Browsing Tesi di laurea (dall'anno accademico 2011/2012) by Author "Focardi, Riccardo"

DSpace/Manakin Repository

Browsing Tesi di laurea (dall'anno accademico 2011/2012) by Author "Focardi, Riccardo"

Sort by: Order: Results:

  • Camoli, Filippo <1996> (Università Ca' Foscari Venezia, 2022-07-21)
    The thesis work consists in the research and analysis of the cryptographic non-conformities present in some docker images. We will illustrate the automation process for the collection of statistical samples aimed at ...
  • Arrigo, Giacomo <1995> (Università Ca' Foscari Venezia, 2022-06-08)
    In early 2021, the European Commission defined a system to manage the issuance and the verification of the Digital COVID Certificates (DCC) and to offer interoperability of said certificates throughout the distinct national ...
  • Regonda, Brahmashwini <1994> (Università Ca' Foscari Venezia, 2022-10-20)
    Nowadays, aiming to design complex and safer systems has become a necessity. For this reason, TEEs (Trusted Execution Environments) have been introduced. TEEs have become increasingly popular in modern CPUs as they provide ...
  • Salvagnin, Alessandro <1997> (Università Ca' Foscari Venezia, 2023-10-16)
    This work presents, analyses and discusses, through a qualitative and quantitative analysis, the results of external cyber threat intelligence that was conducted and provided as a service for 13 different commercial ...
  • Serani, Hernest <1998> (Università Ca' Foscari Venezia, 2023-07-21)
    Web application vulnerabilities pose a high risk for both end-users and sensitive data. In this thesis, we propose the use of graph theory notions as a tool to model web applications and their associated vulnerabilities ...
  • Zennaro, Alessio <1985> (Università Ca' Foscari Venezia, 2016-11-03)
    Corporate networks are often complex and can include a big number of firewalls that need to be set up and configured; it is possible that these firewalls are based on different systems and thus different languages to write ...
  • Cester, Andrea <1995> (Università Ca' Foscari Venezia, 2023-03-16)
    During the COVID19 pandemic in 2019-2020 a large number of states introduced a certification called EU Digital COVID Certification. The validation of these certificates was done by scanning a QR code whose verification was ...
  • Benetollo, Lorenzo <1993> (Università Ca' Foscari Venezia, 2022-03-21)
    Blockchain technology is introduced in 2008 by Satoshi Nakamoto's paper, in which it is used as a distributed ledger to store Bitcoin cryptocurrency transactions. This technology allows for immutable data to be saved, such ...
  • Baesso, Andrea <1991> (Università Ca' Foscari Venezia, 2017-03-23)
    Cross Site Scripting (XSS) allows an attacker to inject malicious code into a webpage. Modern web applications enforce various security measures to mitigate attacks but many of these can be easily circumvented by malicious ...
  • Abdelhamied, Mohamed Abdelhamied Hassan <1988> (Università Ca' Foscari Venezia, 2016-03-09)
    Nowadays client-side security is an important issue, as everyone uses his computer to access different websites such as news, social network, banking, etc. It’s a common scenario, while surfing the internet trying to access ...
  • Carotti, Alberto <1992> (Università Ca' Foscari Venezia, 2016-06-30)
    I cookie sono il metodo standard per conservare informazioni riguardo lo stato della sessione e, per questo motivo, sono uno dei principali bersagli degli attacchi web. In questo lavoro implementiamo la protezione dei ...
  • Khan, Muhammad Jalil <1995> (Università Ca' Foscari Venezia, 2024-03-27)
    We use web applications on daily basis. Web applications are found on all sort of devices such as phones tablets, TVs and computers. As the utilization of web applications increases, the need to keep them safe also ...
  • Chiarot, Giacomo <1995> (Università Ca' Foscari Venezia, 2019-07-10)
    Cross Site Scripting (XSS) is a widespread web vulnerability that allows an attacker to inject code in a web page, fully compromising it. Content- Security-Policy (CSP) is a security mechanism that limits the effects of ...
  • Moruzzi, Davide <1997> (Università Ca' Foscari Venezia, 2021-07-16)
    The thesis aims to summarise and motivate the cyber intelligence project carried out during the internship period in a local company. The scenario in which the developed software runs will be presented. The technologies ...
  • Bustreo, Paolo <1991> (Università Ca' Foscari Venezia, 2016-06-30)
    Windows-based applications most often rely on the the Microsoft Cryptographic Application Programming Interface (MS-CAPI) to handle cryptography: developers use it largely, for example to secure sensitive data, manage ...
  • Gastaldon, Davide <1987> (Università Ca' Foscari Venezia, 2013-10-30)
    Nowadays the widespread presence of digital devices imply the possibility of malicious utilization and the need of a forensic science. In this thesis digital forensic is first presented and then a real scenario, involving ...
  • Stocco, Alessandro <1976> (Università Ca' Foscari Venezia, 2014-06-26)
    Con l'avvento delle tecnologie digitali, copiare un file multimediale (audio o video) è diventato semplice e non comporta, a differenza dei supporti analogici, una diminuzione della qualità. Grazie alla diffusione di ...
  • Francescato, Riccardo <1993> (Università Ca' Foscari Venezia, 2018-03-21)
    Embedded devices represents the most widespread form of computing device in the world. Almost every consumer product manufactured in the last decades contains an embedded system, e.g., refrigerators, smart bulbs, activity ...
  • Tempesta, Mauro <1990> (Università Ca' Foscari Venezia, 2015-03-12)
    Over the last years, client-side attacks against web sessions covered a relevant subset of web security incidents. Existing solutions proposed in the literature and by web standards, though interesting, typically address ...
  • Tubia, Marco <1998> (Università Ca' Foscari Venezia, 2024-03-27)
    When we authenticate on online web sites, passwords are the only thing that separates attackers from getting into our account. When we have to register on web sites, we are asked to generate a password, that we have to ...