Essays about: "buggar"

Showing result 1 - 5 of 56 essays containing the word buggar.

  1. 1. Round-Trip Translation : A New Path for Automatic Program Repair using Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fernando Vallecillos Ruiz; [2023]
    Keywords : Automatic Program Repair; Software Engineering; Large Language Models; Round-Trip Translation; Neural Machine Translation; Automatisk programreparation; Mjukvaruutveckling; Stora språkmodeller; Tur och retur-översättning; Neural maskinöversättning;

    Abstract : Research shows that grammatical mistakes in a sentence can be corrected by machine translating it to another language and back. We investigate whether this correction capability of Large Language Models (LLMs) extends to Automatic Program Repair (APR), a software engineering task. READ MORE

  2. 2. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Lövgren; [2023]
    Keywords : Open-Source; Vulnerability Identification; High-Risk Developers; Öppen Källkod; Identifiering av Sårbarheter; Högriskutvecklare;

    Abstract : Open-source software is often chosen with the expectation of increased security [1]. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE

  3. 3. Detection of Prototype Pollution Using Joern : Joern’s Detection Capability Compared to CodeQL’s

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tobias Fröberg; [2023]
    Keywords : CodeQL; Computer security; JavaScript; Joern; Prototype pollution; Vulnerability detection; CodeQL; Datorsäkerhet; JavaScript; Joern; Prototypförorening; Sårbarhetsdetektering;

    Abstract : JavaScript-built programs are widely used by the general public, but they are also vulnerable to JavaScript-related exploits stemming from the newly discovered prototype pollution vulnerability. Research has been focused on understanding the impact of this vulnerability and finding ways to detect it using code analysis tools. READ MORE

  4. 4. Syntax-Based Dependency Discovery : Extracting Dependencies Between Integration Test Cases for Passive Testing

    University essay from KTH/Hälsoinformatik och logistik

    Author : David Halldoff; Martin Sten; [2023]
    Keywords : Software testing; passive testing; integration testing; test case; dependency discovery; guarded assertion; automotive; safety-critical; Mjukvarutestning; passiv testning; integrationstestning; testfall; beroendeupptäckt; fordon; säkerhetskritisk;

    Abstract : Modern-day vehicles consist of numerous electronic computing devices with accompanying software. Since vehicles are generally classified as safety-critical systems, rigorous testing strategies have to be deployed to ensure correct operation of the embedded software. READ MORE

  5. 5. Pentesting on a WiFi Adapter : Afirmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Henning; [2023]
    Keywords : Firmware; Drivers; WiFi; Ethical Hacking; Penetration Testing.; Firmware; Drivrutiner; WiFi; Etisk Hackning; Penetration Testing.;

    Abstract : Simple IoT devices such as WiFi adapters have the possibility of containing vulnerabilities because of the vast complexity of parsing and implementing the IEEE 802.11 standard correctly. READ MORE