DETECTION OF BROKEN ACCESS CONTROL VULNERABILITY USING GRAPH REPRESENTATION
With the advancement of information technology, various forms of security vulnerability emerge. One of the most common vulnerabilities is broken access control. This vulnerability ranks first in 2021 OWASP Top 10 list. This vulnerability can lead to unauthorized information access, data modificat...
Saved in:
Main Author: | Anugrah Wiradhika D, Fawwaz |
---|---|
Format: | Final Project |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/82427 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Similar Items
-
STATIC CODE ANALYSIS TOOLS FOR DETECTING BROKEN AUTHENTICATION USING GRAPH REPRESENTATION
by: Ramadhan Syah Khair, Farhan -
PEMBANGKITAN MUTAN UNTUK TESTING KERENTANAN BROKEN ACCESS CONTROL
by: Faidh Muzaki, Dimas -
Static Code Analyzer for Detecting Web Application Vulnerability Using Control Flow Graphs
by: Hendryanto Halim, Vincent -
Broken crayon
by: Ang, Geck Geck, et al.
Published: (2012) -
MANDO-HGT: Heterogeneous graph transformers for smart contract vulnerability detection
by: NGUYEN, Huu Hoang, et al.
Published: (2023)