Essays about: "Identifiering av Sårbarheter"

Showing result 1 - 5 of 8 essays containing the words Identifiering av Sårbarheter.

  1. 1. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Lövgren; [2023]
    Keywords : Open-Source; Vulnerability Identification; High-Risk Developers; Öppen Källkod; Identifiering av Sårbarheter; Högriskutvecklare;

    Abstract : Open-source software is often chosen with the expectation of increased security [1]. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE

  2. 2. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  3. 3. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project

    University essay from Uppsala universitet/Datalogi

    Author : Johan Lövgren; [2023]
    Keywords : open-source; vulnerability identification; high-risk developers; öppen källkod; identifiering av sårbarheter; högriskutvecklare;

    Abstract : Open-source software is often chosen with the expectation of increased security. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE

  4. 4. Panoptic IPv6 Measurement : Debiasing Hitlists for Internet-wide Surveys and Remote Monitoring Detection

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bernhard Degen; [2021]
    Keywords : ;

    Abstract : Active Internet measurements survey online hosts on a global scale. Its applications are numerous and include tracking protocol adoption, discovering vulnerabilities, and detecting network disruptions. Because of the vast address space, exhaustively targeting all IP addresses is not feasible in IPv6. READ MORE

  5. 5. Identification and Exploitation of Vulnerabilities in a Large-Scale ITSystem

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : David Skeppstedt; [2019]
    Keywords : ;

    Abstract : This thesis presents the results of a vulnerability assessment and exploit development targeting a large-scale IT-system. Penetration testing and threat modelling was used to identify vulnerabilities in the system. READ MORE