Secure Information Technology Center – Austria

24

May

2017

Analysis of Browser-Extensions

Kategorie: IT-Security, Web Technologies

Browser extensions can extend the functionality of modern web browsers almost arbitrarily. However, they are often used for malicious activities, due to their ability to easily access sensitive data (i.e. Cookies). Likewise, benign but faulty extensions can be used for targeted attacks by exploiting errors in the implementation. Usually, the security mechanisms of modern browsers only provide limited protection against such attacks. Thus, the present study deals with dangers posed from benign browser extensions.

Weiter lesen…

9

May

2017

Migrating Edge Computing to Hybrid Edge Computing

Kategorie: Cloud Computing

Currently, various ways exist to offload computationally intensive tasks to remote computers. The goals of these approaches are similar: increase performance and reduce energy consumption.
Furthermore, is was discovered that moving computing units in the priximity of the users is beneficial and is key to achieve best possible results. These revelations form the baseline for the Edge Computing paradigm.
Weiter lesen…

5

May

2017

State of the Art Services for Direct Communication

Kategorie: Cloud Computing, IT-Security

Direct data transfer and direct communication services are becoming increasingly relevant due to widespread availability of high bandwidth Internet connections. At the same time, some properties of today’s Internet infrastructure overcomplicate the act of establishing direct end-to-end connections. This is mostly due to legacy technologies still dominating some key components of the TCP/IP stack. To make matters worse, this is unlikely to change significantly for the foreseeable future.
Weiter lesen…