Essays about: "buggar"
Showing result 1 - 5 of 56 essays containing the word buggar.
-
1. Round-Trip Translation : A New Path for Automatic Program Repair using Large Language Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Research shows that grammatical mistakes in a sentence can be corrected by machine translating it to another language and back. We investigate whether this correction capability of Large Language Models (LLMs) extends to Automatic Program Repair (APR), a software engineering task. READ MORE
-
2. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Open-source software is often chosen with the expectation of increased security [1]. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE
-
3. Detection of Prototype Pollution Using Joern : Joern’s Detection Capability Compared to CodeQL’s
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : JavaScript-built programs are widely used by the general public, but they are also vulnerable to JavaScript-related exploits stemming from the newly discovered prototype pollution vulnerability. Research has been focused on understanding the impact of this vulnerability and finding ways to detect it using code analysis tools. READ MORE
-
4. Syntax-Based Dependency Discovery : Extracting Dependencies Between Integration Test Cases for Passive Testing
University essay from KTH/Hälsoinformatik och logistikAbstract : Modern-day vehicles consist of numerous electronic computing devices with accompanying software. Since vehicles are generally classified as safety-critical systems, rigorous testing strategies have to be deployed to ensure correct operation of the embedded software. READ MORE
-
5. Pentesting on a WiFi Adapter : Afirmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Simple IoT devices such as WiFi adapters have the possibility of containing vulnerabilities because of the vast complexity of parsing and implementing the IEEE 802.11 standard correctly. READ MORE