Essays about: "Vulnerability Detection"

Showing result 1 - 5 of 42 essays containing the words Vulnerability Detection.

  1. 1. Potential and Limitations of the Sketch Map Tool in the International Red Cross Red Crescent Movement

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Kimon Letzner; [2024]
    Keywords : Disaster risk reduction; Participatory action research; Community risk mapping; International Red Cross Red Crescent Movement; Colombia; Technology and Engineering;

    Abstract : In disaster risk management, participatory mapping (PM) closes spatial data gaps in communities by integrating local risk knowledge. The thesis examined the potential and limitations of the Sketch Map Tool (SMT) as a PM tool for community-based disaster risk reduction (DRR) through an International Red Cross Red Crescent Movement case study. READ MORE

  2. 2. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Anvesh Ambala; [2024]
    Keywords : Supply chain; SBOM; Software Bill of Materials; US Executive Order May 2021; Open-Source Software; Vulnerability; cyber security.;

    Abstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE

  3. 3. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ivan Baheux; [2023]
    Keywords : Android Application Security; Vulnerability Detection; Context-Awareness; Model-Based Security Testing; Domain Specific Language; Sécurité des Applications Android; Détection de Vulnérabilités; Sensibilité au Contexte; Tests de Sécurité Basés sur les Modèles; Langage Dédiés; Android-applikationssäkerhet; Upptäckt av sårbarheter; Kontextmedvetenhet; Modellbaserad säkerhetstestning; Domänspecifikt språk;

    Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE

  4. 4. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Moosbrugger; [2023]
    Keywords : Prototype Pollution Gadgets; Dynamic Taint Analysis; Forced Branch Execution; NodeProf Instrumentation; Truffle GraalJS;

    Abstract : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. READ MORE

  5. 5. Detection of Prototype Pollution Using Joern : Joern’s Detection Capability Compared to CodeQL’s

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tobias Fröberg; [2023]
    Keywords : CodeQL; Computer security; JavaScript; Joern; Prototype pollution; Vulnerability detection; CodeQL; Datorsäkerhet; JavaScript; Joern; Prototypförorening; Sårbarhetsdetektering;

    Abstract : JavaScript-built programs are widely used by the general public, but they are also vulnerable to JavaScript-related exploits stemming from the newly discovered prototype pollution vulnerability. Research has been focused on understanding the impact of this vulnerability and finding ways to detect it using code analysis tools. READ MORE