Essays about: "bounty"

Showing result 1 - 5 of 9 essays containing the word bounty.

  1. 1. Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : John Augustsson; Johan Carlsson; [2021]
    Keywords : GraphQL; Threat modeling; Open-Source Software; Ethical hacking; DevOps; GraphQL; Hotmodellering; Öppen källkod; Etisk hackning; DevOps;

    Abstract : Recent supply chain attacks on a larger scale in combination with a growing adoption of the set of automated software development and deployment practices commonly referred to as ’DevOps’, made us interested in the security of the underlying infrastructure supporting these practices. If a malicious commit in a piece of software can expose internal systems and networks of all users of said software to vulnerabilities, questions regarding trust and repudiation becomes central, in the platforms themselves as much as in each digitally signed software update version. READ MORE

  2. 2. Penetration testing of Android applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Nilsson; [2020]
    Keywords : Ethical hacking; penetration testing; Android application security; reverse engineering; threat modeling; Etisk hacking; penetrationstest; Android-applikationssäkerhet; baklängeskonstruktion; hotmodellering;

    Abstract : The market of Android applications is huge, and in 2019, Google Play users worldwide downloaded 84.3 billion mobile applications. With such a big user base, any security issues could have big negative impacts. READ MORE

  3. 3. Land cover changes in Southern Sweden from the mid-Holocene to present day: insights for ecosystem service assessments

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Robert O'Dwyer; [2019]
    Keywords : Geography; Geographical Information Systems; GIS; Physical Geography; Götaland; Landscape Reconstruction Algorithm; Fossil Pollen; Ecosystem Services; Earth and Environmental Sciences;

    Abstract : Climate change and human impact play a huge role in the sustainability and development of ecosystems and the services they offer to societies over temporal and spatial scales. Fossil pollen-based estimates provide unique information on past land cover change, but to date there are not many methods able to create spatially continuous maps and have a fine scale of land cover changes inferred from pollen information. READ MORE

  4. 4. Haxonomy : A Taxonomy for Web Hacking

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Körlinge; [2019]
    Keywords : ;

    Abstract : This study aims to show that the information present in public vulnerability reports from bug bounty programs can be utilized to provide aid for individual security researchers when performing their research. This is done here by creating a taxonomy based on the attack surfaces on a website that were used by the author of a report when discovering a vulnerability. READ MORE

  5. 5. Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anders Pettersson; Ossian Fjordefalk; [2019]
    Keywords : Markov decision process; Reinforcement learning; Machine learning; Web vulnerabilities; Attack surfaces; Hacking; Bug Bounty;

    Abstract : Bug bounties are an increasingly popular way of performing penetration tests of web applications. User statistics of bug bounty platforms show that a lot of hackers struggle to find bugs. READ MORE