Searched for: subject%3A%22Vulnerability%255C+detection%22
(1 - 5 of 5)
document
Nguyen, Jakub (author)
Nowadays software development greatly relies upon using third-party source code. A logical consequence is that vulnerabilities from such sources can be propagated to applications making use of those. Tools like Dependabot can alert developers about packages they use, which entail vulnerabilities. Such alerts oftentimes turn out to be false...
bachelor thesis 2021
document
Bisesser, Dinesh (author)
An increasing digital world, comes with many benefits but unfortunately also many drawbacks. The increase of the digital world means an increase in data and software. Developing more software unfortunately also means a higher probability of vulnerabilities, which can be exploited by adversaries. Adversaries taking advantage of users and software...
master thesis 2020
document
Man, K.W. (author)
As software is produced more and more every year, software also gets exploited more. This exploitation can lead to huge monetary losses and other damages to companies and users. The exploitation can be reduced by automatically detecting the software vulnerabilities that leads to exploitation. Unfortunately, the state-of-the-art methods for this...
master thesis 2020
document
Anker, Eva (author)
In the modern world, Smartphones are everywhere and Android is the most used operating system. <br/>To protect these devices against malicious actions, the behaviour of Android apps needs to be studied.<br/><br/>Current tooling does not provide complete insight into the behaviour of an Android app.<br/>A tool was built to observe what goes on...
master thesis 2020
document
van der Lee, Wesley (author), Verwer, S.E. (author)
Although the importance of mobile applications grows every day, recent vulnerability reports argue the application's deficiency to meet modern security standards. Testing strategies alleviate the problem by identifying security violations in software implementations. This paper proposes a novel testing methodology that applies state machine...
conference paper 2018
Searched for: subject%3A%22Vulnerability%255C+detection%22
(1 - 5 of 5)