Institutsseminar/2022-05-20: Unterschied zwischen den Versionen
Keine Bearbeitungszusammenfassung |
Keine Bearbeitungszusammenfassung |
||
(Eine dazwischenliegende Version von einem anderen Benutzer wird nicht angezeigt) | |||
Zeile 1: | Zeile 1: | ||
{{Termin | {{Termin | ||
|datum=2022-05- | |datum=2022-05-20T11:30:00.000Z | ||
|raum= | |raum=MS Teams | ||
|online=https://sdqweb.ipd.kit.edu/wiki/SDQ-Oberseminar/Microsoft Teams | |||
}} | }} |
Aktuelle Version vom 12. Mai 2022, 13:52 Uhr
Datum | Freitag, 20. Mai 2022 | |
---|---|---|
Uhrzeit | 11:30 – 13:00 Uhr (Dauer: 90 min) | |
Ort | MS Teams | |
Webkonferenz | https://sdqweb.ipd.kit.edu/wiki/SDQ-Oberseminar/Microsoft Teams | |
Vorheriger Termin | Fr 13. Mai 2022 | |
Nächster Termin | Fr 3. Juni 2022 |
Termin in Kalender importieren: iCal (Download)
Vorträge
Vortragende(r) | Jonathan Schenkenberger |
---|---|
Titel | Architectural Generation of Context-based Attack Paths |
Vortragstyp | Masterarbeit |
Betreuer(in) | Maximilian Walter |
Vortragssprache | |
Vortragsmodus | online |
Kurzfassung | In industrial processes (Industry 4.0) and other fields in our lives like the energy or health sector, the confidentiality of data becomes increasingly important. For the protection of confidential information on critical systems, it is crucial to be able to find relevant attack paths in different access-control contexts to a critical element. In order to minimize costs, it is important to already consider this issue in the design phase of the software architecture. There are already approaches considering the topic of attack path generation. However, they do not consider software architecture modeling or they do not consider both vulnerabilities and access control mechanisms. Hence, this thesis presents an approach for finding all potential attack paths in a software architecture model considering access control and vulnerabilities. However, all attack paths are often to many, so the approach presented here introduces and utilizes meaningful filter criteria based on wide-spread vulnerability classification standards. |
Vortragende(r) | Limanan Nursalim |
---|---|
Titel | Automated Test Selection for CI Feedback on Model Transformation Evolution |
Vortragstyp | Masterarbeit |
Betreuer(in) | Timur Sağlam |
Vortragssprache | |
Vortragsmodus | online |
Kurzfassung | The development of the transformation model also comes with the appropriate system-level testing to verify its changes. Due to the complex nature of the transformation model, the number of tests increases as the structure and feature description become more detailed. However, executing all test cases for every change is costly and time-consuming. Thus, it is necessary to conduct a selection for the transformation tests. In this presentation, you will be introduced to a change-based test prioritization and transformation test selection approach for early fault detection. |
- Neuen Vortrag erstellen