Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of GraphSearch.
This lecture covers common vulnerabilities in web and software applications, such as broken access control, cryptographic failures, injection flaws, insecure design, and security misconfigurations. It explains the impact of attacker-controlled data, the OWASP Top 10 project, and defense strategies like DEP, ASLR, and stack canaries.