Solving real world security problems : hacking and protection
The following report examines the security of using open source library. Even though open source libraries were designed to be secure via transparency, it is only secure if the weakest link, the users, update it constantly when new vulnerabilities are discovered. We also found out that a huge num...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/74026 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-74026 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-740262023-03-03T20:29:06Z Solving real world security problems : hacking and protection Ng, Shi Kai Liu Yang School of Computer Science and Engineering DRNTU::Engineering The following report examines the security of using open source library. Even though open source libraries were designed to be secure via transparency, it is only secure if the weakest link, the users, update it constantly when new vulnerabilities are discovered. We also found out that a huge number of commercial applications are actually using open source libraries. Thus, in our project, we hope to identify which open source and its corresponding version commercial applications are using. From there, we can then observe if there are any vulnerabilities associated with the commercial applications analyzed. For the identification of the different projects used, we would utilize language processing models. We would extract n-grams and conduct Term Frequency – Inverse Document Frequency (tf-idf) analysis on the data collected. N-grams are bag of words that are removed from a document, where ‘n’ refers to the bag size. A bi-gram of ‘My first project’ for instance, would refer to bags of words of size 2, namely ‘my first’ and ‘first project’. Tfidf is a popular metric to determine if an n-gram uniquely identifies a document by analyzing its frequency of occurrence both within the document (term frequency) and in other documents (inverse document frequency). A high tf-idf score would indicate that the n-gram can accurately identify the document. This report only deals with a component of the project, namely the building of a database of bigram and trigram mapped to the projects analyzed. Bachelor of Engineering (Computer Science) 2018-04-23T08:52:57Z 2018-04-23T08:52:57Z 2018 Final Year Project (FYP) http://hdl.handle.net/10356/74026 en Nanyang Technological University 27 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering |
spellingShingle |
DRNTU::Engineering Ng, Shi Kai Solving real world security problems : hacking and protection |
description |
The following report examines the security of using open source library. Even though open
source libraries were designed to be secure via transparency, it is only secure if the weakest
link, the users, update it constantly when new vulnerabilities are discovered. We also found
out that a huge number of commercial applications are actually using open source libraries.
Thus, in our project, we hope to identify which open source and its corresponding version
commercial applications are using. From there, we can then observe if there are any
vulnerabilities associated with the commercial applications analyzed.
For the identification of the different projects used, we would utilize language processing
models. We would extract n-grams and conduct Term Frequency – Inverse Document
Frequency (tf-idf) analysis on the data collected. N-grams are bag of words that are
removed from a document, where ‘n’ refers to the bag size. A bi-gram of ‘My first project’
for instance, would refer to bags of words of size 2, namely ‘my first’ and ‘first project’. Tfidf
is a popular metric to determine if an n-gram uniquely identifies a document by
analyzing its frequency of occurrence both within the document (term frequency) and in
other documents (inverse document frequency). A high tf-idf score would indicate that the
n-gram can accurately identify the document.
This report only deals with a component of the project, namely the building of a database of
bigram and trigram mapped to the projects analyzed. |
author2 |
Liu Yang |
author_facet |
Liu Yang Ng, Shi Kai |
format |
Final Year Project |
author |
Ng, Shi Kai |
author_sort |
Ng, Shi Kai |
title |
Solving real world security problems : hacking and protection |
title_short |
Solving real world security problems : hacking and protection |
title_full |
Solving real world security problems : hacking and protection |
title_fullStr |
Solving real world security problems : hacking and protection |
title_full_unstemmed |
Solving real world security problems : hacking and protection |
title_sort |
solving real world security problems : hacking and protection |
publishDate |
2018 |
url |
http://hdl.handle.net/10356/74026 |
_version_ |
1759854503576731648 |