Applications Security Testing tools are one of the resources most widely used by developers to guarantee the security of applications. Tools implement static and dynamic vulnerability detection and it is not possible to identify a single tool that is able to find all the vulnerabilities. The main objective of this thesis is to develop a modular and scalable system to integrate different tools inside a Continuous Integration/Continuous Delivery Pipeline. Docker containerization and tools stateless execution allow parallelism and replication. As a result of the analysis of a web application, the system execution produces as output a unique JSON report that contains all the vulnerabilities found by the tools executed, with a risk score associa...
The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affec...
This work is aimed on documenting the use of tools for security testing of web applica-tions. First ...
Among the various facets of cybersecurity, software security plays a crucial role. This requires the...
Since the last decade, most of the enterprise applications were developed in Java because Java is be...
Abstract. Many applications in the enterprise world feature thick Java clients. Testing the security...
M.Sc. (Computer Science)Abstract: Web applications have been the target of endless attacks which rea...
The design of the techniques and algorithms used by the static, dynamic and interactive security tes...
Many security incidents are caused by software developers’ failure to adhere to secure programming p...
Web security has been a concern given how often people access web applications be it for work or lei...
Web application programmers must be aware of a wide range of potential security risks. Although the ...
We have to face a simple, yet, disturbing fact: current computing is inherently insecure. The system...
The proliferation of distributed, multilayer software services is encouraging a separation of Applic...
The focus of this study is to find out repeatable features for large-scale enterprise web applicatio...
As the number of web applications and the corresponding number and sophistication of the threats inc...
Static analysis tools come in many forms and configurations, allowing them to handle various tasks i...
The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affec...
This work is aimed on documenting the use of tools for security testing of web applica-tions. First ...
Among the various facets of cybersecurity, software security plays a crucial role. This requires the...
Since the last decade, most of the enterprise applications were developed in Java because Java is be...
Abstract. Many applications in the enterprise world feature thick Java clients. Testing the security...
M.Sc. (Computer Science)Abstract: Web applications have been the target of endless attacks which rea...
The design of the techniques and algorithms used by the static, dynamic and interactive security tes...
Many security incidents are caused by software developers’ failure to adhere to secure programming p...
Web security has been a concern given how often people access web applications be it for work or lei...
Web application programmers must be aware of a wide range of potential security risks. Although the ...
We have to face a simple, yet, disturbing fact: current computing is inherently insecure. The system...
The proliferation of distributed, multilayer software services is encouraging a separation of Applic...
The focus of this study is to find out repeatable features for large-scale enterprise web applicatio...
As the number of web applications and the corresponding number and sophistication of the threats inc...
Static analysis tools come in many forms and configurations, allowing them to handle various tasks i...
The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affec...
This work is aimed on documenting the use of tools for security testing of web applica-tions. First ...
Among the various facets of cybersecurity, software security plays a crucial role. This requires the...