• Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox 

      Schuckert, Felix; Hildner, Max; Katt, Basel; Langweg, Hanno (Chapter, 2018)
      We investigated 50 randomly selected buffer overflow vulnerabilities in Firefox. The source code of these vulnerabilities and the corresponding patches were manually reviewed and patterns were identified. Our main contribution ...
    • Source Code Patterns of Cross Site Scripting in PHP Open Source Projects 

      Schuckert, Felix; Hildner, Max; Katt, Basel; Langweg, Hanno (Journal article; Peer reviewed, 2018)
      To get a better understanding of Cross Site Scripting vulnerabilities, we investigated 50 randomly selected CVE reports which are related to open source projects. The vulnerable and patched source code was manually reviewed ...
    • Studying vulnerability history in an open-source software package 

      Bjørnseth, Geir Arne Mo (Master thesis, 2021)
      I løpet av de siste årene har vi sett et økt fokus på utvikling av sikker programvare med rammeverk og verktøy som Microsoft Security Development Life Cycle og OWASP Software Maturity Model, men fortsatt ser vi kjente og ...
    • System security assurance: A systematic literature review 

      Shukla, Ankur; Katt, Basel; Nweke, Livinus Obiora; Yeng, Prosper; Weldehawaryat, Goitom Kahsay (Peer reviewed; Journal article, 2022)
      System security assurance provides the confidence that security features, practices, procedures, and architecture of software systems mediate and enforce the security policy and are resilient against security failure and ...
    • Towards a Context-Based Approach for Software Security Learning 

      Wen, Shao-Fang; Katt, Basel (Journal article; Peer reviewed, 2019)
      Learning software security is one of the most challenging tasks in the information technology sector due to the vast amount of security knowledge and the difficulties in understanding its practical applications. Conventional ...
    • Towards a Maturity Improvement Process – Systemically Closing the Socio-Technical Gap 

      Østby, Grethe; Kowalski, Stewart James; Katt, Basel (Peer reviewed; Journal article, 2020)
      In this paper we present ongoing research into escalation maturity measurements of organizations. We outline how to integrate a socio-technical approach and LIFT-methodology to improve the escalation maturity improvement ...
    • Towards a Quantitative Approach for Security Assurance Metrics 

      Weldehawaryat, Goitom Kahsay; Katt, Basel (Chapter, 2018)
      The need for effective and efficient evaluation schemes of security assurance is growing in many organizations, especially Small and Medium Enterprises (SMEs). Although there are several approaches and standards for ...
    • Towards a Scenario Ontology for the Norwegian Cyber Range 

      Seem, John André (Master thesis, 2020)
      Norwegian Cyber Range (NCR) er en treningsplattform for sikkerhet, som har et mål å produsere full skala øvelser over tre lag: strategisk, taktisk og teknisk. I NCR jobber de fleste domene eksperter primært til sitt eget ...
    • UI0T-FMT: Universal format for collection and aggregation of data from smart devices 

      Seljeseth, Mats Didriksen (Master thesis, 2020)
      Informasjons teknologi (IT) har blitt et særdeles omfattende del av menneskets hverdag. Hverdagslige apparater og dingser har blitt mer integrert med Smart Teknologi, som gjør det enklere for individet å bruke de. Med andre ...
    • UIOT-FMT: A Universal Format for Collection and Aggregation of Data from Smart Devices 

      Seljeseth, Mats; Yamin, Muhammad Mudassar; Katt, Basel (Peer reviewed; Journal article, 2020)
      Information Technology (IT) has become an essential part of our lives and due to the emergence of the Internet-of-Things (IoT), technology has encompassed a majority of things that humans rely on in their daily lives. ...
    • Use of cyber attack and defense agents in cyber ranges: A case study 

      Yamin, Muhammad Mudassar; Katt, Basel (Peer reviewed; Journal article, 2022)
      With the ever-changing cybersecurity landscape, the need for a continuous training for new cybersecurity skill sets is a requirement. Such continuous training programs can be delivered on platforms like cyber ranges. Cyber ...
    • Vulnerability Discovery Modelling With Vulnerability Severity 

      Ankur, Shukla; Katt, Basel; Nweke, Livinus Obiora (Peer reviewed; Journal article, 2019)
      Web browsers are primary targets of attacks because of their extensive uses and the fact that they interact with sensitive data. Vulnerabilities present in a web browser can pose serious risk to millions of users. Thus, ...
    • Weaponized AI for cyber attacks 

      Yamin, Muhammad Mudassar; Ullah, Mohib; Ullah, Habib; Katt, Basel (Journal article; Peer reviewed, 2021)
      Artificial intelligence (AI)-based technologies are actively used for purposes of cyber defense. With the passage of time and with decreasing complexity in implementing AI-based solutions, the usage of AI-based technologies ...
    • With a Little Help from Your Friends: Collaboration with Vendors During Smart Grid Incident Response Exercises 

      Langås, Mari; Løfqvist, Sanna; Katt, Basel; Haugan, Thomas Sagvold; Jaatun, Martin Gilje (Chapter, 2021)
      The introduction of Information and Communications Technology (ICT) into conventional power grids has resulted in a digitalized smart grid, enabling a more efficient and robust operation. However, it can also lead to ...