Essays about: "Automated security testing"
Showing result 1 - 5 of 23 essays containing the words Automated security testing.
-
1. Automatic Detection of Security Deficiencies and Refactoring Advises for Microservices
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : The microservice architecture enables organizationsto shorten development cycles and deliver cloud-native applicationsrapidly. However, it also brings security concerns thatneed to be addressed by developers. Therefore, security testingin microservices becomes even more critical. READ MORE
-
2. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE
-
3. Automated Application Security Testing in Two Pharmacovigilance Systems
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : To improve the security of IT systems, companies can use automated security testing. In this thesis, three methods for automated security testingare evaluated and compared against each other. READ MORE
-
4. Guidelines for white box penetration testing wired devices in secure network environments
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE
-
5. Influence of Automatically Constructed Non-Equivalent Mutants on Predictions of Metamorphic Relations
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Behovet av tillförlitliga, motståndskraftiga, och beständiga system är uppenbart i vårt samhälle, som i ökande grad blir allt mer beroende av mjukvarulösningar. För att uppnå tillfredsställande nivåer av säkerhet och robusthet måste alla system kontinuerligt genomgå tester. READ MORE