• Forensic Key Discovery and Identification: Finding Cryptographic Keys in Physical Memory 

      Maartmann-Moe, Carsten (Master thesis, 2008)
      Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protection of data, both in corporate laptops and private computing equipment. While encryption is a useful tool, it also present ...
    • Improving SS7 Security Using Machine Learning Techniques 

      Jensen, Kristoffer (Master thesis, 2016-08-31)
      The Signaling System No. 7 is the nervous system of telecommunication networks based on 2G and 3G technologies. Previously confined in a walled garden, SS7 has become more exposed due to increased liberalization of the ...
    • Intrusion Detection in High-Speed Networks 

      Riegel, Martin; Walsø, Claes Lyth (Master thesis, 2007)
      This thesis investigates methods for implementing an intrusion detection system (IDS) in a high-speed backbone network. The work presented in this report is run in cooperation with Kripos and Uninett. The popular IDS ...
    • Using Honeypots to Analyze Bots and Botnets 

      Bergande, Eirik Falk Georg; Smedsrud, Jon Fjeldberg (Master thesis, 2007)
      In this Master thesis we will perform honeypot experiments where we allow malicious users access to systems and analyze their behaviour. Our focus will be on botnets, and how attackers progress to infect systems and add ...
    • Windows 10 Memory Compression in Digital Forensics - Uncovering Digital Evidence in Compressed Swap 

      Østerud, Aleksander (Master thesis, 2018)
      Digital investigators and incident responders often rely on evidence residing in computer memory and page files on hard drives. Artifacts such as browsing history, image thumbnails and shell commands can answer important ...
    • Worm Detection Using Honeypots 

      Christoffersen, Dag; Mauland, Bengt Jonny (Master thesis, 2006)
      This thesis describes a project that utilizes honeypots to detect worms. A detailed description of existing worm detection techniques using honeypots is given, as well as a study of existing worm propagation models. ...