Essays about: "vulnerability detection"
Showing result 1 - 5 of 42 essays containing the words vulnerability detection.
-
1. Potential and Limitations of the Sketch Map Tool in the International Red Cross Red Crescent Movement
University essay from Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : In disaster risk management, participatory mapping (PM) closes spatial data gaps in communities by integrating local risk knowledge. The thesis examined the potential and limitations of the Sketch Map Tool (SMT) as a PM tool for community-based disaster risk reduction (DRR) through an International Red Cross Red Crescent Movement case study. READ MORE
-
2. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE
-
3. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE
-
4. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. READ MORE
-
5. Detection of Prototype Pollution Using Joern : Joern’s Detection Capability Compared to CodeQL’s
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : JavaScript-built programs are widely used by the general public, but they are also vulnerable to JavaScript-related exploits stemming from the newly discovered prototype pollution vulnerability. Research has been focused on understanding the impact of this vulnerability and finding ways to detect it using code analysis tools. READ MORE