Essays about: "Automated security testing"

Showing result 1 - 5 of 23 essays containing the words Automated security testing.

  1. 1. Automatic Detection of Security Deficiencies and Refactoring Advises for Microservices

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Burak Ünver; [2023]
    Keywords : Microservices; Security; Kubernetes; Security Scanning Tools;

    Abstract : The microservice architecture enables organizationsto shorten development cycles and deliver cloud-native applicationsrapidly. However, it also brings security concerns thatneed to be addressed by developers. Therefore, security testingin microservices becomes even more critical. READ MORE

  2. 2. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  3. 3. Automated Application Security Testing in Two Pharmacovigilance Systems

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Daniel Fehrm; [2023]
    Keywords : ;

    Abstract : To improve the security of IT systems, companies can use automated security testing. In this thesis, three methods for automated security testingare evaluated and compared against each other. READ MORE

  4. 4. Guidelines for white box penetration testing wired devices in secure network environments

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Daniel Le Vandolph; [2023]
    Keywords : Penetration test; security assessment; white box; secure network; framework; methodology; guidelines;

    Abstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE

  5. 5. Influence of Automatically Constructed Non-Equivalent Mutants on Predictions of Metamorphic Relations

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Götborg; [2023]
    Keywords : Balances scorecard; Data augmentation; Machine learning; Metamorphic testing; MuJava; Mutation testing;

    Abstract : Behovet av tillförlitliga, motståndskraftiga, och beständiga system är uppenbart i vårt samhälle, som i ökande grad blir allt mer beroende av mjukvarulösningar. För att uppnå tillfredsställande nivåer av säkerhet och robusthet måste alla system kontinuerligt genomgå tester. READ MORE