Essays about: "CVES"

Showing result 1 - 5 of 11 essays containing the word CVES.

  1. 1. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Love Andrén; [2024]
    Keywords : Threat Intelligence; Open-source; Information Sharing; Cyber Security;

    Abstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE

  2. 2. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Viktor Olofsson; [2023]
    Keywords : control-flow integrity; CFI; control-flow graph; CFG; memory corruption; Android; vulnerability; android vulnerability; computer security;

    Abstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE

  3. 3. Investigating the Effectiveness of Forward-Porting Bugs

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Fredrik Nyquist; [2023]
    Keywords : Fuzzing; Fuzz testing; Forward-porting; Fault injection; Magma; Umeå University;

    Abstract : This research investigates the effectiveness of the forward-porting approach employed in the Magma framework as a fault injection technique for evaluating fuzzers. The study aims to assess the use of Proof-of-Concepts in reproducing crashes in CVEs and evaluate the feasibility of forward-porting vulnerabilities into later software versions. READ MORE

  4. 4. Early Automated Risk Assessment of CVE Descriptions

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Felix Nyrfors; Ludvig Sandholm; [2022]
    Keywords : ;

    Abstract : Data security is becoming more relevant as more and more information is stored digitally and many new data vulnerabilities are found everyday. To keep track of what software programs could be exposed, databases such as the NVD that try to list all identified vulnerabilities were created. READ MORE

  5. 5. A systematic evaluation of CVEs and mitigation strategies for a Kubernetes stack

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Fred Nordell; [2022]
    Keywords : Kubernetes; CVE; Mitigation strategies; containers; Technology and Engineering;

    Abstract : Kubernetes is a container orchestration platform growing ever more popular, and as the software industry shifts into the container cloud, security will become paramount. The Common Vulnerabilities and Exposures (CVEs) systems cata- log and provide references to known vulnerabilities. READ MORE