Essays about: "sårbarhetsdetektering"
Found 4 essays containing the word sårbarhetsdetektering.
-
1. Detection of Prototype Pollution Using Joern : Joern’s Detection Capability Compared to CodeQL’s
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : JavaScript-built programs are widely used by the general public, but they are also vulnerable to JavaScript-related exploits stemming from the newly discovered prototype pollution vulnerability. Research has been focused on understanding the impact of this vulnerability and finding ways to detect it using code analysis tools. READ MORE
-
2. Static Analysis Of Client-Side JavaScript Code To Detect Server-Side Business Logic Vulnerabilities
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the real world, web applications are crucial in various domains, from e-commerce to finance and healthcare. However, these applications are not immune to vulnerabilities, particularly in business logic. Detecting such vulnerabilities can be challenging due to the complexity and diversity of application functionality. READ MORE
-
3. Detecting Security Patches in Java OSS Projects Using NLP
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The use of Open Source Software is becoming more and more popular, but it comes with the risk of importing vulnerabilities in private codebases. Security patches, providing fixes to detected vulnerabilities, are vital in protecting against cyber attacks, therefore being able to apply all the security patches as soon as they are released is key. READ MORE
-
4. Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : 5G telecommunication systems must be ultra-reliable to meet the needs of the next evolution in communication. The systems deployed must be thoroughly tested and must conform to their standards. Software and network protocols are commonly tested with techniques like fuzzing, penetration testing, code review, conformance testing. READ MORE