In today's computer services, developers commonly use third-party resources like libraries, hosting infrastructure and advertisements. Using third-party components improves the efficiency and enhances the quality of developing custom applications. However, while using third-party resources adopts their benefits, it adopts their vulnerabilities, as well. Unfortunately, developers are uninformed about the risks, as a result of which, the services are susceptible to various attacks. There has been a lot of work on how to develop first-hand secure services. The key focus in my thesis is quantifying the risks in the inclusion of third-party resources and looking into possible ways of mitigating them. Based on the fundamental ways that risks aris...
The widespread access to the Internet and the ubiquity of web-based services make it easy to communi...
As the web keeps on expanding, so does the interest of attackers whoseek to exploit users and servic...
Software development has, to a large extent, become synonymous with using readymade blocks of code i...
The web is a tangled mass of interconnected services, whereby websites import a range of external re...
Empirical thesis.Bibliography: pages 47-54.1. Introduction -- 2. Literature review -- 3. Technical b...
Embedding content from third parties to enrich features is a common practice in the development of m...
Web is driving the evolution of the current system, allowing users to find, share and combine inform...
With the increasing number and severity of security incidents and exploits, information technology (...
There is an entire ecosystem of tools, techniques, and processes designed to improve software securi...
In recent years, we have seen an increased interest in studying the software supply chain of user-fa...
Dependability is an important characteristic that a trustworthy computer system should have. It is a...
This presentation examines some of the new laws that affect the liability risks faced by online serv...
Most studies in usable security research aim at a quantification of persons, who – depending on the...
Known security vulnerabilities are introduced in software systems as a result of depending on third-...
With the ever-increasing digitalization of society, the need for secure systems is growing. While so...
The widespread access to the Internet and the ubiquity of web-based services make it easy to communi...
As the web keeps on expanding, so does the interest of attackers whoseek to exploit users and servic...
Software development has, to a large extent, become synonymous with using readymade blocks of code i...
The web is a tangled mass of interconnected services, whereby websites import a range of external re...
Empirical thesis.Bibliography: pages 47-54.1. Introduction -- 2. Literature review -- 3. Technical b...
Embedding content from third parties to enrich features is a common practice in the development of m...
Web is driving the evolution of the current system, allowing users to find, share and combine inform...
With the increasing number and severity of security incidents and exploits, information technology (...
There is an entire ecosystem of tools, techniques, and processes designed to improve software securi...
In recent years, we have seen an increased interest in studying the software supply chain of user-fa...
Dependability is an important characteristic that a trustworthy computer system should have. It is a...
This presentation examines some of the new laws that affect the liability risks faced by online serv...
Most studies in usable security research aim at a quantification of persons, who – depending on the...
Known security vulnerabilities are introduced in software systems as a result of depending on third-...
With the ever-increasing digitalization of society, the need for secure systems is growing. While so...
The widespread access to the Internet and the ubiquity of web-based services make it easy to communi...
As the web keeps on expanding, so does the interest of attackers whoseek to exploit users and servic...
Software development has, to a large extent, become synonymous with using readymade blocks of code i...