Solving real world security problems : hacking and protection

The following report examines the security of using open source library. Even though open source libraries were designed to be secure via transparency, it is only secure if the weakest link, the users, update it constantly when new vulnerabilities are discovered. We also found out that a huge num...

Full description

Saved in:
Bibliographic Details
Main Author: Ng, Shi Kai
Other Authors: Liu Yang
Format: Final Year Project
Language:English
Published: 2018
Subjects:
Online Access:http://hdl.handle.net/10356/74026
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-74026
record_format dspace
spelling sg-ntu-dr.10356-740262023-03-03T20:29:06Z Solving real world security problems : hacking and protection Ng, Shi Kai Liu Yang School of Computer Science and Engineering DRNTU::Engineering The following report examines the security of using open source library. Even though open source libraries were designed to be secure via transparency, it is only secure if the weakest link, the users, update it constantly when new vulnerabilities are discovered. We also found out that a huge number of commercial applications are actually using open source libraries. Thus, in our project, we hope to identify which open source and its corresponding version commercial applications are using. From there, we can then observe if there are any vulnerabilities associated with the commercial applications analyzed. For the identification of the different projects used, we would utilize language processing models. We would extract n-grams and conduct Term Frequency – Inverse Document Frequency (tf-idf) analysis on the data collected. N-grams are bag of words that are removed from a document, where ‘n’ refers to the bag size. A bi-gram of ‘My first project’ for instance, would refer to bags of words of size 2, namely ‘my first’ and ‘first project’. Tfidf is a popular metric to determine if an n-gram uniquely identifies a document by analyzing its frequency of occurrence both within the document (term frequency) and in other documents (inverse document frequency). A high tf-idf score would indicate that the n-gram can accurately identify the document. This report only deals with a component of the project, namely the building of a database of bigram and trigram mapped to the projects analyzed. Bachelor of Engineering (Computer Science) 2018-04-23T08:52:57Z 2018-04-23T08:52:57Z 2018 Final Year Project (FYP) http://hdl.handle.net/10356/74026 en Nanyang Technological University 27 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering
spellingShingle DRNTU::Engineering
Ng, Shi Kai
Solving real world security problems : hacking and protection
description The following report examines the security of using open source library. Even though open source libraries were designed to be secure via transparency, it is only secure if the weakest link, the users, update it constantly when new vulnerabilities are discovered. We also found out that a huge number of commercial applications are actually using open source libraries. Thus, in our project, we hope to identify which open source and its corresponding version commercial applications are using. From there, we can then observe if there are any vulnerabilities associated with the commercial applications analyzed. For the identification of the different projects used, we would utilize language processing models. We would extract n-grams and conduct Term Frequency – Inverse Document Frequency (tf-idf) analysis on the data collected. N-grams are bag of words that are removed from a document, where ‘n’ refers to the bag size. A bi-gram of ‘My first project’ for instance, would refer to bags of words of size 2, namely ‘my first’ and ‘first project’. Tfidf is a popular metric to determine if an n-gram uniquely identifies a document by analyzing its frequency of occurrence both within the document (term frequency) and in other documents (inverse document frequency). A high tf-idf score would indicate that the n-gram can accurately identify the document. This report only deals with a component of the project, namely the building of a database of bigram and trigram mapped to the projects analyzed.
author2 Liu Yang
author_facet Liu Yang
Ng, Shi Kai
format Final Year Project
author Ng, Shi Kai
author_sort Ng, Shi Kai
title Solving real world security problems : hacking and protection
title_short Solving real world security problems : hacking and protection
title_full Solving real world security problems : hacking and protection
title_fullStr Solving real world security problems : hacking and protection
title_full_unstemmed Solving real world security problems : hacking and protection
title_sort solving real world security problems : hacking and protection
publishDate 2018
url http://hdl.handle.net/10356/74026
_version_ 1759854503576731648