In many fields, application software must be stable and withstand attacks. Due to the trend of the "Internet of Things" these attacks increase in all areas where devices are connected via the open network. Meanwhile, even everyday devices such as smartphones, tablets and measuring instruments, on which the concrete focus of this thesis lies, have evolved into powerful universal devices with an open system architecture. It should be noted that IT systems running conventional operating systems can be barely protected. New approaches for measuring instruments are needed to counter the growing number of threats. With the use of separation kernels, the components of a software system can be isolated in terms of space as well as time, which makes...
Die Sicherheit von IT-Systemen stellt eine der großen Herausforderungen in der Zukunft dar. Die stei...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Die Sicherheit und Zuverlässigkeit von Anwendungen, welche schutzwürdige Daten verarbeiten, lässt si...
With the introduction of the Internet at the end of the last century the modern society was fundamen...
In Europe, all measuring instruments under legal control have to pass a conformity assessment to pro...
Embedded systems show the tendency of becoming more and more connected. This fact combined with the ...
Standard procedures in computer forensics mainly describe the acquisition and analysis of persistent...
The growing demands of users and industry have led to an increase in both size and complexity of dep...
In dieser Bachelorarbeit steht die Untersuchung eines IoT-Gerätes im Fokus. Das Smart Home Security ...
Angreifern gelingt es immer wieder Geräte des Internet of Things für ihre Zwecke zu verwenden, allen...
In der Bachelorarbeit geht es um die Firmwareanalyse von Internet of Things-Geräten. Die Erstellung ...
In der modernen IT-Landschaft steigt die Anzahl der im Einsatz befindlichen Linux-Geräte stetig. Die...
Computer werden heute zunehmend durch kleine Recheneinheiten mit Sensoren zur Erfassung der Außenwel...
Within the past thirty years we have seen computers rise from room sized niche equipment to handy po...
[EN] In this new era of technology and interconnected systems, the number of devices connected to th...
Die Sicherheit von IT-Systemen stellt eine der großen Herausforderungen in der Zukunft dar. Die stei...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Die Sicherheit und Zuverlässigkeit von Anwendungen, welche schutzwürdige Daten verarbeiten, lässt si...
With the introduction of the Internet at the end of the last century the modern society was fundamen...
In Europe, all measuring instruments under legal control have to pass a conformity assessment to pro...
Embedded systems show the tendency of becoming more and more connected. This fact combined with the ...
Standard procedures in computer forensics mainly describe the acquisition and analysis of persistent...
The growing demands of users and industry have led to an increase in both size and complexity of dep...
In dieser Bachelorarbeit steht die Untersuchung eines IoT-Gerätes im Fokus. Das Smart Home Security ...
Angreifern gelingt es immer wieder Geräte des Internet of Things für ihre Zwecke zu verwenden, allen...
In der Bachelorarbeit geht es um die Firmwareanalyse von Internet of Things-Geräten. Die Erstellung ...
In der modernen IT-Landschaft steigt die Anzahl der im Einsatz befindlichen Linux-Geräte stetig. Die...
Computer werden heute zunehmend durch kleine Recheneinheiten mit Sensoren zur Erfassung der Außenwel...
Within the past thirty years we have seen computers rise from room sized niche equipment to handy po...
[EN] In this new era of technology and interconnected systems, the number of devices connected to th...
Die Sicherheit von IT-Systemen stellt eine der großen Herausforderungen in der Zukunft dar. Die stei...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Die Sicherheit und Zuverlässigkeit von Anwendungen, welche schutzwürdige Daten verarbeiten, lässt si...