Welling, 2022 - Google Patents
APPLICATION SECURITY TESTINGWelling, 2022
View PDF- Document ID
- 12680992962664489810
- Author
- Welling T
- Publication year
External Links
Snippet
This report describes the work that was done throughout the internship at VOID software to finish the Master's degree in Cybersecurity and Digital Forensics. During this internship two main projects were implemented: the first one had to do with the development of a new …
- 239000011800 void material 0 abstract description 44
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/368—Test management for test version control, e.g. updating test cases to a new software version
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3688—Test management for test execution, e.g. scheduling of test suites
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
- G06F11/3648—Software debugging using additional hardware
- G06F11/3656—Software debugging using additional hardware using a specific debug interface
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
- G06F11/3636—Software debugging by tracing the execution of the program
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11405428B2 (en) | Method and system for policy management, testing, simulation, decentralization and analysis | |
US11711374B2 (en) | Systems and methods for understanding identity and organizational access to applications within an enterprise environment | |
US11308221B2 (en) | Testing cloud application integrations, data, and protocols | |
CN107409126B (en) | System and method for securing an enterprise computing environment | |
US10826682B2 (en) | Multi-instance architecture supporting trusted blockchain-based network | |
EP3420701B1 (en) | Techniques for discovering and managing security of applications | |
Awaysheh et al. | Next-generation big data federation access control: A reference model | |
US10154066B1 (en) | Context-aware compromise assessment | |
US10936739B1 (en) | Dynamically granting and enforcing rights on a protected document | |
US20220342846A1 (en) | Efficient configuration compliance verification of resources in a target environment of a computing system | |
WO2019204778A1 (en) | Automated access control management for computing systems | |
US8099711B2 (en) | System and method for multi-level security filtering of model representations | |
EP3080741A2 (en) | Systems and methods for cloud security monitoring and threat intelligence | |
EP3065077B1 (en) | Gap analysis of security requirements against deployed security capabilities | |
US20230319092A1 (en) | Offline Workflows In An Edge-Based Data Platform | |
Buecker et al. | IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager | |
Welling | APPLICATION SECURITY TESTING | |
Niu et al. | Security analysis model, system architecture and relational model of enterprise cloud services | |
JP6369249B2 (en) | Unauthorized access detection system, unauthorized access detection method and unauthorized access detection program | |
Chatterjee | Red Hat and IT Security | |
US12126643B1 (en) | Leveraging generative artificial intelligence (‘AI’) for securing a monitored deployment | |
Hawasli | azureLang: a probabilistic modeling and simulation language for cyber attacks in Microsoft Azure cloud infrastructure | |
US12021888B1 (en) | Cloud infrastructure entitlement management by a data platform | |
da Silva | Open-Source Framework for Digital Forensics Investigations | |
Tall | Big Data Processing Attribute Based Access Control Security |