Essays about: "identifiering av sårbarheter"
Showing result 1 - 5 of 8 essays containing the words identifiering av sårbarheter.
-
1. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Open-source software is often chosen with the expectation of increased security [1]. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE
-
2. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE
-
3. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project
University essay from Uppsala universitet/DatalogiAbstract : Open-source software is often chosen with the expectation of increased security. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE
-
4. Panoptic IPv6 Measurement : Debiasing Hitlists for Internet-wide Surveys and Remote Monitoring Detection
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Active Internet measurements survey online hosts on a global scale. Its applications are numerous and include tracking protocol adoption, discovering vulnerabilities, and detecting network disruptions. Because of the vast address space, exhaustively targeting all IP addresses is not feasible in IPv6. READ MORE
-
5. Identification and Exploitation of Vulnerabilities in a Large-Scale ITSystem
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis presents the results of a vulnerability assessment and exploit development targeting a large-scale IT-system. Penetration testing and threat modelling was used to identify vulnerabilities in the system. READ MORE