Essays about: "software security vulnerability"
Showing result 1 - 5 of 65 essays containing the words software security vulnerability.
-
1. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. READ MORE
-
2. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE
-
3. Testing IoT Security : A comparison of existing penetration testing frameworks and proposing a generic framework
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : The Internet of Things (IoT) refers to the billions of physical devices linked to the Internet worldwide, integrating into various systems like healthcare, finance, and transportation. However, the rapid market expansion has led to software and hardware security shortcomings, leaving IoT devices vulnerable to cybercriminals. READ MORE
-
4. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE
-
5. Automated Vulnerability Management
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The field of software security is constantly evolving, and security must be taken into consideration throughout the entire product life cycle. This is particularly important in today’s dynamic security landscape, where threats and vulnerabilities constantly change. READ MORE