Essays about: "CVE"
Showing result 1 - 5 of 14 essays containing the word CVE.
-
1. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE
-
2. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE
-
3. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE
-
4. Vulnerabilities in Swedish Industrial Control Systems : An examination and classification of remotely discoverable ICS devices in Sweden, and an assessment of their vulnerability to cyber attacks
University essay from KTH/DatavetenskapAbstract : Over the last couple of years, more and more industrial control systems (ICS) have been designed to be connected to the internet to allow for remote control and monitoring of industrial processes. This have opened a possibility for hackers to exploit weaknesses in such systems remotely through the internet. READ MORE
-
5. Early Automated Risk Assessment of CVE Descriptions
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Data security is becoming more relevant as more and more information is stored digitally and many new data vulnerabilities are found everyday. To keep track of what software programs could be exposed, databases such as the NVD that try to list all identified vulnerabilities were created. READ MORE