Essays about: "sårbarhetsdetektering"

Found 4 essays containing the word sårbarhetsdetektering.

  1. 1. Detection of Prototype Pollution Using Joern : Joern’s Detection Capability Compared to CodeQL’s

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tobias Fröberg; [2023]
    Keywords : CodeQL; Computer security; JavaScript; Joern; Prototype pollution; Vulnerability detection; CodeQL; Datorsäkerhet; JavaScript; Joern; Prototypförorening; Sårbarhetsdetektering;

    Abstract : JavaScript-built programs are widely used by the general public, but they are also vulnerable to JavaScript-related exploits stemming from the newly discovered prototype pollution vulnerability. Research has been focused on understanding the impact of this vulnerability and finding ways to detect it using code analysis tools. READ MORE

  2. 2. Static Analysis Of Client-Side JavaScript Code To Detect Server-Side Business Logic Vulnerabilities

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Frederick van der Windt; [2023]
    Keywords : JavaScript; Static Analysis; Business Logic Vulnerabilities; Client-side; Fuzzing; Black-box; JavaScript; statisk analys; sårbarheter i affärslogiken; klientsidan; Fuzzing; Black-box;

    Abstract : In the real world, web applications are crucial in various domains, from e-commerce to finance and healthcare. However, these applications are not immune to vulnerabilities, particularly in business logic. Detecting such vulnerabilities can be challenging due to the complexity and diversity of application functionality. READ MORE

  3. 3. Detecting Security Patches in Java OSS Projects Using NLP

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andrea Stefanoni; [2022]
    Keywords : NLP; Deep Learning; vulnerability detection; security patch; Open Source Software; NLP; Deep Learning; sårbarhetsdetektering; säkerhetspatch; programvara med öppen källkod;

    Abstract : The use of Open Source Software is becoming more and more popular, but it comes with the risk of importing vulnerabilities in private codebases. Security patches, providing fixes to detected vulnerabilities, are vital in protecting against cyber attacks, therefore being able to apply all the security patches as soon as they are released is key. READ MORE

  4. 4. Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Srinath Potnuru; [2021]
    Keywords : RRC; 5G NR; robustness testing; fuzzing; ASN.1; network protocol testing; vulnerability detection; software security; RRC; 5G NR; robusthetstest; fuzzing; ASN.1; nätverksprotokolltestning; sårbarhetsdetektering; mjukvarusäkerhet;

    Abstract : 5G telecommunication systems must be ultra-reliable to meet the needs of the next evolution in communication. The systems deployed must be thoroughly tested and must conform to their standards. Software and network protocols are commonly tested with techniques like fuzzing, penetration testing, code review, conformance testing. READ MORE