Sökning: "bounty"
Visar resultat 1 - 5 av 11 uppsatser innehållade ordet bounty.
1. Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Recent supply chain attacks on a larger scale in combination with a growing adoption of the set of automated software development and deployment practices commonly referred to as ’DevOps’, made us interested in the security of the underlying infrastructure supporting these practices. If a malicious commit in a piece of software can expose internal systems and networks of all users of said software to vulnerabilities, questions regarding trust and repudiation becomes central, in the platforms themselves as much as in each digitally signed software update version. LÄS MER
2. Penetration testing of Android applications
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : The market of Android applications is huge, and in 2019, Google Play users worldwide downloaded 84.3 billion mobile applications. With such a big user base, any security issues could have big negative impacts. LÄS MER
3. Land cover changes in Southern Sweden from the mid-Holocene to present day: insights for ecosystem service assessments
Master-uppsats, Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskapSammanfattning : Climate change and human impact play a huge role in the sustainability and development of ecosystems and the services they offer to societies over temporal and spatial scales. Fossil pollen-based estimates provide unique information on past land cover change, but to date there are not many methods able to create spatially continuous maps and have a fine scale of land cover changes inferred from pollen information. LÄS MER
4. Haxonomy : A Taxonomy for Web Hacking
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : This study aims to show that the information present in public vulnerability reports from bug bounty programs can be utilized to provide aid for individual security researchers when performing their research. This is done here by creating a taxonomy based on the attack surfaces on a website that were used by the author of a report when discovering a vulnerability. LÄS MER
5. Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Bug bounties are an increasingly popular way of performing penetration tests of web applications. User statistics of bug bounty platforms show that a lot of hackers struggle to find bugs. LÄS MER