Hajný, Jan (advisor)
This Master’s thesis describes reverse engineering with focus on malware analysis. Reader will be informed about theoretical description of static and dynamic analysis. These techniques are later used on analysis of 5 malware families with focus on detection of used anti-sandbox techniques. After that new theoretical improvements are proposed with detection of anti-sandbox techniques or fully avoiding such anti-sandbox evasion techniques. Finally these changes are implemented on main sandbox of Avast Software from which reader can see how effective these improvements are.
Automated malware analysis based on Cuckoo Sandbox
Hons, Kamil ; Lieskovan, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The bachelor thesis deals with the creation of a controlled environment for an analysis of malicious code, where simulated analysis of a selected sample is conducted and described. Furthermore, the content of the work is a web environment analysis aimed on malvertising campaigns and sharing founded malicious codes.
Detection of Malware Communication in Network Flows
Korvas, Václav ; Matoušek, Petr (referee) ; Ryšavý, Ondřej (advisor)
This thesis deals with the issue of network communication of malicious code, methods of their analysis and especially the comparison of accuracy of different machine learning algorithms among themselves. The paper presents a comparison of the accuracy of different machine learning algorithms, both on test data and when used in real life. Accuracy, F1-score and false positive rate were used as metrics to evaluate the results. On the test data, the Random Forest and XGBoost algorithms were found to be the most accurate, achieving 99.2% accuracy with a rate of false positivity of 0.6%. In real-life experiments, approximately 9% of flows were incorrectly detected and classified as malware. When the computer was compromised, the rate of flows classified as malware increased to 18%, and several indicators of compromise were captured and confirmed the infection of the computer.
Enhanced Sandboxing for Advanced Malware Families
Sidor, Samuel ; Lieskovan, Tomáš (referee) ; Hajný, Jan (advisor)
This Master’s thesis describes reverse engineering with focus on malware analysis. Reader will be informed about theoretical description of static and dynamic analysis. These techniques are later used on analysis of 5 malware families with focus on detection of used anti-sandbox techniques. After that new theoretical improvements are proposed with detection of anti-sandbox techniques or fully avoiding such anti-sandbox evasion techniques. Finally these changes are implemented on main sandbox of Avast Software from which reader can see how effective these improvements are.
Automated malware analysis based on Cuckoo Sandbox
Hons, Kamil ; Lieskovan, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The bachelor thesis deals with the creation of a controlled environment for an analysis of malicious code, where simulated analysis of a selected sample is conducted and described. Furthermore, the content of the work is a web environment analysis aimed on malvertising campaigns and sharing founded malicious codes.

National Repository of Grey Literature : 17 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.