Sökning: "CVE"

Visar resultat 1 - 5 av 20 uppsatser innehållade ordet CVE.

  1. 1. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security

    Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Love Andrén; [2024]
    Nyckelord :Threat Intelligence; Open-source; Information Sharing; Cyber Security;

    Sammanfattning : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. LÄS MER

  2. 2. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Ivan Baheux; [2023]
    Nyckelord :Android Application Security; Vulnerability Detection; Context-Awareness; Model-Based Security Testing; Domain Specific Language; Sécurité des Applications Android; Détection de Vulnérabilités; Sensibilité au Contexte; Tests de Sécurité Basés sur les Modèles; Langage Dédiés; Android-applikationssäkerhet; Upptäckt av sårbarheter; Kontextmedvetenhet; Modellbaserad säkerhetstestning; Domänspecifikt språk;

    Sammanfattning : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. LÄS MER

  3. 3. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack

    Kandidat-uppsats, Umeå universitet/Institutionen för datavetenskap

    Författare :Viktor Olofsson; [2023]
    Nyckelord :control-flow integrity; CFI; control-flow graph; CFG; memory corruption; Android; vulnerability; android vulnerability; computer security;

    Sammanfattning : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. LÄS MER

  4. 4. Kartläggning, demonstration och hantering av vanliga sårbarheter i populära webbservrar

    Master-uppsats, Linköpings universitet/Institutionen för datavetenskap

    Författare :Matyas Barocsai; Johan Can; [2023]
    Nyckelord :Cyber Security; Education; Demonstration; Vulnerability; IoT; Web Server; NVD; CWE; CVE; CVSS; Cybersäkerhet; Utbildning; Demonstration; Sårbarhet; IoT; Webbserver; NVD; CWE; CVE; CVSS;

    Sammanfattning : En potentiell risk med att världen blir mer digitaliserad är att mängden sårbara system ökar. En konsekvens av det är att fler privatpersoner, organisationer och företag faller offer för den ökande cyberbrottsligheten. LÄS MER

  5. 5. Vulnerabilities in Swedish Industrial Control Systems : An examination and classification of remotely discoverable ICS devices in Sweden, and an assessment of their vulnerability to cyber attacks

    Kandidat-uppsats, KTH/Datavetenskap

    Författare :André Österlund; Nils Odin; [2022]
    Nyckelord :;

    Sammanfattning : Over the last couple of years, more and more industrial control systems (ICS) have been designed to be connected to the internet to allow for remote control and monitoring of industrial processes. This have opened a possibility for hackers to exploit weaknesses in such systems remotely through the internet. LÄS MER