Sökning: "vulnerability detection"
Visar resultat 1 - 5 av 47 uppsatser innehållade orden vulnerability detection.
1. Potential and Limitations of the Sketch Map Tool in the International Red Cross Red Crescent Movement
Master-uppsats, Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetSammanfattning : In disaster risk management, participatory mapping (PM) closes spatial data gaps in communities by integrating local risk knowledge. The thesis examined the potential and limitations of the Sketch Map Tool (SMT) as a PM tool for community-based disaster risk reduction (DRR) through an International Red Cross Red Crescent Movement case study. LÄS MER
2. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects
Master-uppsats, Blekinge Tekniska Högskola/Institutionen för programvaruteknikSammanfattning : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. LÄS MER
3. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. LÄS MER
4. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. LÄS MER
5. Detection of Prototype Pollution Using Joern : Joern’s Detection Capability Compared to CodeQL’s
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : JavaScript-built programs are widely used by the general public, but they are also vulnerable to JavaScript-related exploits stemming from the newly discovered prototype pollution vulnerability. Research has been focused on understanding the impact of this vulnerability and finding ways to detect it using code analysis tools. LÄS MER