Sökning: "CVE"
Visar resultat 1 - 5 av 20 uppsatser innehållade ordet CVE.
1. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security
Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. LÄS MER
2. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. LÄS MER
3. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack
Kandidat-uppsats, Umeå universitet/Institutionen för datavetenskapSammanfattning : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. LÄS MER
4. Kartläggning, demonstration och hantering av vanliga sårbarheter i populära webbservrar
Master-uppsats, Linköpings universitet/Institutionen för datavetenskapSammanfattning : En potentiell risk med att världen blir mer digitaliserad är att mängden sårbara system ökar. En konsekvens av det är att fler privatpersoner, organisationer och företag faller offer för den ökande cyberbrottsligheten. LÄS MER
5. Vulnerabilities in Swedish Industrial Control Systems : An examination and classification of remotely discoverable ICS devices in Sweden, and an assessment of their vulnerability to cyber attacks
Kandidat-uppsats, KTH/DatavetenskapSammanfattning : Over the last couple of years, more and more industrial control systems (ICS) have been designed to be connected to the internet to allow for remote control and monitoring of industrial processes. This have opened a possibility for hackers to exploit weaknesses in such systems remotely through the internet. LÄS MER