Essays about: "CVE"

Showing result 1 - 5 of 14 essays containing the word CVE.

  1. 1. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Love Andrén; [2024]
    Keywords : Threat Intelligence; Open-source; Information Sharing; Cyber Security;

    Abstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE

  2. 2. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ivan Baheux; [2023]
    Keywords : Android Application Security; Vulnerability Detection; Context-Awareness; Model-Based Security Testing; Domain Specific Language; Sécurité des Applications Android; Détection de Vulnérabilités; Sensibilité au Contexte; Tests de Sécurité Basés sur les Modèles; Langage Dédiés; Android-applikationssäkerhet; Upptäckt av sårbarheter; Kontextmedvetenhet; Modellbaserad säkerhetstestning; Domänspecifikt språk;

    Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE

  3. 3. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Viktor Olofsson; [2023]
    Keywords : control-flow integrity; CFI; control-flow graph; CFG; memory corruption; Android; vulnerability; android vulnerability; computer security;

    Abstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE

  4. 4. Vulnerabilities in Swedish Industrial Control Systems : An examination and classification of remotely discoverable ICS devices in Sweden, and an assessment of their vulnerability to cyber attacks

    University essay from KTH/Datavetenskap

    Author : André Österlund; Nils Odin; [2022]
    Keywords : ;

    Abstract : Over the last couple of years, more and more industrial control systems (ICS) have been designed to be connected to the internet to allow for remote control and monitoring of industrial processes. This have opened a possibility for hackers to exploit weaknesses in such systems remotely through the internet. READ MORE

  5. 5. Early Automated Risk Assessment of CVE Descriptions

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Felix Nyrfors; Ludvig Sandholm; [2022]
    Keywords : ;

    Abstract : Data security is becoming more relevant as more and more information is stored digitally and many new data vulnerabilities are found everyday. To keep track of what software programs could be exposed, databases such as the NVD that try to list all identified vulnerabilities were created. READ MORE