DETECTION OF BROKEN ACCESS CONTROL VULNERABILITY USING GRAPH REPRESENTATION

With the advancement of information technology, various forms of security vulnerability emerge. One of the most common vulnerabilities is broken access control. This vulnerability ranks first in 2021 OWASP Top 10 list. This vulnerability can lead to unauthorized information access, data modificat...

Full description

Saved in:
Bibliographic Details
Main Author: Anugrah Wiradhika D, Fawwaz
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/82427
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia